Access to a wearable computing system using randomized input origins

ABSTRACT

Embodiments disclosed herein provide systems, methods, and computer-readable media for accessing a wearable computing system using randomized input origins for user login. In a particular embodiment, a method provides presenting a user with a first origin on which user login information is based, wherein the first origin is randomly selected from a plurality of possible origins. The method further provides, receiving first motion information from the user indicating a first position relative to the first origin that corresponds to a first element of the user login information. Upon receiving the user login information, the method provides determining whether the user login information authorizes the user to access the wearable computing system.

TECHNICAL FIELD

Aspects of the disclosure are related to wearable computing systems and,in particular, to providing secured access to wearable computingsystems.

TECHNICAL BACKGROUND

Computing devices are now compact enough that they can be easily carriedor even worn by their users. Form factors such as watches or braceletsand headsets or glasses are becoming more common. These form factorsallow a user to easily carry their devices almost anywhere. However, inmany cases, the type of input allowed by these devices is limited by theform factor that they take. For example, a watch face is quite small anddoes not allow much room for touch input. Likewise, a headset may nothave any type of input outside of voice recognition and a couplebuttons. Voice recognition in particular is not a private way ofentering information since others can potentially hear the input.Moreover, in noisy situations, voice input may not be interpretedaccurately by the wearable device.

The lack of input options on many wearable devices makes it difficult toprovide input for some purposes. One of those purposes is input as partof device security (e.g. password protecting the device). As such, manymanufacturers or users may choose to eschew device security to avoiddifficulties. Therefore, even if a user's phone or computer isprotected, that user's unsecured wearable device may provide access tomuch of the same information (e.g. emails, documents, etc.) and isvulnerable should it fall into the wrong hands.

OVERVIEW

Embodiments disclosed herein provide systems, methods, andcomputer-readable media for accessing a wearable computing system usingrandomized input origins for user login. In a particular embodiment, amethod provides presenting a user with a first origin on which userlogin information is based, wherein the first origin is randomlyselected from a plurality of possible origins. The method furtherprovides, receiving first motion information from the user indicating afirst position relative to the first origin that corresponds to a firstelement of the user login information. Upon receiving the user logininformation, the method provides determining whether the user logininformation authorizes the user to access the wearable computing system.

In some embodiments, the method provides, upon determining that the userlogin information authorizes the user to access the wearable computingsystem, allowing access to the wearable computing system by the userand, upon determining that the user login information does not authorizethe user to access the wearable computing system, preventing the userfrom accessing the wearable computing system.

In some embodiments, the access is allowed for a predefined period oftime after determining that the user login information authorizes theuser to access the wearable computing system.

In some embodiments, the access is allowed until the user removes thewearable computing system.

In some embodiments, the method provides presenting the user with asecond origin on which the user login information is based, wherein thesecond origin is randomly selected from the plurality of possibleorigins and receiving second motion information from the user indicatinga second position relative to the second origin that corresponds to asecond element of the user login information.

In some embodiments, the method provides receiving second motioninformation from the user indicating a second position relative to thefirst position that corresponds to a second element of the user logininformation.

In some embodiments, the method provides receiving input from the userindicating that the first motion information is complete.

In some embodiments, the method provides receiving input from the userindicating that the user login information is complete.

In some embodiments, presenting the user with the first origin comprisespresenting the first origin to the first user such that the first originis not presented to persons other than the first user.

In some embodiments, the plurality of possible origins comprises digitsfrom 0 through 9, the first origin comprises one of the digits, thefirst element comprises one of the digits, the first position relativeto the first origin comprises a number of digits in sequence between thefirst origin and the first element.

In another embodiment, a wearable computing system is provided. Thewearable computing system includes a user interface configured topresent a user with a first origin on which user login information isbased, wherein the first origin is randomly selected from a plurality ofpossible origins. The user interface is further configured to receivefirst motion information from the user indicating a first positionrelative to the first origin that corresponds to a first element of theuser login information. The wearable computing system further includes aprocessing system configured to determine whether the user logininformation authorizes the user to access the wearable computing systemupon receiving the user login information.

BRIEF DESCRIPTION OF THE DRAWINGS

Many aspects of the disclosure can be better understood with referenceto the following drawings. While several implementations are describedin connection with these drawings, the disclosure is not limited to theimplementations disclosed herein. On the contrary, the intent is tocover all alternatives, modifications, and equivalents.

FIG. 1 illustrates a wearable computing environment for accessing awearable computing system using randomized input origins.

FIG. 2 illustrates an operational scenario for the wearable computingenvironment to access a wearable computing system using randomized inputorigins.

