Method and system for securing the entry of data to a device

ABSTRACT

Crypto-glasses include systems that implement a method of authentication of users by blinking, the crypto-glasses including a frame configured so as to be worn by a user, a processor, a display device communicating with the processor so as to dynamically display data, and a communication unit, as executed by the processor, to execute the method of authentication by transmitting data to the display device for performing the authentication of the user to interact with the display device. The communication unit is configured to display in an optical unit of the crypto-glasses a key map which correlates data input into the display device with keys of the display device, the key map indicating data different from that of the keys of the display device.

The present application is a Continuation application of U.S. patentapplication Ser. No. 13/863,255, filed on Apr. 15, 2013, the entirecontent of which is incorporated herein by reference.

FIELD OF THE INVENTION

The present invention generally relates to a system and method forsecuring the entry of data to a device.

DESCRIPTION OF THE RELATED ART

Conventional devices into which passwords are entered, and especiallydevices where passwords are entered into a display such as smartphones,ATMs, etc., have many characteristics which make passwords and otherauthentication data vulnerable when being entered.

For instance, the smartphone may reveal each character on the displayfor a second or two during entry. Additionally, when a key is pressed onthe screen of a smartphone the user is often given a visible cueindicating that the particular character has been pressed. The visiblecue can take many possible forms such as a magnification of thecharacter on the keypad, changing the color of the character on thekeypad, movement of the character selected, etc. These visibleindications of which characters are being entered can enable someone tosteal the password by simply reading the password as it is entered.

In addition, on a smartphone the displayed keyboard normally hassignificantly fewer keys than a conventional keyboard. Therefore, entryof the characters on the on-screen keypad divulges possible characterpositions. For example, with a simplified keyboard it is not difficultto determine which character has been pressed by observing theoperator's hands and location on the display, which the operatorpresses. Further compounding this problem is that the keypad displayedmay vary depending on the character type being entered. Such a featurecan reveal when the user types a number, lowercase or uppercasecharacter, symbol, etc, further increasing the ability of an onlooker tojudge which character is being entered.

Even when the actual entering of the password is not observed, thesecurity of the password may still be degraded by residual marks left onthe screen by the operator (e.g., “fingerprints”). Such fingerprints mayreveal the password information entered by the location of the keyspressed or the path of a finger as it moved on the screen.

The environment in which a password is entered may further amplify thepassword's vulnerability to detection. Such environmental factors may beanything from a reflective surface to aid an on-looker, to securitycameras, which record the password as it is entered, etc.

All of these issues weaken the security provided by a password enteredinto a device such as a smartphone, ATM, etc.

Therefore, it is insecure (i.e., non-secure) to enter passwords onto asmartphone. As a result, a smartphone, or other display device, isrendered insecure which makes the smartphone undesirable to use inaccessing sensitive data.

While the above problems have been described in terms of a smart phone,the basic problem also applies everything from tablets, laptops,computer keyboards, ATMs, etc., or any device where a code is manuallyentered.

SUMMARY OF THE INVENTION

In view of the foregoing, and other, exemplary problems, drawbacks, anddisadvantages of the conventional systems, it is an exemplary feature ofthe present invention to provide a device and method that allows secureentry of information into a device.

It is, therefore, an exemplary feature of the present invention toprovide a structure and method for more securely entering passwords andauthentication codes into a device.

An exemplary aspect of the invention is embodied as a method of enteringdata into a device. The method includes displaying in glasses a key mapwhich correlates data input into the device with keys of the device, thekey map indicating data different from that of the keys of the device.

An exemplary aspect of the invention may include transmitting the keymap from the device to the glasses, and selecting the key, entering intothe device the data indicated by the key map when the corresponding keyis pressed.

An exemplary aspect of the inventive the device includes a display, andthe display displays the keys of the device.

An exemplary aspect of the invention is embodied where the keysdisplayed on the device are blank.

An exemplary aspect of the invention is embodied where the keysdisplayed on the device are encrypted.

In an exemplary aspect of the invention, the keys are displayed on thedevice form a keyboard, and the keys are scrambled from a normalposition on the keyboard.

An exemplary aspect of the invention may include generating the key mapwith the device and transmitting the key map to the glasses.

