Augmented reality security access

ABSTRACT

A method implemented on an augmented reality (AR) electronic device includes initiating a security access code software application on the AR electronic device. A user of the AR electronic device is identified. A first electronic computing device at or near a current location of the user is identified. The first electronic computing device is an input device for entry of a security code to permit access to a protected asset. A determination is made as to whether the user is authorized to access the protected asset. When a determination is made that the user is authorized to access the protected asset, a security access code is displayed on the AR electronic device. The security access code permits the user to access the protected asset via the first electronic computing device.

BACKGROUND

Augmented reality is a technology in which a person's conception ofreality can be enhanced, typically through augmented sound, video orgraphics displays. The augmentation is typically implemented via varioustechnologies, such as a headset that may be worn by the person. One ormore augmented views may be presented to the person through the headset.

The augmented reality headset typically includes a wearable computer andan optical display mounted to the headset. The wearable computer mayinclude a wireless telecommunication capability, permitting a wirelessconnection from the wearable computer to a server computer. Because ofthe wireless telecommunication capability, the augmented reality headsetmay be used to interact with the server computer to accomplish varioustasks.

SUMMARY

Embodiments of the disclosure are directed to a method implemented on anaugmented reality (AR) electronic device. The method comprises: at theAR electronic device, initiating a security access code softwareapplication on the AR electronic device; identifying a user of the ARelectronic device; identifying a first electronic computing device at ornear a current location of the user, the first electronic computingdevice being an input device for entry of a security code to permitaccess to a protected asset; determining whether the user is authorizedto access the protected asset; when a determination is made that theuser is authorized to access the protected asset, displaying a securityaccess code on the AR electronic device, wherein the security accesscode permits the user to access the protected asset via the firstelectronic computing device.

In another aspect, an AR electronic device comprises: a camera; anoptical head-mounted display; a processing unit; and system memory, thesystem memory including instructions which, when executed by theprocessing unit, cause the AR electronic device to: initiate a securityaccess code software application on the AR electronic device; identify auser of the AR electronic device; identify a first electronic computingdevice at or near the current location of the user, the first electroniccomputing device being an input device for entry of a security code topermit access to a protected asset; determine whether the user isauthorized to use the AR electronic device; when a determination is madethat the user is authorized to use the AR electronic device, display asecurity access code on the AR electronic device, wherein the securityaccess code permits the user to access the protected asset via the firstelectronic computing device.

In yet another aspect, an AR electronics device comprises: a camera; anoptical head-mounted display; a processing unit; and system memory, thesystem memory including instructions which, when executed by theprocessing unit, cause the AR electronic device to: initiate a securityaccess code software application on the AR electronic device; identify auser of the AR electronic device, the identity of the user beingdetermined by one of voice recognition, retinal recognition, facialrecognition or finger print recognition; determine whether the user ofthe AR electronic device is authorized to view a security access codefor a protected asset; determine whether the AR electronic device is anauthorized device; identify a current location of the user of the ARelectronic device; identify a security access code input device at ornear the current location of the user, the security access code inputdevice requiring an entry of a security code to permit access to theprotected asset via the security access code input device or to access asecure area via the security access code input device, the identity ofthe security access code input device being determined via an objectrecognition software application of the AR electronic device; determinewhether the user is authorized to use the AR electronic device at thecurrent location; and when a determination is made that the user of theAR electronic device is authorized to view the access code and when adetermination is made that the AR electronic device is an authorizeddevice and when a determination is made that the user of the ARelectronic device is authorized to use the AR electronic device at thecurrent location: generate a security access code on the AR electronicdevice; and display the security access code on the AR electronicdevice, wherein the security access code permits the user to access theprotected asset via the security access code input device.

The details of one or more techniques are set forth in the accompanyingdrawings and the description below. Other features, objects, andadvantages of these techniques will be apparent from the description,drawings, and claims.

DESCRIPTION OF THE DRAWINGS

FIG. 1 shows an example system that may be used for augmented reality(AR) security access.

FIG. 2 shows example modules of the AR device of FIG. 1.

FIG. 3 shows a flowchart for an example method for generating a securityaccess code on the AR device of FIG. 1.

FIG. 4 shows example physical components of the AR device of FIG. 1.