FIG. 3 illustrates an operational scenario for the wearable computingenvironment to access a wearable computing system using randomized inputorigins.

FIG. 4 illustrates an operational scenario for the wearable computingenvironment to access a wearable computing system using randomized inputorigins.

FIG. 5 illustrates an operational scenario for the wearable computingenvironment to access a wearable computing system using randomized inputorigins.

FIG. 6 illustrates an example positioning of a wearable computing systemto access the wearable computing system using randomized input origins.

FIG. 7 illustrates an example display by a wearable computing system toaccess the wearable computing system using randomized input origins.

FIG. 8 illustrates an example display by a wearable computing system toaccess the wearable computing system using randomized input origins.

FIG. 9 illustrates an example display by a wearable computing system toaccess the wearable computing system using randomized input origins.

FIG. 10 illustrates a wearable computing device for accessing a wearablecomputing system using randomized input origins.

TECHNICAL DISCLOSURE

The ever shrinking size of computing systems, amount of power needed bythose computing systems, batteries to supply that power, etc. hasallowed computing systems to achieve form factors that can be worn by aperson at almost all times if that person so desires. Headsets andwatches are two of the more common form factors although other optionsare continually being designed. The size and configuration of thesewearable form factors tends to require input options beyond the typicalinterfaces provided by desktop/laptop computers, tablets, smartphones,and the like. For example, while a smart watch may have a screen, thatscreen is likely too small to effectively type onto a displayed touchkeypad. Likewise, a headset based system may only have one or two inputbuttons thereon for accepting input, which is far less than required bya typical keypad.

Like any computing system, a user of a wearable computing system likelydesires some sort of security that inhibits access to the computingsystem by unauthorized users. While login information, such as apasscode, is commonly used to secure access to larger computing systems(e.g. laptops, tablets, smartphones, etc.), the interfaces provided bymany wearable computing systems, as noted above, make entry of logininformation difficult. Moreover, even if a wearable computing systemwere to provide a voice type interface allowing the user to speak thelogin information, anyone positioned near enough to the user to hear theuser's voice may be able to hear the login information. The wearablecomputing device provided below therefore allows a user to enter logininformation in a manner that makes it difficult if not impossible forothers to glean the login information.

FIG. 1 illustrates wearable computing environment 100 for accessing awearable computing system using randomized input origins. Wearablecomputing environment 100 includes wearable computing system 101 anduser 131. Wearable computing system 101 includes presentation interface121 and motion interface 122.

In operation, user 131 carries or wears wearable computing system 101 ontheir person. Wearable computing system 101 may take the form of aheadset, eyeglasses, watch, bracelet, or some other form factor capableof being carried by user 131. Wearable computing system 101 may be anindependent device or may rely, at least in part, on another device. Forexample, wearable computing system 101 may be used to displaynotifications generated by applications on another system (e.g. a smartwatch displaying message notifications for messages received by asmartphone). Wearable computing system 101 may therefore include wiredor wireless communication interfaces, such as interfaces using TimeDivision Multiplex (TDM), Internet Protocol (IP), Ethernet,communication signaling, Code Division Multiple Access (CDMA), EvolutionData Only (EVDO), Worldwide Interoperability for Microwave Access(WIMAX), Global System for Mobile Communication (GSM), Long TermEvolution (LTE), Wireless Fidelity (WIFI), High Speed Packet Access(HSPA), or some other communication format—including combinationsthereof. In some cases, wearable computing system 101 may be aninterface for another computing system. For example, wearable computingsystem 101 may be a virtual reality headset component for a gamingsystem. In those cases, access gained to wearable computing system 101may also comprise access gained into the other computing system.

FIG. 2 illustrates a method 200 in an operational scenario for wearablecomputing environment 100 to access wearable computing system 101 usingrandomized input origins. In method 200, user 131 is presented with anorigin randomly selected from multiple possible origins (step 201). Theorigin may be presented to user 131 visually, audibly, tactually, orsome other way of presenting information to a user—includingcombinations thereof. The origin may be one of many possible charactersthat could make up login information for wearable computing system 101.For example, if the characters are letters of the alphabet, then theorigin may be a randomly selected one of the letters. Alternatively, theorigin may comprise an arrangement of possible characters. For example,at least a portion of the possible characters may be displayed to user131 at various positions in the display or relative to one another.Different origins will have different arrangements.

