This disclosure relates generally to wearable computing devices. Specifically, this disclosure relates to pairing a wearable computing device with its user.
Computing devices have advanced to the point where they can now be a fashion statement. Wearable computing devices, such as glasses, watches, and so on, provide many conveniences, but come with an inherent security risk. If someone steals the wearable device, it is possible the thief can gain access to the owner's secure information, and the owner's other smart devices, potentially, to gain access to the owner's car or the home,
In some cases, the same numbers are used throughout the disclosure and the figures to reference like components and features. Numbers in the 100 series refer to features originally found in
In the following description, numerous specific details are set forth, such as examples of specific types of processors and system configurations, specific hardware structures, specific architectural and micro architectural details, specific register configurations, specific instruction types, specific system components, specific measurements or heights, specific processor pipeline stages and operation, etc., in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that these specific details need not be employed to practice the present invention. In other instances, well known components or methods, such as specific and alternative processor architectures, specific logic circuits or code for described algorithms, specific firmware code, specific interconnect operation, specific logic configurations, specific manufacturing techniques and materials, specific compiler implementations, specific expression of algorithms in code, specific power down and gating techniques or logic and other specific operational details of computer system have not been described in detail in order to avoid unnecessarily obscuring the present invention.
Although the following embodiments may be described with reference to energy conservation and energy efficiency in specific integrated circuits, such as in computing platforms or microprocessors, other embodiments are applicable to other types of integrated circuits and logic devices. Similar techniques and teachings of embodiments described herein may be applied to other types of circuits or semiconductor devices that may also benefit from better energy efficiency and energy conservation. For example, the disclosed embodiments are not limited to smart rings, and may be also used in other devices, such as wearable and handheld devices, systems on a chip (SOC) devices, and embedded applications. Some examples of handheld devices include cellular phones, Internet protocol devices, digital cameras, and handheld PCs. Embedded applications typically include a microcontroller, a digital signal processor (DSP), a system on a chip, network computers (NetPC), or any other system that can perform the functions and operations taught below. Moreover, the apparatuses, methods, and systems described herein are not limited to physical computing devices, but may also relate to software optimizations for energy conservation and efficiency. As will become readily apparent in the description below, the embodiments of methods, apparatuses, and systems described herein (whether in reference to hardware, firmware, software, or a combination thereof) are vital to a ‘green technology’ future balanced with performance considerations.
Embodiments of the present techniques provide a mobile device that is paired with a user based on an identifying feature on the user's skin. In one embodiment, the identifying feature is a tattoo. However, other identifying features may be used, such as freckles, scars, birthmarks, and moles. Once the device is paired with a user, only the user with the same identifying feature is authorized to use the device.
Further, the smart ring 102A includes a detection device (not shown), such as a camera to detect and verify the owner's identifying feature, The user pairs with the smart ring 102A by placing the smart ring 102A on a ring with an identifying feature. The camera takes a picture of the identifying feature, and stores the image locally. After the pairing, no one can use the device unless the user can place the ring on a finger with the identifying feature. The smart ring 102A may also enable the user to change the identifying feature, for example, if the smart ring 102A is sold. Additionally, the ring may have integrated wireless charging coils that can be charged via induction. Alternatively, the smart ring 102A may be charged via resonance wireless charging schemes with external excitation charge coils. In one embodiment, a thermal-electro power convertor harvests thermal power from the finger to charge the smart ring 102A.
As stated previously, the wearable computing device may be any device, such as a ring, bracelet, watch, glasses, and so on. However, for the sake of clarity, embodiments of the present techniques are discussed with respect to the smart ring 102A. It is understood that any wearable computing device may be used to implement the present techniques.
The tattoos 200A are examples of permanent ink tattoos. In an embodiment of the present techniques, the smart ring 102A is placed on top of one of these tattoos 200A by the user putting on the smart ring 102A. A visible light camera on the smart ring 102A takes a picture of the tattoo 200A, or a portion thereof. The smart ring 102A is then paired to the user based on the tattoo 200A. Further use of the ring is secured by authenticating the paired. image of the tattoo 200A against the finger of any wearer of the smart ring 102A.
Advantageously, the tattooed code can be modified by replacing one or more of the 0's to 1's. For example, the binary code 406 may be changed from 101101 to 101111, by filling the last 0 spot with conductive ink.
The ADC 502 sends the binary code to the controller 504. The controller 504 compares the binary code with the stored key. If the keys match, the smart ring 402 provides access to data on the smart ring 402, and other functionality, such as the NFC 506. The controller 504 also stores the binary code when the user first pairs with the smart ring 402, The binary code can be stored in flash storage inside the controller 504.