DETAILED DESCRIPTION

The present disclosure is directed to systems and methods for generatinga security access code on an augmented reality (AR) device. The securityaccess code generated on the AR device provides an additional level ofsecurity for obtaining access to an electronic computing device. In someembodiments, the electronic computing device is a server computer thatrequires secure access. The security access code may also be used toobtain access to a specific area of a building, such as a vault or highsecurity area. Other uses for the security access code are possible. Inthis disclosure, devices or areas such as the server computer, vault andhigh security area of a building that require the additional level ofsecurity for obtaining access are referred to as protected assets.

In an example application, the security access code generated by the ARdevice is synchronized with a security access code generated on theserver computer. The security access codes are programmed to change on aperiodic basis, for example every 30 seconds. Other time intervals maybe used. When a user of the AR device is authenticated, each securityaccess code generated by the AR device is projected on a display screenof the AR device. When the user of the AR device enters the securityaccess code into an input device such as a keyboard of a clientcomputer, the security access code is sent to the server computer.

When the security access code generated by the AR device and enteredinto the input device matches a security access code generated on theserver computer, the user is permitted access to the server computer. Inone implementation, access to the server computer comprises displaying alogin screen on the input device, for example on a display screen of theclient computer. The user is then permitted to login to the servercomputer. The security access code provides an additional layer ofsecurity to the login process, in addition to a traditional user ID andpassword.

In some embodiments, the user views the security access code asdisplayed or projected on the AR device and manually enters the securityaccess code into the input device. However, in some implementations, theAR device may automatically populate the security access code on theinput device. For the implementations where the security access code isautomatically populated on the input device, a wireless communicationsession is established between the AR device and the input device. Thewireless communications session may use Bluetooth or a similar type ofwireless capability.

In some embodiments, the AR device may be used to generate securityaccess codes for a plurality of server computers or other electroniccomputing devices. A specific server computer to access may beidentified via optical recognition or via a verbal command at the ARdevice. The AR device may then generate a security access code that issynchronized with the specific server computer, as explained laterherein. By having a single AR device that can provide security accesscodes for a plurality of electronic computing devices, an AR deviceaccording to the present disclosure can replace standalone securityaccess code generating devices such as a hardware token. Security accesscode generating devices such as key fobs are typically configured toprovide security access code access to a specific electronic computingdevice. Security access code generating devices such as key fobs alsomay get lost or stolen.

In some embodiments, multiple levels of authorization are requiredbefore a security access code is displayed to the user. First, adetermination is made as to whether the AR device is an authorizeddevice. Second, a determination is made as to whether the wearer of theAR device is authorized to view the security access code. Third, adetermination is made as to whether the user, the wearer of the ARdevice, is authorized to view the security access code at a currentlocation of the user. In some implementations, all three levels ofauthorization are required before the security access code is displayedto the user on the AR device. In other implementations, fewer than thethree levels of authorization may be required or other levels ofauthorization may be required.

For the first level of authorization above, an AR device may need to beregistered before a security access code is displayed on the AR device.As one level of security, the determination as to whether the AR deviceis an authorized device may include determining whether the AR device isa registered device with an issuing company or an otherwise authorizeddevice.

For the second level of authorization above, verification is performedthat the wearer of the AR device is authorized to access the servercomputer. For example, it is possible that a user who is registered forthe AR device is authorized to access the server computer but that thewearer of the AR device is not the same person as the user who isregistered to access the server computer.

Authentication of the wearer of the AR device may be achieved by one ormore methods. The one or methods are typically biometric methods andinclude retinal scan, facial recognition, voice print and finger printscan. For example, in some implementations the AR device may store abiometric profile for the user of the AR device including one or more ofa retinal profile, a facial profile, a voice profile and a finger printprofile. In other implementations, the biometric profile may be storedelsewhere, for example on a server computer, and accessed via the ARdevice. Authentication occurs when data from one or more of the retinal,scan, facial recognition, voice print and finger print scan matches thebiometric profile for the user.

For the third level of authorization, verification may be performedregarding a security clearance for a specific location or geographicalarea. For example, a user may be authorized to access a server computer,but only from a company office. If a determination is made that the useris at a different location, for example at home, the user may not beauthorized to access the server computer from the different location. Asanother example, the user may have access to certain areas of a buildingbut may not have access to other areas of the building, for example aspecific laboratory. In some embodiments, the location of the user isdetermined based on the user's surroundings as captured by elements ofthe AR device (e.g., camera, microphone) and interpreted by a processorof the AR device using object recognition software. The determination ofthe location of the user may also be made by other means, such as globalpositioning system (GPS) software within the AR device,location-specific markers at the location or geographic area, or opticalcodes (e.g., barcodes or QR codes) on objects at the location orgeographic area that can be interpreted by the AR device.