Method 200 further provides that motion information is received fromuser 131 indicating a position relative to the origin that correspondsto an element of user login information (step 202). The motioninformation may comprise movement of wearable computing system 101itself, which may correspond to a body part of user 131 to whichwearable computing system 101 is affixed. For example, a bracelet formfactor would cause wearable computing system 101 to move in conjunctionwith wrist and arm movements of user 131. Likewise, a headset formfactor would cause wearable computing system 101 to move in conjunctionwith head and neck movements of user 131. Alternatively, the motioninformation may comprise motion captured by wearable computing system101 or some system in communication with wearable computing system 101,such as hand movements, eye movements, etc. This captured motioninformation may be used on its own or in conjunction with motioninformation of wearable computing system 101 itself.

The user login information may include a username, passcode, or someother type of information needed for wearable computing system 101 toauthorize access to wearable computing system 101. The user logininformation may comprise just the one element indicated by step 202 ormay comprise multiple elements. Each element may comprise one or morecharacters of the login information. The ability of the motioninformation to indicate a position of the element may require user 131to know of each elements relative position if those relative positionsare not presented to user 131. For example, if the origin is a randomletter of the alphabet, then user 131 may be expected to know that therelative positions are listed alphabetically or user 131 may bepresented with information indicating that the elements arealphabetical. Expanding upon that example, if the origin is the letter“M” and the element is the letter “R,” then R is five letters away fromM in the alphabet. The motion information will therefore indicate fivepositions further down the alphabet. To make such an indication, themotion information may indicate five repeated motions (e.g. five headtilts, hand swipes, etc.), may indicate that a particular motion washeld for a period of time (e.g. five seconds with each secondcorresponding to a position further down the alphabet), or may use someother convention. In other examples where multiple elements are arrangedon a display as the origin, the motion information may indicate theposition of the element relative to that origin. For instance, if adesired element is in the upper-left corner of the display, then themotion information may indicate up and to the left.

Upon receiving the user login information, method 200 determines whetherthe user login information authorizes user 131 to access wearablecomputing system 101 (step 203). In some cases, the single elementobtained by step 202 may comprise the entirety of the user logininformation. However, in other cases, the element obtained by step 202may only be a portion of the user login information. In those cases,step 202 may need to be repeated to obtain additional elements beforestep 203 can determine whether the user login information authorizesuser 131 to access wearable computing system 101. Any method ofdetermining whether the user login information authorizes access foruser 131 may be used. For example, a method of authorizing user logininformation that was entered in a traditional manner, such as using akeypad, may also be used for the user login information obtained usingthe motion information described above. In some cases, wearablecomputing system 101 may make the determination on its own while inother cases wearable computing system 101 may be assisted by one or moreother systems (e.g. using a network based authentication system).

If the user login information authorizes user 131 to access wearablecomputing system 101, then wearable computing system 101 allows user 131to access wearable computing system 101. With access to wearablecomputing system 101, user 131 is able to use whatever functions ofwearable computing system 101 that is authorized by the user logininformation. In some cases, the access may include access to less thanthe full amount of wearable computing system 101's functions. The accessmay be governed by a time period after which user 131 must bereauthorized (e.g. immediately or some number of minutes after last useof wearable computing system 101), may be revoked when wearablecomputing system 101 is removed or taken off of user 131's person,revoked (or locked) at the direction of user 131 (e.g. pressing a lockbutton on wearable computing system 101), or some other way of limitingthe duration of access to wearable computing system 101.

If the user login information does not authorize user 131 to accesswearable computing system 101, then wearable computing system 101prevents or otherwise does not allow user 131 to access wearablecomputing system 101. User 131 may then be given the option to repeatmethod 200 in order to retry gaining access into wearable computingsystem 101. After a number of failed attempts, user 131 may be preventedfrom attempting to access wearable computing system 101 again.

In some examples, the access to wearable computing system 101 comprisesaccess to wearable computing system 101 as a whole. For instance, user131 may not be able to access any element of wearable computing system101's operating software (or any element beyond basic features such asemergency calling) without providing valid user login information. Inalternative examples, the access to wearable computing system 101comprises access to one or more individual applications. One specificexample may occur to authorize user 131 for access to an emailapplication executing on wearable computing system 101. Thus, even ifuser 131 already has access to other applications and features ofwearable computing system 101, wearable computing system 101 wouldperform method 200 to determine whether user 131 is authorized to accessthe email application. Moreover, in some examples, user 131 may berequired to provide user login information both when accessing wearablecomputing system 101 as a whole and when accessing the one or moreindividual applications. The user login information may be different forwearable computing system 101 as a whole and each individualapplication.