The NFC 506 is a proximity sensor and also an authentication device, which allows the user wearing the smart ring to log onto the smart phone which supports NFC authentication for user login, as illustrated in
At block 610, a potential user puts on the wearable device. At block 612, the wearable device sensor performs its capture on the portion of the user's skin covered by the wearable device. The capture may be taking a picture in the visible, UV, or infrared spectrums. Alternatively, the capture may be a conductive read of a tattoo written in conductive ink, as described with respect to
At block 614, the capture is compared with the identifying feature used to pair with the device. If there is a match, at block 616, the user is authorized to use the wearable device. If there is not a match, at block 618, the user may request another read, and block 612 repeats. Alternatively, the wearable device may turn off. If the identifying feature changes from environmental affects, or accident, the user may re-pair with the wearable device using a tool such as, a mobile application. In one embodiment, the mobile application resides on a smart phone, tablet, or notebook computer, and interfaces with the wearable device via a wireless technology, such as Bluetooth.
The computing device 700 also includes a network interface 708. The network interface 708 connects the computing device 700 to a network 712. The network 712 may be a wide area network (WAN), local area network (LAN), or the Internet, among others. In some examples, the device may communicate with other devices through a wireless technology, The computing device 700 also includes a detector 710. The detector 710 is used to detect the identifying feature, or the lack thereof, on the wearer. The detector 710 may be a red-green-blue (RGB) camera, an infrared camera, an RGB camera with a UV light, a set of conductive sense points, and the like.
The block diagram of
An example apparatus includes logic. The logic at least partially includes hardware logic to capture a representation of a tattoo on a user. The representation of the tattoo is associated with the apparatus. A representation of a wearer of the apparatus is captured. The wearer is authorized to use the apparatus if the representation of the wearer matches the representation of the tattoo. The wearer is prevented from using the apparatus if the representation of the wearer does not match the representation of the tattoo.
An example apparatus includes a camera. The representation of the tattoo is an image of he tattoo. The representation of the wearer is an image of the wearer.
In an example apparatus, the image of the tattoo represents a binary code. The representation of the wearer matches the representation of the tattoo if the image of the wearer represents a same binary code as the binary code.
An example apparatus includes conductive sensors. The tattoo on the user includes conductive ink. Capturing the representation of the tattoo includes sensing a first pattern of the conductive ink. In an example apparatus, capturing the representation of the wearer includes sensing a second pattern of the conductive ink.
In an example apparatus, the tattoo includes ink that is only visible under ultraviolet light. An example apparatus includes an ultraviolet light source that illuminates the tattoo for capture of the representation of the tattoo. The example apparatus illuminates the wearer for capture of the representation of the wearer.
An example method for pairing a wearable apparatus with a user is described herein. The method includes capturing a representation of a tattoo on a user. The method also includes associating the representation with the apparatus. The method further includes capturing a representation of a wearer of the apparatus. The method also includes authorizing the wearer to use the apparatus if the representation of the wearer matches the representation of the tattoo. Additionally, the method includes preventing the wearer from using the apparatus if the representation of the wearer does not match the representation of the tattoo.
In an example method, the representation of the tattoo is an image of the tattoo, and the representation of the wearer is an image of the wearer. In an example method, the image of the tattoo represents a binary code, and the representation of the wearer matches the representation of the tattoo if the image of the wearer represents a same binary code as the binary code.
In an example method, the tattoo on the user includes conductive ink, and wherein capturing the representation of the tattoo includes sensing a first pattern of the conductive ink. In an example method, capturing the representation of the wearer it eludes sensing a second pattern of the conductive ink.
In an example method, the tattoo includes ink that is only visible under ultraviolet light. An example method includes illuminating the tattoo with an ultraviolet light source for capture of the representation of the tattoo. An example method includes illuminating the wearer with an ultraviolet light source for capture of the representation of the wearer.
An example computer readable medium for pairing a wearable device with a user is described herein. The medium has instructions stored therein that, in response to being executed on the wearable device, cause the wearable device to capture a representation of a tattoo on a user. The representation of the tattoo is associated with the apparatus. A representation of a wearer of the apparatus is captured. The wearer is authorized to use the apparatus if the representation of the wearer matches the representation of the tattoo. The wearer is prevented from using the apparatus if the representation of the wearer does not match the representation of the tattoo.
In an example computer readable medium, the representation of the tattoo is an image of the tattoo, and the representation of the wearer is an image of the wearer. In an example computer readable medium, the image of the tattoo represents a binary code, and the representation of the wearer matches the representation of the tattoo if the image of the wearer represents a same binary code as the binary code.
In an example computer readable medium, the tattoo on the user includes conductive ink, and capturing the representation of the tattoo includes sensing a first pattern of the conductive ink. In an example computer readable medium, capturing the representation of the wearer includes sensing a second pattern of the conductive ink.
In an example computer readable medium, the tattoo includes ink that is only visible under ultraviolet light. An example computer readable medium includes instructions that cause the wearable device to illuminate the tattoo with an ultraviolet light source for capture of the representation of the tattoo, and illuminate the wearer with an ultraviolet light source for capture of the representation of the wearer.
In an example computer medium, the image of the tattoo represents a binary code, and the representation of the wearer matches the representation of the tattoo if the image of the wearer represents a same binary code as the binary code.