In addition to using the systems and method to provide a security accesscode for accessing an electronic computing device such as a servercomputer, the systems and methods may also be used to provide securityaccess codes for other purposes. For example, the security access codegenerated by the AR device may be used to provide secure access to amobile banking application, for example to enable a transfer of moneybetween accounts. For example, if the money transfer is performed at acustomer's home, the security access code may permit the money transferto be enabled. The AR device may verify the identity of the user andverify that the money transfer is authorized to be made using the ARdevice. Other similar types of applications for a security access codeare possible.

The systems and methods of the present disclosure are generallydescribed for an AR device that may be worn or carried by a user. Anexample of and AR device that may be worn by the user is an AR headset.An example of an AR device that may be carried by the user is asmartphone or tablet computer that includes AR components such as aprocessor, display and camera and an AR software application.

The AR headset includes a wearable computer, a camera and an opticaldisplay. The wearable computer includes a wireless telecommunicationcapability, permitting a wireless connection between the wearablecomputer and one or more server computers. The wearable computer canalso include voice recognition capability, permitting the user to directthe wearable computer via voice commands. In addition, in someimplementations, the wearable computer also includes biometriccapability such as facial recognition, retinal scan capability, fingerprint and voice print capability. The optical display reflects projectedimages and also permits the user to see through the display.

One type of AR headset described in this disclosure is a smart glasstype of headset, similar to eyeglasses, which may be worn by the user.The user may view AR images in the glass portion of the headset. Anexample of a smart glass headset is Google Glass, from Google Inc. ofMountain View, Calif.

FIG. 1 shows an example system 100 that supports AR security access. Theexample system 100 includes an AR device 102, a security access codeinput device 106, a server computer 108 and a server computer 112.

AR device 102 may be an AR headset device, such as Google Glass or asmartphone or tablet computer with an AR software application. In someembodiments, the AR device 102 includes a security access code generator104. The security access code generator 104 generates security accesscodes that may be used to access server computer 108, server computer112 and other electronic computing devices, as discussed in more detaillater herein.

Security access code input device 106 is an electronic computing devicethat includes a data entry mechanism, such as a keypad, a keyboard or atouch screen. In some embodiments, the security access code input device106 is a computing device such as a client computer, a smart telephoneor a tablet computer. The security access code input device 106 may alsobe a standalone input device such as a keypad used to access a secureaccess area in a building, for example a laboratory.

In the embodiment shown, server computer 108 and server computer 112 areserver computers that have a security requirement for access above whatis required via from a user ID and password. For example the servercomputers may contain confidential or security information such that asecond level of access is required. More or fewer server computers maybe used.

In some embodiments, server computers 108 and 112 each also include asecurity access code generator. For example server computer 108 includessecurity access code generator 110 and server computer 112 includessecurity access code generator 114. Security access code generators 110and 114 are each synchronized with security access code generator 104,as explained in more detail later herein.

FIG. 2 shows example modules 200 of AR device 102. The AR device 102 isan electronic device. The example modules 200 include a camera 202, adisplay 204, electronics 206, GPS software 208 and security access codegenerator 104. The camera 202 is a camera that is built-in to AR device102. Display 204 is a display that is also built-in to AR device 102.Electronics 206 includes an electronic computing device with wirelesscapability. The wireless capability may include Bluetooth, radiofrequency identification (RFID), mobile telecommunications, Wi-Fi, orsimilar types of wireless capability. GPS software 208 can be a softwareapplication that may be installed on the mobile electronic device. WhenAR device 102 is an AR headset, camera 202, display, 204, electronics206 and GPS software 208 are part of the AR headset.

The security access code generator 104 provides security access codesfor a plurality of server computers and other electronic computingdevices. In some embodiments, the security access code generator 104 maygenerate security access codes via a software algorithm that may run onAR device 102. At least a portion of the software algorithm is of asimilar type to a software algorithm running on a server computer towhich access is desired. For example, at least a portion of the softwarealgorithm may correspond to a software algorithm running in securityaccess code generator 110 or security access code generator 114.

The software algorithm running on AR device 102 is synchronized with thesoftware algorithm running on the server computer to which access isdesired. One way in which synchronization may occur is by having aninternal clock on AR device 102 synchronized with an internal clock onthe server computer to which access is desired. The software algorithmmay be such that a time of day generated by the internal clock is usedby the software algorithm to generate a security access code. When theinternal clocks of AR device 102 and the server computer aresynchronized, the same security access code is generated on AR device102 at a specific time as another security access code generated on theserver computer at the same specific time. In this way the securityaccess codes generated on AR device 102 and on the server computer aresynchronized. Other methods of synchronization besides the use of aninternal clock are possible.