By using motion information to indicate digits from a random origin, aslong as the origin is presented in a manner that cannot be seen by otherpeople, those other people will not be able to ascertain the user logininformation from the motions of user 131. However, in some situations,user 131 may be located in an environment where they are not concernedabout other people figuring out their user login information (e.g. anempty room or a room with trusted people) and is suited to receive audioinput (e.g. low background noise level). For those situations, wearablecomputing system 101 may provide alternative means for entering the userlogin information. For instance, wearable computing system 101 may allowfor voice entry from user 131. Thus, if user 131 is comfortable doingso, user 131 may be able to speak the user login information rather thanproviding motion information (or may provide some combination thereof).This spoken input may provide elements of the user login informationrelative to the origin or may instead explicitly provide the elements.

FIG. 3 illustrates operational scenario 300 for wearable computingenvironment 100 to access wearable computing system 101 using randomizedinput origins. At step 1, presentation interface 121 presents an originto user 131. Presentation interface 121 may include one or more displays(e.g. opaque, transparent, projected, or otherwise), speakers, vibratingelements, lights, or some other type of component that can conveyinformation to a user—including combinations thereof. Accordingly, theorigin may be presented to user 131 in a visual manner, audible manner,tactile manner, or in some other manner of conveyinginformation—including combinations thereof. For example, the origin maybe “spoken” to user 131 through speakers instead of or in addition todisplaying the origin to user 131.

At step 2, motion interface 122 receives motion information indicating aposition relative to the origin of an element of user login information.Motion interface 122 may include one or more accelerometers, gyroscopes,cameras, eye tracking sensors, or some other type of component capableof sensing motion—including combinations thereof. Motion interface 122may also (or instead) include a communication interface for receivingmotion information captured by devices external to wearable computingsystem 101, such as room camera or gesture sensor.

In some examples, steps 1 and 2 repeat multiple times in order toprovide multiple elements of the user login information. Additionalmotion information may be received signifying that the motioninformation indicating the element has completed and that motioninformation indicating a next element is forthcoming. In response tothat additional motion information, steps 1 and 2 repeat to receive thatnext element. Similarly, once all elements of the user login informationare provided, further motion information may be received indicating thatthe user login information is complete and, hence, user 131 is finishedproviding elements of the user login information. In some embodiments,rather than using motion information, user 131 may use other userinterface elements such as hardware or software based buttons toindicate that a next element is to be entered or that the user logininformation is complete.

At step 3, wearable computing system 101 determines whether the receiveduser login information allows user 131 to access wearable computingsystem 101. For example, if the user login information includes ausername and passcode, then the passcode must match a stored passcodefor the username in order for user 131 to be allowed access. In someexamples, only a passcode, such as a personal identification number(PIN), may be needed to match a preset PIN in wearable computing system101. Regardless of the method used to determine whether the user logininformation authorizes user 131 to access wearable computing system 101,if authorized, user 131 is allowed to access functionality of wearablecomputing system 101.

FIG. 4 illustrates operational scenario 400 for wearable computingenvironment 100 to access wearable computing system 101 using randomizedinput origins. In scenario 400, user 131 is presented with a randomorigin by wearable computing system 101 (step 401). Once user 131 isaware of the origin, user 131 provides motion input that is received bywearable computing system 101 as motion information to indicate a firstelement of user login information (step 402). The first element mayinclude one or more characters that make up the user login information.Thus, in some embodiments, each element indicated by the user mayinclude multiple characters. For instance, a selection of characterpairings may be provided by the origin and the motion input indicatesone of those pairings.

After providing the first element, wearable computing system 101determines whether there are additional elements to be entered tocomplete the user login information (step 403). This determination maybe made by receiving additional input (motion or otherwise) from user131 indicating whether or not another element is to be provided, bydetermining that the number of elements already entered do or do not yetsatisfy a required number of elements for user login information, or bysome other way of establishing that the user login information is or isnot complete—including combinations thereof. If wearable computingsystem 101 determines that additional elements are to be entered,wearable computing system 101 returns to step 402 whereby additionalmotion input from user 131 provides additional motion information towearable computing system 101 indicating the next element of the userlogin information. When returning to step 402, the additional motioninformation may indicate the next element relative to the originallydisplayed origin or may indicate the next element relative to theelement indicated in the immediately preceding iteration of step 402(e.g. as may be the case if the motion information scrolled throughpossible elements). Alternatively, wearable computing system 101 mayreturn to step 401 wherein a new randomly selected origin is provided asa basis for the motion information indicating the next element.

