Augmented reality security access
First Claim
1. A method involving an augmented reality (AR) electronic device, the method comprising:
- identifying a user of an AR electronic device, the AR electronic device executing a security access code software application;
identifying a current location of the user through a global positioning system of the AR electronic device;
identifying a first electronic computing device at the identified current location of the user, the first electronic computing device including an input device for keypad entry of a security code to permit access to a protected asset;
communicatively coupling and synchronizing the AR electronic device to the first electronic computing device, the communicative coupling enabling the security access code software application of the AR electronic device to communicate with a security access code software application being executed by the first electronic computing device;
determining whether the user has security clearance to access the protected asset at the current location of the user;
when a determination is made that the user is authorized to access the protected asset, receiving a voice input command at the AR electronic device to cause the security access code software applications at both the AR electronic device and the first electronic computing device to generate a same security access code;
displaying the generated security access code on the AR electronic device;
receiving the displayed security access code via the input device of the first electronic computing device;
comparing the received security access code to the security access code generated by the first electronic computing device, wherein matching of the security access codes permits the user to access the protected asset.
2 Assignments
0 Petitions
Accused Products
Abstract
A method implemented on an augmented reality (AR) electronic device includes initiating a security access code software application on the AR electronic device. A user of the AR electronic device is identified. A first electronic computing device at or near a current location of the user is identified. The first electronic computing device is an input device for entry of a security code to permit access to a protected asset. A determination is made as to whether the user is authorized to access the protected asset. When a determination is made that the user is authorized to access the protected asset, a security access code is displayed on the AR electronic device. The security access code permits the user to access the protected asset via the first electronic computing device.
77 Citations
12 Claims
-
1. A method involving an augmented reality (AR) electronic device, the method comprising:
-
identifying a user of an AR electronic device, the AR electronic device executing a security access code software application; identifying a current location of the user through a global positioning system of the AR electronic device; identifying a first electronic computing device at the identified current location of the user, the first electronic computing device including an input device for keypad entry of a security code to permit access to a protected asset; communicatively coupling and synchronizing the AR electronic device to the first electronic computing device, the communicative coupling enabling the security access code software application of the AR electronic device to communicate with a security access code software application being executed by the first electronic computing device; determining whether the user has security clearance to access the protected asset at the current location of the user; when a determination is made that the user is authorized to access the protected asset, receiving a voice input command at the AR electronic device to cause the security access code software applications at both the AR electronic device and the first electronic computing device to generate a same security access code; displaying the generated security access code on the AR electronic device; receiving the displayed security access code via the input device of the first electronic computing device; comparing the received security access code to the security access code generated by the first electronic computing device, wherein matching of the security access codes permits the user to access the protected asset. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An augmented reality (AR) electronic device comprising:
-
a camera; an optical head-mounted display; a processing unit; and system memory, the system memory including instructions which, when executed by the processing unit, cause the AR electronic device to; execute a security access code software application on the AR electronic device; identify a user of the AR electronic device; identify a current location of the user through a global positioning system of the AR electronic device identify a first electronic computing device at the identified current location of the user, the first electronic computing device including an input device for keypad entry of a security code to permit access to a protected asset; communicatively couple and synchronize the AR electronic device to the first electronic computing device, the communicative coupling enabling the security access code software application of the AR electronic device to communicate with a security access code software application being executed by the first electronic computing device; determine, through voice recognition at the the AR electronic device, whether the user is authorized to use the AR electronic device; determine whether the user has security clearance to access the protected asset at the current location of the user; when a determination is made that the user is authorized to use the AR electronic device and access the protected asset, receive a voice input command at the AR electronic device to cause the security access code software applications at both the AR electronic device and the first electronic computing device to generate a same security access code and display the generated security access code on the AR electronic device; and receive the displayed security access code via the input device of the first electronic computing device and compare the received security access code to the security access code generated by the first electronic computing device, when the received security access code matches the security access code generated by the first electronic computing device permit the user to access the protected asset. - View Dependent Claims (10, 11, 12)
-
Specification