As stated earlier herein, the systems and methods permit access to aplurality of computing devices. One or more methods may be used todetermine which computing device is to be accessed. In one method, a GPSlocation of the user may be sufficient to determine which computingdevice is to be accessed. For example, there may be a computing deviceat the GPS location so that when the GPS location is identified, adetermination is made that the computing device at the GPS location isto be accessed. As another example, geo-fencing devices, beacons,devices that implement near-field communication, or otherintra-structure devices that communicate with AR device 102 can be usedto allow AR device 102 to determine the user's location. For example,near-field communication may be used within a building to determine whenAR device 102 is in close proximity with a near-field communicationdevice within the building.

In addition, object recognition may be used. For example there may bemultiple computing devices at a given GPS location, for example alocation of a business. AR device 102 may use object recognitionsoftware to identify a specific computing device at the given GPSlocation. For example, in some cases an identification of a computingdevice may be possible at a given GPS location by identifying a size,shape or other similar characteristic of the computing device. In othercases there may be an identifying tag or other identifier on thecomputing device. For example, the computing device may have a bar codeor other similar tag that may be identified via the object recognitionsoftware. AR device 102 can also use object recognition alone todetermine the user's location, without the need for GPS locationinformation or local geo-tracking devices.

As a further example, the computing device to be accessed maycommunicate identifying information directly to AR device 102. Forexample, as the user approaches the computing device to be accessed, ARdevice 102 may transmit a request to the computing device foridentifying information, or the computing device may detect AR device102 when AR device 102 is in proximity to the computing device.

Identification of the specific computing device to be accessed isimportant because, according to embodiments of the present disclosure,AR device 102 generates a security access code that can be usedspecifically with the computing device to be accessed. As discussed, thesecurity access code generator 104 includes a software application thatprovides security access codes for a plurality of computing devices. Theidentification of the specific computing device permits the securityaccess code generator 104 to provide a correct security access code forthe computing device to be accessed.

FIG. 3 shows a flowchart of a method 300 for generating a securityaccess code on an AR device, according to an embodiment of the presentdisclosure. In some embodiments, the AR device is an AR headset with acamera and optical display, similar to Google Glass. In someembodiments, the security access code is used as a first level of accessfor logging onto a server computer.

At operation 302, a security access code application is activated on theAR device. The security access code application permits the generationof security access codes that may be used as a first level of access fora plurality of electronic computing devices. In some embodiments, thesecurity access code application is activated via a voice command on theAR device. For example the user of the AR device may say “access code”or some other verbal command recognized by the AR device as a command toactivate the security access code application. Other ways to activatethe security access code application are possible, for example by theuser touching an area of the AR device or gesturing in front of the ARdevice with a gesture that is recognized as a request for a securityaccess code. In still further embodiments, the AR device automaticallyactivates the security access code application when the locationdetected by the AR device (e.g., based on object recognition, GPS data,and/or local tracking information) indicates the need for a securityaccess code.

At operation 304, the user of the AR device is identified, the userbeing a person who is wearing the AR device. In some embodiments, theuser is identified via a biometric identification method, such as one ormore of facial recognition, retina recognition, voice recognition orfinger print recognition.

At operation 306, a determination is made as to whether the user isauthorized to use the AR device to display a security access code. Firsta determination is made as to whether the AR device has been registeredor otherwise authorized to display the security access code. Next adetermination is made as to whether the user is authorized to view thesecurity access code.

At operation 306, when a determination is made the user is authorized toview the security access code on the AR device, at operation 308 anidentity of a current location of the user is determined. Theidentification of the current location of the user is determined by oneof several methods including obtaining a GPS location of the user and/oridentifying the location of the user via object recognition software onthe AR device.

At operation 306, when a determination is made that the user is notauthorized to view the security access code on the AR device, atoperation 320 a message is displayed on the AR device indicating thatthe user is not authorized to view the security access code on the ARdevice. In some embodiments, an alert is also sent to a registered userassociated with the AR device (if applicable), a security officer, orother predetermined person, that an unauthorized attempt has been madeto access the electronic computing device. The alert can be sent, forexample, via email or text message. In some embodiments, the alert issent after a predetermined number of failed access attempts by theunauthorized device.