Once step 403 has determined that no additional elements are to beentered for the user login information, wearable computing system 101determines whether the login information authorizes user 131 to accesswearable computing system 101 (step 404). If user 131 is allowed toaccess wearable computing system 101, then wearable computing system 101allows user 131 to access the functions authorized by the user logininformation. However, if the user login information does not allowaccess to user 131, wearable computing system 101 returns to step 401.Upon returning to step 401, the user login information may be cleared sothat user 131 must start from the first element to retry providing theuser login information. The user login information may not authorizeuser 131 to access wearable computing system 101 because user 131provided one or more of the user login information's elementsincorrectly, because the user login information is not correct forwearable computing system 101, or for some other reason that the userlogin information would not authorize user 131 to access wearablecomputing system 101.

FIG. 5 illustrates operational scenario 500 for wearable computingenvironment 100 to access wearable computing system 101 using randomizedinput origins. In scenario 500, wearable computing system 101 detectsthat wearable computing system 101 has been put on by user 131 (step501). For example, if wearable computing system 101 uses a eyeglassesform factor, then wearable computing system 101 detects that wearablecomputing system 101 was placed on user 131's face. The detection may beperformed based on information from proximity sensor of wearablecomputing system 101, information from a contact switch of wearablecomputing system 101, or some other way by which a wearable computingsystem may detect that the wearable computing system was puton—including combinations thereof.

In response to being put on, wearable computing system 101 performs oneof the methods or operational scenarios presented above to determinewhether user 131 is authorized to access wearable computing system 101(step 502). If user 131 is not authorized, then step 502 may repeat toallow user 131 to retry providing user login information. However, ifuser 131 is authorized, then wearable computing system 101 allows user131 to access wearable computing system 101 (step 503). In this example,user 131 is allowed to access wearable computing system 101 withouthaving to perform step 502 again as long as user 131 continues to wearwearable computing system 101.

At some point after user 131 is allowed to access wearable computingsystem 101, user 131 removes wearable computing system 101 from theirperson and wearable computing system 101 detects that wearable computingsystem 101 has been taken off (step 504). The same type of sensorinformation that was used to detect that wearable computing system 101was put on by user 131 may also be used to detect that wearablecomputing system 101 is taken off. Although, different types of sensorinformation may be used instead. Regardless, upon detecting thatwearable computing system 101 has been taken off, wearable computingsystem 101 locks out access to wearable computing system 101'sfunctionality (step 204). Therefore, when user 131 or any other userputs wearable computing system 101 back on, wearable computing system101 will repeat scenario 500 to authorize that user to access thedevice.

FIG. 6 illustrates an example positioning of wearable computing system601 to access the wearable computing system using randomized inputorigins. Wearable computing system 601 is an example of wearablecomputing system 101 in a headset or eyeglasses type form factor.Wearable computing system 601 is worn by user 631 in this example. User631 is shown in profile (631 a) and in straight on (631 b) views.Additionally, in relation to the two perspectives of user 631, arrows621 and 622 are provided to indicate how motions will be interpreted inrelation to wearable computing system 601. In this example, integerdigits are used as the elements of user login information for wearablecomputing system 601. Therefore, as shown by arrow 621, an upward motionwill increase the digit and a downward motion will decrease the digit.The upward motion could comprise user 631 tilting their head up, user631 moving their eyes to look upward, user 631 making a hand gesture inan upward direction, or some other upward type motion—includingcombinations thereof. The downward motion may comprise similar motionsthat are instead in a downward direction. Additionally, as shown byarrow 622, a motion to user 631's right enters user login information(i.e. submits the user login information for authorization) and a motionto user 631's left indicates that the motion(s) for the current digithas been completed and a new digit is to be entered. Like with theupward and downward motions, the left and right motions may comprisehead tilts, head turns, left/right eye movements, left/right handmovements, or some other type of left/right motion—includingcombinations thereof.

FIG. 7 illustrates display 701 in an example of what may be presentedwearable computing system 601 to access wearable computing system 601using randomized input origins. Display 701 may be opaque in that onlyitems displayed by display 701 can be seen by user 631 or may betransparent in that user 631 can also view at least a portion of user631's surrounding environment through display 701. In this example,display 701 asks user 631 to login to wearable computing system 601 andpresents a randomly selected origin digit 4 of the digits 0-9. Display701 further provides user 631 with basic indicators of what types ofmotion will have what effect on wearable computing system 601.Specifically, the up/down and left/right motions described in relationto arrows 621 and 622. However, in some examples, more or lessinformation may be provided to user 631 by display 701 along with theorigin.

