Augmented reality security access
First Claim
1. A method involving an augmented reality (AR) electronic device, the method comprising:
- identifying a user of an AR electronic device, the AR electronic device executing a security access code software application;
identifying a current location of the user;
enabling the security access code software application of the AR electronic device to be synchronized with a security access code software application being executed by a server computer;
before generating a security access code at the AR electronic device, when the current location of the user is at or near a location of a protected asset, using multiple levels of authorization to authorize the user to access the protected asset, including;
determining whether the user is authorized to access the protected asset at the current location of the user; and
determining whether the user is authorized to view the security access code at the current location of the user;
when the AR electronic device is synchronized with the server computer and when a-determination is made that the user is authorized to access the protected asset when the current location of the user is at or near the location of the protected asset, using the security access code software application of the AR electronic device, generating the security access code at the AR electronic device; and
using the security access code to gain access to the protected asset.
1 Assignment
0 Petitions
Accused Products
Abstract
A method implemented on an augmented reality (AR) electronic device includes initiating a security access code software application on the AR electronic device. A user of the AR electronic device is identified. A first electronic computing device at or near a current location of the user is identified. The first electronic computing device is an input device for entry of a security code to permit access to a protected asset. A determination is made as to whether the user is authorized to access the protected asset. When a determination is made that the user is authorized to access the protected asset, a security access code is displayed on the AR electronic device. The security access code permits the user to access the protected asset via the first electronic computing device.
71 Citations
15 Claims
-
1. A method involving an augmented reality (AR) electronic device, the method comprising:
-
identifying a user of an AR electronic device, the AR electronic device executing a security access code software application; identifying a current location of the user; enabling the security access code software application of the AR electronic device to be synchronized with a security access code software application being executed by a server computer; before generating a security access code at the AR electronic device, when the current location of the user is at or near a location of a protected asset, using multiple levels of authorization to authorize the user to access the protected asset, including; determining whether the user is authorized to access the protected asset at the current location of the user; and determining whether the user is authorized to view the security access code at the current location of the user; when the AR electronic device is synchronized with the server computer and when a-determination is made that the user is authorized to access the protected asset when the current location of the user is at or near the location of the protected asset, using the security access code software application of the AR electronic device, generating the security access code at the AR electronic device; and using the security access code to gain access to the protected asset. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An augmented reality (AR) electronic device, comprising:
-
a processing unit; and system memory, the system memory including instructions which, when executed by the processing unit, cause the AR electronic device to; synchronize a clock on the AR electronic device with a clock on a server computer; identify a user of an AR electronic device; identify a current location of the user; receive a command from the user to generate a security access code at the AR electronic device; before generating the security access code, when the current location of the user is at or near a location of a protected asset, using multiple levels of authorization to authorize the user to access the protected asset, including; determine whether the user is authorized to access the protected asset at the current location of the user; determine whether the AR electronic device is an authorized device; and determine whether the user is authorized to view the security access code at the current location of the user; when the clock on the AR electronic device is synchronized with clock on the server computer, when the command is received from the user and when a determination is made that the user is authorized to access the protected asset at the current location of the user, use a security access code software application of the AR electronic device to generate the security access code at the AR electronic device; and use the security access code to gain access to the protected asset. - View Dependent Claims (12, 13, 14)
-
-
15. An augmented reality (AR) electronic device, comprising:
-
a processing unit; and system memory, the system memory including instructions which, when executed by the processing unit, cause the AR electronic device to; synchronize a clock on the AR electronic device with a clock on a server computer; use a biometric method of authentication to identify a user of an AR electronic device; identify a current location of the user in a building at a global positioning system (GPS) location of the user; receive a command from the user to generate a security access code at the AR electronic device; before generating the security access code at the AR electronic device, when the current location of the user is at or near a location of a protected asset, determine whether the user is authorized to access protected asset in the building, the determination of whether the user is authorized to access the protected asset in the building comprising; determine whether the AR electronic device is an authorized device; determine whether the user is authorized to view a security access code to obtain access to the protected asset in the building; determine whether the user is authorized to view the security access code at the current location of the user; when the clock on the AR electronic device is synchronized with clock on the server computer, when the command is received from the user and when a determination is made that the user is authorized the authorization is received from the server computer to access the protected asset, use a security access code software application on the AR electronic device to generate the security access code at the AR electronic device; and use the security access code to gain access to the protected asset.
-
Specification