At operation 310, an identity of a security access code input device ator near the current location of the user is determined. The securityaccess code input device may be a client computer, a standalone keypador another input device. The identity of the security access code inputdevice is obtained via one or more of object recognition of the securityaccess code input device or a knowledge of a specific security accesscode input device at the current location of the user.

At operation 312, an identity of an electronic computing device to beaccessed is identified. The electronic computing device to be accessed,for example server computer 108 or server computer 112, is an electroniccomputing device for which the security access code is to be applied.The electronic computing device may be identified via object recognitionof the electronic computing device is physically located at the currentlocation. The electronic computing device may also be identified fromknowledge of the identity of the user, a knowledge of which electroniccomputing devices the user is authorized to access and by the currentlocation of the user. Other ways to identify the electronic computingdevice to be accessed are possible.

At operation 314, a check is made as to whether the AR device isauthorized to provide a security access code for the electroniccomputing device at the current location. The check is made because someusers that may be authorized to use an AR device may only be authorizedto receive a security access code for an electronic computing device ata specific location, for example at a corporate location or in a certainarea of a building, for example to access a laboratory or high securityarea.

At operation 314, when a determination is made that the user isauthorized to receive a security access code for an electronic computingdevice on the AR device at the current location, at operation 316, theAR device generates a security access code for use in accessing theelectronic computing device. The security access code is generated usinga security access code generator on the AR device, for example securityaccess code generator 104 on AR device 102.

At operation 316, the security access code is displayed on the ARdevice. Typically, the security access code is projected via the displayon the AR device, so that the security access code appears as a virtualdisplay. In this way, the security access code is visible only to theuser of the AR device. In some embodiments, the user enters the securityaccess code into an input device in order to bring up a login screen forthe electronic computing device to be accessed. Alternatively, thesecurity access code provides access to the location secured by theinput device (e.g., vault, high security location, etc.). In someembodiments, the input device is a client computer, keypad, or otherelectronic computing device. In some implementations, the securityaccess code may be automatically populated on the input device.

At operation 314, when a determination is made that the user is notauthorized to receive a security access code for an electronic computingdevice on the AR device at the current location, at operation 320, amessage is displayed on the AR device indicating that the user is notauthorized to use the AR device for accessing the electronic computingdevice at the current location. Additionally, in some embodiments, analert can be generated in response to the unauthorized access asdescribed above.

As illustrated in the example of FIG. 4, the AR device 102 includes atleast one central processing unit (“CPU”) 402, a system memory 408, anda system bus 422 that couples the system memory 408 to the CPU 402. Thesystem memory 408 includes a random access memory (“RAM”) 410 and aread-only memory (“ROM”) 412. A basic input/output system that containsthe basic routines that help to transfer information between elementswithin the AR device 102, such as during startup, is stored in the ROM412. The AR device 102 further includes a mass storage device 414. Themass storage device 414 is able to store software instructions and data.A central processing unit, system memory and mass storage device similarto that in FIG. 4 are also included in server computers 108 and 112.

The mass storage device 414 is connected to the CPU 402 through a massstorage controller (not shown) connected to the system bus 422. The massstorage device 414 and its associated computer-readable data storagemedia provide non-volatile, non-transitory storage for the AR device102. Although the description of computer-readable data storage mediacontained herein refers to a mass storage device, such as a hard disk orsolid state disk, it should be appreciated by those skilled in the artthat computer-readable data storage media can be any availablenon-transitory, physical device or article of manufacture from which thecentral display station can read data and/or instructions.

Computer-readable data storage media include volatile and non-volatile,removable and non-removable media implemented in any method ortechnology for storage of information such as computer-readable softwareinstructions, data structures, program modules or other data. Exampletypes of computer-readable data storage media include, but are notlimited to, RAM, ROM, EPROM, EEPROM, flash memory or other solid statememory technology, CD-ROMs, digital versatile discs (“DVDs”), otheroptical storage media, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or any other medium which canbe used to store the desired information and which can be accessed bythe AR device 102.

According to various embodiments of the invention, the AR device 102 mayoperate in a networked environment using logical connections to remotenetwork devices through the network 420, such as a wireless network, theInternet, or another type of network. The AR device 102 may connect tothe network 420 through a network interface unit 404 connected to thesystem bus 422. It should be appreciated that the network interface unit404 may also be utilized to connect to other types of networks andremote computing systems. The AR device 102 also includes aninput/output controller 406 for receiving and processing input from anumber of other devices, including a touch user interface displayscreen, or another type of input device. Similarly, the input/outputcontroller 406 may provide output to a touch user interface displayscreen or other type of output device.