User 631's user login information is a PIN set at 7264 for this example.Therefore, the first element of user 631's PIN is three positions awayfrom the origin of 4. Head nods and head turns are the motions thatcorrespond to the options presented by display 701. By nodding theirhead up and then back to level three times, the motion informationcaptured by wearable computing system 601 indicates three digits upwardfrom origin 4. Motion information captured by wearable computing system601 from user 631 turning their head to the left indicates that themotion information for the first element of the PIN (the digit 7) iscomplete and so that user 631 can begin providing motion information forthe next digit. In some examples, display 701 may change based on themotion information received to indicate to user 631 that the motioninformation was received and confirm how the motion information wasinterpreted by wearable computing device 631. For example, for each ofuser 631's upward nods to indicate the digit 7, the up arrow on display701 may highlight and the displayed digit may increase (i.e. from 4 to 5to 6 and then 7). In that way, user 631 is informed of their progresstowards the desired input digit. In other similar examples, user 631 maynot need to nod upward for each digit. Rather, user 631 may be able tokeep their head in an upward position as display 701 increases thedigits and then returns their head to level once the desired digit 7 isreached. Additionally, display 701 may display the already entereddigits of the PIN as user 631 provides motion information so that user631 is aware of their progress.

After user 631 has entered the digit 7 by turning their head to theleft, user 631 provides motion information for the digit 2. Before user631 begins providing motion information to designate the digit 2,display 701 may return to displaying the original origin of 4, mayselect a new random origin, or may continue from the previous digitentered, which in this case would be 7. In this example, display 701returned to displaying the origin 4. Therefore, to enter the digit 2,user 631 nods their head downward and back to normal two times beforeturning left to move onto providing the third digit. It should beunderstood that, if the motion information indicates going down indigits below 0 or up in digits above 9, then the digits may eithercircle back around (e.g. going down from 0 back to 9 or going up from 9back to 0) or may simply remain on 0 or 9 and not allow input to gobelow or above those respective digits.

After the digit 2 has been entered, user 631 similarly nods upward twiceto indicate the digit 6 from the origin of 4 and turns left to indicatethat the next digit will be entered. Now user 631 only needs to enterone final digit 4 into wearable computing device 631. Since 4 is alsothe origin, the digits do not need to be increased or decreased.Therefore, user 631 turns their head to the right to confirm 4 as thelast digit of the PIN and submit the PIN for authorization. In someexamples, user 631 may need to first turn their head left to enter 4 asthe digit and then turn right to submit the PIN for authorization.Regardless, since user 631 has entered their correct PIN 7264, user 631is allowed to access wearable computing device 631.

Advantageously, presenting user 631 with a random origin on display 701that cannot be seen by others means that no one but user 631 will knowthe origin from which the motion information indicates the PIN digits.Thus, for example, when someone else sees user 631 nod their head upwardthree times, that person does not know what digit the upward nods arebased upon and, consequently, will not know what digit is beingindicated by user 631. This allows user 631 to enter their PIN in plainview of other people without those people being able to determine thePIN. Moreover, as noted above, wearable computing system 601 may acceptalternative input should user 631 desire. Therefore, if the alternativeinput comprises voice input, user 631 may instead simply say “up” or“down” instead of providing motion input. This would maintain theanonymity of user 631's PIN when other people can still hear what user631 is speaking. Alternatively, if user 631 is not concerned with otherpeople being able to hear the PIN, user 631 may simply speak “7264.”

FIG. 8 illustrates display 801 in another example of what may bepresented by wearable computing system 601 to access wearable computingsystem 601 using randomized input origins. In this example, the possibledigits are 1-8 and user 631's PIN is still 7264. Alternatively, thepossible digits may be 0-9 but wearable computing system 601 did notinclude those in this origin because only 8 digit spots are provided. Ifuser 631's PIN included a 0 or a 9, then an origin including either orboth of those digits and not including digits that are not in user 631'sPIN would be selected instead. To provide their PIN with respect to theorigin displayed by display 801, user 631 is able to nod or turn theirhead in 8 different directions instead of the four different directionsprovided by arrows 621 and 622 in the example above. To avoid inputerrors, user 631 may need to hold in a certain position for an amount oftime (e.g. 1 second) while a digit/arrow is highlighted before thatdigit is entered as part of the PIN. This allows user 631 to adjusttheir movement to select the correct digit if necessary.

Accordingly, to enter user 631's PIN, user 631 first nods their headdown and to the left to provide the motion information corresponding tothe digit 7. User 631 then nods up and to the left for the digit 2, nodsup and to the right for the digit 6, and turns to the right for digit 4.Since there is no motion for entering or submitting the final PIN inthis example, wearable computing device 631 determines whether the PINis authorized upon receiving the fourth digit. In other examples, theorigin may change between digit entries to further ensure onlookerscannot determine the digits being selected by user 631's head movements.For example, after entering the digit 7, the origin may change so thatthe numbers are in different positions. Thus, in the origin subsequentto entering the digit 7, the digit 2 may be in a different position andrequire a movement other than up and to the left to be indicated by themotion information.