In an example computer readable medium, the tattoo on the user includes conductive ink, and capturing the representation of the tattoo includes sensing a first pattern of the conductive ink. In an example computer readable medium, capturing the representation of the wearer includes sensing a second pattern of the conductive ink.
In an example computer readable medium, the tattoo includes ink that is only visible under ultraviolet light. In an example computer readable medium, the instructions cause the wearable device to illuminate the tattoo with an ultraviolet light source for capture of the representation of the tattoo.
In an example system for pairing a wearable device with a user, the system includes a processor and a memory. The memory includes instructions that cause the processor to capture a representation of an identifying feature on a user. The representation of the identifying feature is associated with the apparatus. A representation of a wearer of the apparatus is captured. The wearer is authorized to use the apparatus if the representation of the wearer matches the representation of the identifying feature. The wearer is prevented from using the apparatus if the representation of the wearer does not match the representation of the identifying feature.
In an example system, the representation of the identifying feature includes an image of the user's skin. In an example system, the identifying feature includes at least a. portion of a fingerprint.
In an example system, the identifying feature includes a tattoo, and the representation of the wearer includes an image of the tattoo. In an example system, the image of the identifying feature represents a binary code, and the representation of the wearer matches the representation of the identifying feature if the image of the wearer represents a same binary code as the binary code. In an example system, the image of the tattoo represents a binary code, and the representation of the wearer matches the representation of the tattoo if the image of the wearer represents a same binary code as the binary code.
In an example system, the tattoo on the user includes conductive ink, and capturing the representation of the tattoo includes sensing a first pattern of the conductive ink. In an example system, capturing the representation of the wearer includes sensing a second pattern of the conductive ink.
In an example system claim 34, the tattoo includes ink that is only visible under ultraviolet light. In an example system, the instructions cause the wearable device to illuminate the tattoo with an ultraviolet light source for capture of the representation of the tattoo.
In an example method for pairing a wearable device with a user, the method includes capturing a representation of an identifying feature on a user. The method also includes associating the representation of the identifying feature with the apparatus. Additionally, the method includes preventing a wearer from using the apparatus if a representation of the wearer does not match the representation of the identifying feature.
In an example method, a representation of a wearer of the apparatus is captured. Additionally, the wearer is authorized to use the apparatus if the representation of the wearer matches the representation of the identifying feature.
In an example method, the representation of the identifying feature includes an image of the user's skin. In an example method, the identifying feature includes at least a portion of a fingerprint.
In an example method, the identifying feature includes a tattoo, and the representation of the wearer includes an image of the tattoo. In an example method, the image of the identifying feature represents a binary code, and the representation of the wearer matches the representation of the identifying feature if the image of the wearer represents a same binary code as the binary code. In an example method, the image of the tattoo represents a binary code, and the representation of the wearer matches the representation of the tattoo if the image of the wearer represents a same binary code as the binary code.
In an example method, the tattoo on the user includes conductive ink, and capturing the representation of the tattoo includes sensing a first pattern of the conductive ink. In an example method, capturing the representation of the wearer includes sensing a second pattern of the conductive ink.
In an example method, the tattoo is illuminated with an ultraviolet light source for capture of the representation of the tattoo. The tattoo includes ink that is only visible under ultraviolet light.
Not all components, features, structures, characteristics, etc., described and illustrated herein need be included in a particular embodiment or embodiments. If the specification states a component, feature, structure, or characteristic “may”, “might”, “can” or “could” be included, for example, that particular component, feature, structure, or characteristic is not required to be included. If the specification or claim refers to “a” or “an” element, that does not mean there is only one of the element. If the specification claims refer to “an additional” element, that does not preclude there being more than one additional element.
It is to be noted that, although some embodiments have been described in reference to particular implementations, other implementations are possible according to some embodiments. Additionally, the arrangement and/or order of circuit elements or other features illustrated in the drawings and/or described herein need not be arranged in the particular way illustrated and described. Many other arrangements are possible according to some embodiments.
In each system shown in a figure, the elements in some cases may each have a same reference number or a different reference number to suggest that the elements represented could be different and/or similar. However, an element may be flexible enough to have different implementations and work with some or all of the systems shown or described herein. The various elements shown in the figures may be the same or different. Which one is referred to as a first element and which is called a second element is arbitrary.
It is to be understood that specifics in the aforementioned examples may he used anywhere in one or more embodiments. For instance, all optional features of the computing device described above may also be implemented with respect to either of the methods or the computer-readable medium described herein. Furthermore, although flow diagrams and/or state diagrams may have been used herein to describe embodiments, the techniques are not limited to those diagrams or to corresponding descriptions herein. For example, flow need not move through each illustrated box or state or in exactly the same order as illustrated and described herein.
The present techniques are not restricted to the particular details listed herein. Indeed, those skilled in the art having the benefit of this disclosure will appreciate that many other variations from the foregoing description and drawings may be made within the scope of the present techniques. Accordingly, it is the following claims including any amendments thereto that define the scope of the present techniques.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2015/082632 | 6/29/2015 | WO | 00 |