As mentioned briefly above, the mass storage device 414 and the RAM 410of the AR device 102 can store software instructions and data. Thesoftware instructions include an operating system 418 suitable forcontrolling the operation of the AR device 102. The mass storage device414 and/or the RAM 410 also store software instructions, that whenexecuted by the CPU 402, cause the AR device 102 to provide thefunctionality of the AR device 102 discussed in this document. Forexample, the mass storage device 414 and/or the RAM 410 can storesoftware instructions that, when executed by the CPU 402, cause the ARdevice 102 to provide a security access code for an electronic computingdevice at the location of the AR device 102.

Although various embodiments are described herein, those of ordinaryskill in the art will understand that many modifications may be madethereto within the scope of the present disclosure. Accordingly, it isnot intended that the scope of the disclosure in any way be limited bythe examples provided.

What is claimed is:
 1. A method involving an augmented reality (AR)electronic device, the method comprising: identifying a user of an ARelectronic device; identifying a current location of the user; enablinga security access code software application on the AR electronic device;generating a plurality of security access codes at the AR electronicdevice for permitting access to a plurality of protected assets; usingobject recognition functionality on the AR electronic device todistinguish an identified protected asset from the plurality ofprotected assets; identifying the identified protected asset from theplurality of protected assets physically located at the current locationof the user; identifying one of the plurality of security access codesthat can be used to access the identified protected asset; and using theone of the plurality of security access codes to gain access to theidentified protected asset.
 2. The method of claim 1, further comprisingautomatically transmitting the one of the plurality of security accesscodes to an input device associated with the protected asset.
 3. Themethod of claim 1, further comprising displaying the one of the securityaccess codes on a display device of the AR electronic device.
 4. Themethod of claim 3, further comprising displaying the one of the securityaccess codes on a headset of the AR electronic device.
 5. The method ofclaim 3, further comprising projecting from the AR electronic device animage of the one of the security access codes.
 6. The method of claim 1,further comprising identifying the one of the plurality of securityaccess codes by using the current location of the user.
 7. The method ofclaim 1, wherein a tag on the protected asset is identified using theobject recognition functionality.
 8. The method of claim 1, wherein theprotected asset is identified, using the object recognitionfunctionality, from a size or shape of the protected asset.
 9. Themethod of claim 1, further comprising using near-field communicationbetween the AR electronic device and the protected asset to determinewhen the AR electronic device is in close proximity of the protectedasset.
 10. The method of claim 9, further comprising receivingidentification information from the protected asset when the ARelectronic device is in close proximity of the protected asset.
 11. Anaugmented reality (AR) electronic device, comprising: a processing unit;and system memory, the system memory including instructions which, whenexecuted by the processing unit, cause the AR electronic device to:identify a user of an AR electronic device, the AR electronic deviceexecuting a security access code software application; identify acurrent location of the user; enable the security access code softwareapplication on the AR electronic device; generate a plurality ofsecurity access codes at the AR device for permitting access to aplurality of protected assets; use object recognition functionality onthe AR electronic device to distinguish an identified protected assetfrom the plurality of protected assets; identify the identifiedprotected asset from the plurality of protected assets physicallylocated at the current location of the user; identify one of theplurality of security access codes that can be used to access theidentified protected asset; and use the one of the plurality of securityaccess codes to gain access to the protected asset.
 12. The ARelectronic device of claim 11, further comprising causing the ARelectronic device to automatically transmit the one of the plurality ofsecurity access codes to an input device associated with the protectedasset.
 13. The AR electronic device of claim 11, further comprisingcausing the AR electronic device to display the one of the securityaccess codes on a display device of the AR electronic device.
 14. The ARelectronic device of claim 13, further comprising causing the ARelectronic device to display the one of the security access codes on aheadset of the AR electronic device.
 15. The AR electronic device ofclaim 13, further comprising causing the AR electronic device to projectfrom the AR electronic device an image of the one of the security accesscodes.
 16. The AR electronic device of claim 11, further comprisingcausing the AR electronic device to identify the one of the plurality ofsecurity access codes by using the current location of the user.
 17. TheAR electronic device of claim 11, further comprising causing the ARelectronic device to use near-field communication between the ARelectronic device and the protected asset to determine when the ARelectronic device is in close proximity of the protected asset.