FIG. 9 illustrates display 901 in another example of what may bepresented by wearable computing system 601 to access wearable computingsystem 601 using randomized input origins. In this example, user 631'sPIN is still 7264. Each element of user 631's PIN includes two digitsinstead of just one. Specifically, the origin displayed by display 901includes the two digit sequences of user 631's PIN, 72 and 64, whileshowing random other digit sequences in the remaining spots. To entertheir PIN, user 631 therefore turns their head to the right and thennods their head downward to provide motion information corresponding to72 and then 64. In alternative examples, the origin may change afterentering a digit sequence. Thus, 64 may not be displayed in the firstorigin but is displayed in the second origin, which is presented aftermotion information indicating 72 is received.

It should be understood that the above examples could also apply tocharacters other than digits, such as letters of the alphabet. Moreover,while wearable computing system 601 takes a glasses type form factor inthe above example, other form factors could use similar inputtechniques. For example, if wearable computing system 601 took a watchor bracelet type form factor, then wrist movements instead of headmovements would be used to provide motion information (e.g. a wrist turnin one direction increased the digit while a wrist turn in the otherdirection decreases the digit).

FIG. 10 illustrates wearable computing system 1000. Wearable computingsystem 1000 is an example of wearable computing system 101, althoughsystem 101 could use alternative configurations. Wearable computingsystem 1000 comprises communication interface 1001, user interface 1002,and processing system 1003. Processing system 1003 is linked tocommunication interface 1001 and user interface 1002. Processing system1003 includes processing circuitry 1005 and memory device 1006 thatstores operating software 1007. Wearable computing system 1000 mayinclude other well-known components such as a battery and enclosure thatare not shown for clarity. Wearable computing system 1000 may be apersonal computer, tablet, application server, conferencing system,private branch exchange, or some other computing apparatus—includingcombinations thereof. In some examples, wearable computing system 1000may be replicated across multiple locations in order to distribute theprocessing load required to function as described herein.

Communication interface 1001 comprises components that communicate overcommunication links, such as network cards, ports, RF transceivers,processing circuitry and software, or some other communication devices.Communication interface 1001 may be configured to communicate overmetallic, wireless, or optical links. Communication interface 1001 maybe configured to use TDM, IP, Ethernet, optical networking, wirelessprotocols, communication signaling, or some other communicationformat—including combinations thereof.

User interface 1002 comprises components that interact with a user toreceive user inputs and to present media and/or information. Userinterface 1002 may include one or more accelerometers, gyroscopes, eyetracking sensors, or other type of component capable of sensingmotion—including combinations thereof. User interface 1002 may furtherinclude a speaker, microphone, buttons, lights, display screen, touchscreen, touch pad, scroll wheel, communication port, or some other userinput/output apparatus—including combinations thereof. User interface1002 may be omitted in some examples.

Processing circuitry 1005 comprises microprocessor and other circuitrythat retrieves and executes operating software 1007 from memory device1006. Memory device 1006 comprises a non-transitory storage medium, suchas a disk drive, flash drive, data storage circuitry, or some othermemory apparatus. Processing circuitry 1005 is typically mounted on acircuit board that may also hold memory device 1006 and portions ofcommunication interface 1001 and user interface 1002. Operating software1007 comprises computer programs, firmware, or some other form ofmachine-readable processing instructions. Operating software 1007includes element entry module 1008 and authorization module 1009.Operating software 1007 may further include an operating system,utilities, drivers, network interfaces, applications, or some other typeof software. When executed by processing circuitry 1005, operatingsoftware 1007 directs processing system 1003 to operate wearablecomputing system 1000 as described herein.

In particular, element entry module 1008 directs processing system 1003to present a user with a first origin on which user login information isbased, wherein the first origin is randomly selected from a plurality ofpossible origins. Element entry module 1008 further directs processingsystem 1003 to receive first motion information from the user indicatinga first position relative to the first origin that corresponds to afirst element of the user login information. Upon receiving the userlogin information, authorization module 1009 directs processing system1003 to determine whether the user login information authorizes the userto access wearable computing system 1000.

The included descriptions and figures depict specific implementations toteach those skilled in the art how to make and use the best option. Forthe purpose of teaching inventive principles, some conventional aspectshave been simplified or omitted. Those skilled in the art willappreciate variations from these implementations that fall within thescope of the invention. Those skilled in the art will also appreciatethat the features described above can be combined in various ways toform multiple implementations. As a result, the invention is not limitedto the specific implementations described above, but only by the claimsand their equivalents.

