The present disclosure is related generally to wearable electronic devices and, more particularly, to a method and apparatus for securing a wearable electronic device.
Wearable electronic devices, such as smart watches, are becoming more popular. Such devices are able to synchronize with non-wearable devices, such as smart phones. For example, when a user receives a text message on a smart phone, the smart phone can push the message out to the wearable device. The wearable device may then display the message on a user interface (e.g., on a watch face).
One issue with wearable electronic devices is security. For example, when a person takes off his or her smart watch and leaves it on a table in a restaurant, a passerby may be able to see the user's email.
While the appended claims set forth the features of the present techniques with particularity, these techniques, together with their objects and advantages, may be best understood from the following detailed description taken in conjunction with the accompanying drawings of which:
This disclosure is generally directed to a method for securing a wearable electronic device (“wearable device”). According to various embodiments, the wearable device (e.g., a smart watch) determines whether a user's pulse is present. If the user's pulse is determined not to be present, the wearable device secures itself. For example, the wearable device may lock its user interface and prompt the user for the entry of a password or personal identification number. The wearable device may also signal another electronic device (e.g., a paired communication device, such as a smart phone) to indicate that the wearable device is no longer being worn by a user. The other electronic device (referred to herein as a “companion device”) may then react by, for example, ceasing to push user messages (e.g., text messages or emails) wirelessly to the wearable device. The companion device may also react to the signal from the wearable device by prompting for entry of a password or personal identification number.
The disclosure is also directed to a wearable device that is configured to secure itself based on signals received from a pulse sensor. In an embodiment, the pulse sensor includes a light source (e.g., a light-emitting diode) and a photo sensor. The light source, under the control of a processor, shines light having a particular wavelength (e.g., green or infrared). The photo sensor generates signals based on light that it senses. For example, when the light from the light source reflects off a person's skin, then the photo sensor will generate signals based on the reflected light that the photo sensor detects. In one embodiment, the pulse sensor captures a photoplethysmogram (“PPG”), in which the reflected light from a person's skin creates a particular signature that the processor interprets to determine the presence of a pulse. In this manner, the wearable device can accurately determine whether it is being worn by a user. For example, when the wearable device is a smart watch, then the presence of a human pulse from the user's wrist will manifest in the reflected light signature and lead the processor to conclude that the watch is, in fact, being worn. This allows for greater certainty than, for example, using proximity detection alone, which may be triggered by mere proximity of an object, such as the surface of a table.
In an embodiment, the wearable device also has a proximity sensor, which may use the same components as the pulse sensor (e.g., the same light source and the same photo sensor). In some implementations, the power consumption required by the light source to perform PPG is greater than the power consumption the light source requires when performing proximity sensing. To address this issue, the wearable device may carry out a first pulse detection to verify that the wearable device is being worn (e.g., using the required power from the light source), and then carry out periodic proximity detections (e.g., by flashing the light source at a lower power periodically and sensing the reflection) to determine whether the user's skin is still present (i.e., proximal to the wearable device). If the wearable device does not detect the user's skin to be present, then the wearable device carries out a second pulse detection. The wearable device may then secure itself (or not) based on this second pulse detection.
In still another embodiment, the wearable device triggers its pulse check off of motion (e.g., as detected by a motion sensor). If, for example, the wearable device detects motion, then it checks for a pulse. If the wearable device detects a pulse, then it initiates an authentication procedure in which it prompts the user for a password or personal identification number (either directly through the user interface of the wearable device or via the companion device). If, however, the wearable device has previously gone through this procedure (e.g., the wearable device is already being worn, but the user just moves in a way that causes the wearable device to move), then the wearable device checks for a pulse. If the wearable device does not detect a pulse, the wearable device secures itself. If the wearable device does detect a pulse, then it leaves itself unsecured.
Turning to
Turning to
The elements of
Turning to
Turning to
If, at block 404, the wearable device 100 determines that there is a pulse present, the wearable device 100 obtains a baseline reflection profile for the user at block 408. For example, the processor 202 turns on the light source 214. The light from the light source reflects off of the user's skin 106. The reflected light is detected by the photo sensor 216. The photo sensor 216 then generates a signal based on the reflected light. The processor 202 reads the signal and determines, based on the signal, what the user's skin reflection profile is (e.g., the wavelength at which light from the light source 214 reflects off of the user's skin 106). The skin reflection profile may depend on the user's skin tone and vary from user to user. At block 410, the wearable device 100 sets upper and lower threshold values for the user's skin reflection profile. For example, the processor, based on the user's skin profile, sets upper and lower threshold values for the wavelength (or upper and lower threshold values for the frequency) of the reflected light. At block 412, the wearable device 100 intermittently checks to see whether the user's skin 106 is still in proximity to the wearable device 100. For example, the wearable device flashes the light source 214 intermittently (e.g., every 5 milliseconds). The light from the light source 214 reflects off of the user's skin 106. The reflected light is detected by the photo sensor 216. The photo sensor 216 then generates a signal based on the reflected light. The processor 202 determines whether the wavelength or frequency of the reflected light is within upper and lower thresholds. If so, then the process continues to loop back onto block 412. If not, then the process moves back to block 404.
Turning to
Turning to
While one or more embodiments of the have been described with reference to the figures, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from their spirit and scope of as defined by the following claims.
The present application claims priority to U.S. Provisional Patent Application 62/016,375, filed Jun. 24, 2014, the contents of which are incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
62016375 | Jun 2014 | US |