What is claimed is:
 1. A method of accessing a wearable computing systemusing randomized input origins for user login, the method comprising:presenting a user with a first origin on which user login information isbased, wherein the first origin is randomly selected from a plurality ofpossible origins and wherein each origin of the plurality of possibleorigins indicates to the user a plurality of possible positions,relative to the origin, that each correspond to a possible element ofthe user login information; receiving first motion information from theuser indicating a first position relative to the first origin thatcorresponds to a first element of the user login information, whereinthe first element comprises a first character of a passcode included inthe login information and the first character is displayed at the firstposition; and upon receiving the user login information, determiningwhether the user login information authorizes the user to access thewearable computing system.
 2. The method of claim 1, further comprising:upon determining that the user login information authorizes the user toaccess the wearable computing system, allowing access to the wearablecomputing system by the user; and upon determining that the user logininformation does not authorize the user to access the wearable computingsystem, preventing the user from accessing the wearable computingsystem.
 3. The method of claim 2, wherein the access is allowed for apredefined period of time after determining that the user logininformation authorizes the user to access the wearable computing system.4. The method of claim 2, wherein the access is allowed until the userremoves the wearable computing system from their person.
 5. The methodof claim 1, further comprising: presenting the user with a second originon which the user login information is based, wherein the second originis randomly selected from the plurality of possible origins; andreceiving second motion information from the user indicating a secondposition relative to the second origin that corresponds to a secondelement of the user login information.
 6. The method of claim 1, furthercomprising: receiving second motion information from the user indicatinga second position relative to the first position that corresponds to asecond element of the user login information.
 7. The method of claim 1,further comprising: receiving input from the user indicating that thefirst motion information is complete.
 8. The method of claim 1, furthercomprising: receiving input from the user indicating that the user logininformation is complete.
 9. The method of claim 1, wherein presentingthe user with the first origin comprises presenting the first origin tothe first user such that the first origin is not presented to personsother than the first user.
 10. The method of claim 1, wherein theplurality of possible origins comprises digits from 0 through 9, thefirst origin comprises one of the digits, the first element comprisesone of the digits, the first position relative to the first origincomprises a number of digits in sequence between the first origin andthe first element.
 11. A wearable computing system accessible usingrandomized input origins for user login, the wearable computing systemcomprising: a user interface configured to present a user with a firstorigin on which user login information is based, wherein the firstorigin is randomly selected from a plurality of possible origins andwherein each origin of the plurality of possible origins indicates tothe user a plurality of possible positions, relative to the origin, thateach correspond to a possible element of the user login information, andreceive first motion information from the user indicating a firstposition relative to the first origin that corresponds to a firstelement of the user login information, wherein the first elementcomprises a first character of a passcode included in the logininformation and the first character is displayed at the first position;and a processing system configured to determine whether the user logininformation authorizes the user to access the wearable computing systemupon receiving the user login information.
 12. The wearable computingsystem of claim 11, further comprising: the processing system configuredto allow access to the wearable computing system by the user upondetermining that the user login information authorizes the user toaccess the wearable computing system and prevent the user from accessingthe wearable computing system upon determining that the user logininformation does not authorize the user to access the wearable computingsystem.
 13. The wearable computing system of claim 12, wherein theaccess is allowed for a predefined period of time after determining thatthe user login information authorizes the user to access the wearablecomputing system.
 14. The wearable computing system of claim 12, whereinthe access is allowed until the user removes the wearable computingsystem from their person.
 15. The wearable computing system of claim 11,further comprising: the user interface configured to present the userwith a second origin on which the user login information is based,wherein the second origin is randomly selected from the plurality ofpossible origins, and receive second motion information from the userindicating a second position relative to the second origin thatcorresponds to a second element of the user login information.
 16. Thewearable computing system of claim 11, further comprising: the userinterface configured to receive second motion information from the userindicating a second position relative to the first position thatcorresponds to a second element of the user login information.
 17. Thewearable computing system of claim 11, further comprising: the userinterface configured to receive input from the user indicating that thefirst motion information is complete.
 18. The wearable computing systemof claim 11, further comprising: the user interface configured toreceive input from the user indicating that the user login informationis complete.
 19. The wearable computing system of claim 11, wherein theuser interface configured to present the user with the first origincomprises: the user interface configured to present the first origin tothe first user such that the first origin is not presented to personsother than the first user.
 20. The wearable computing system of claim11, wherein the plurality of possible origins comprises digits from 0through 9, the first origin comprises one of the digits, the firstelement comprises one of the digits, the first position relative to thefirst origin comprises a number of digits in sequence between the firstorigin and the first element.