In another exemplary aspect of the invention, the key map may begenerated with the glasses and transmitted to the device.

An exemplary aspect of the invention may include changing the key mapupon occurrence of a predetermined event.

An exemplary aspect of the invention may include encrypting the key mapprior to transmitting the key map to the glasses.

An exemplary aspect of the invention may include changing the key mapafter each key press.

An exemplary aspect of the invention may include communicatinginformation relating to the key map with headphones.

An exemplary aspect of the invention may include communicating the dataentered into the device with headphones.

An exemplary aspect of the invention may include transmittinginformation relating to the key map with headphones.

An exemplary aspect of the invention is embodied as a method ofauthenticating including providing glasses, recording, with the glasses,a blink sequence performed by a user, converting the blink sequence intodata, and entering the data corresponding to the blink sequence into adevice.

In another exemplary aspect of the invention, the blink sequence is usedas Morse code.

An exemplary aspect of the invention includes displaying a blinking keyto the user with the glasses, the blinking key correlating blinkpatterns to characters to be entered into the device.

An exemplary aspect of the invention includes setting the blink sequenceto correspond to a password prior to the recording of the blink sequenceperformed by the user.

In an exemplary aspect of the invention, recording the blink sequenceincludes displaying a map of characters associated with different blinksequences, recording a first blink sequence performed by the user,displaying a map of a sub-set of characters associated with differentblink sequences based on the first blink sequence, recording a secondblink sequence performed by the user corresponding to the sub-set ofcharacters.

An exemplary aspect of the invention is embodied as crypto-glassesincluding a frame configured so as to be worn by a user, a processor, adisplay device communicating with the processor so as to dynamicallydisplay data, a communication unit connected to the processor andconfigured so as to transmit data to a device performing anauthentication. The data includes a key map that correlates data inputinto the device with keys of the device, the key map indicating datadifferent from that visually indicated by the keys of the device.

In an exemplary aspect of the invention, the key map is generated by thedevice to be authenticated and transmitted the crypto-glasses.

In an exemplary aspect of the invention, the display device includes aprojector configured so as to project an image on a lens of thecrypto-glasses.

In an exemplary aspect of the invention, a new key map is generatedafter a predetermined event.

In an exemplary aspect of the invention, a new key map is generatedafter every key press.

An exemplary aspect of the invention is embodied as crypto-glassesincluding a frame configured so as to be worn by a user, a processor, acamera disposed so as to record physical gestures of the user, acommunication unit connected to the processor and configured so as totransmit data to a device performing an authentication.

In an exemplary aspect of the invention, the physical gestures includeblinking performed by the user.

An exemplary aspect of the invention includes a display devicecommunicating with the processor so as to dynamically displayinformation.

In an exemplary aspect of the invention, the data includes a blinkingkey, the blinking key correlating blink patterns to characters to beentered into the device performing the authentication.

In an exemplary aspect of the invention, the processor correlates thephysical gestures with characters and transmits the characters to thedevice performing the authentication.

The above aspects may provide enhanced security when performing anauthentication with a display device.

In addition, while the exemplary embodiments are described inrelationship to a conventional smartphone, the invention and methodapplies to tablets, laptops, military goggles, ATMs, and any othersystem into which an authentication code must be entered.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing and other purposes, aspects and advantages will be betterunderstood from the following detailed description of exemplarynon-limiting embodiments of the invention with reference to thedrawings, in which:

FIG. 1 illustrates an exemplary embodiment of the crypto-glasses and asmartphone;

FIGS. 2A and 2B illustrate exemplary methods of generating andtransmitting of a key map;

FIG. 3A illustrates an exemplary keyboard as seen on a smartphone and akey map provided by the crypto-glasses;

FIG. 3B illustrates another exemplary keyboard as seen on a smartphoneand a key map provided by the crypto-glasses;

FIG. 4 illustrates an exemplary table of blinking values;

FIG. 5 illustrates another exemplary table of blinking values;

FIG. 6 illustrates a method of authenticating using blinking; and

FIG. 7 illustrates a method of creating credentials based on a blinkpattern.

DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS OF THE INVENTION

FIG. 1 illustrates an exemplary embodiment of the invention whichincludes a pair of crypto-glasses 1 having a frame 10 to facilitate wearas well as a processor 9 and a display unit 2 for transmitting to theuser visual information or cues related to data entry into device 3. Ofcourse, the invention can be applied to any form of eyewear (e.g.,single window goggles, monocle, military goggles, etc.).

The crypto-glasses 1 are used in the interaction with a display deviceinto which data is to be entered. In an exemplary embodiment, thedisplay device may be a device that includes a display into which datais entered such as a smartphone, tablet, etc. For simplicity, exemplaryaspects of the invention are described in relation to a smartphone 3 asthe display device. However, the invention may be used in conjunctionwith any device into which data is entered.

In operation, display unit 2 of crypto-glasses 1 may show a key map orother information with which user can identify which key of thesmartphone 3 (for example which key displayed on a smartphone screen),corresponds to the character the user wishes to enter into thesmartphone 3.

The type of display unit 2 used in the crypto-glasses 1 is notparticularly limited and may be any type of display that can adequatelyshow the user the desired key mapping data (password key). Such adisplay unit 2 may be anything from a device which projects the imageonto a lens 5 of the crypto-glasses to a display screen disposed whereit may be seen, either on the lens or otherwise. The image may beprojected anyway as long as it is visible to the user only. Forinstance, the image may appear to be floating at any perceivabledistance from the user.

In the system of FIG. 1, communication between crypto-glasses 1 andsmartphone 3 occurs wirelessly through communication unit 8. Thecommunication may be conducted over an encrypted connection foradditional security. However, the communication method used is notparticularly limited and may be, for example, Bluetooth, near fieldcommunication (NFC) or any appropriate wired or wireless system.

In one aspect of the invention, the crypto-glasses 1 receive theencrypted display information from smartphone 3, decrypt the displayinformation, and show the user the display information (such as a keymap) through the use of display unit 2 in crypto-glasses 1. Forinstance, as illustrated in FIG. 2A, the smartphone 3 may generate theactual location of the characters corresponding to the keys (e.g., a keymap) (S1) and transmit the key map to crypto-glasses 1 (S2). Thecrypto-glasses 1 then transmit the key map information to the user (S3)and the user enters the authentication data based on the key map (S4).However, as illustrated in FIG. 2B, exemplary embodiments may also allowthe crypto-glasses 1 to generate the key map (S2-1) and transmit thedisplay information and actual key location (e.g., key map) to thesmartphone 3 (S2-2). The crypto-glasses 1 then transmit the key mapinformation to the user (S2-3) and the user enters the authenticationdata based on the key map (S2-4).

In one embodiment, processing of encryption would be done on thesmartphone 3. The crypto-glasses 1 decrypts the encrypted displayinformation, whether or not the encrypted data is transmitted to thecrypto-glasses 1, and displays it for the user. Another method for thecrypto-glasses 1 to receive encrypted data displayed on the smartphone 3is by the process of optical character recognition or by other means.Preferably, any interaction originating from the crypto-glasses 1 thatwould be sent to the smartphone 3 or some other device is encrypted atthe crypto-glasses 1, if encryption is needed. The receiving device thendecrypts the information. Data transmission may occur as required by theencryption or mapping protocol used above. In addition, in oneimplementation, for each character, the keyboard mapping changes and anew mapping is transmitted to the crypto-glasses 1.

In practice, processing may be done at either the crypto-glasses 1 orthe smartphone 3 or the processing may be done at both thecrypto-glasses 1 and the smartphone 3. By processing at both thecrypto-glasses 1 and the smartphone 3 so that security may not becompromised. In addition, in exemplary embodiments the data transferredmay always be encrypted so that a nearby device may not just “sniff” thecommunication.

In operation, display unit 2 of the crypto-glasses 1 may display akeypad illustrating the keys corresponding to the actual characterentered by the key displayed on the smartphone 3. For example, display 4may show a key having the character “G” while the character entered bypressing that key will instead be “H”. Meanwhile, the display unit 2 ofcrypto-glasses 1 will display a key map illustrating that the key “G” ondisplay 4 is actually key “H”. This may be accomplished by providing anillustration of a keypad with the actual corresponding keys by displayunit 2 in crypto-glasses 1 to the user or by virtually overlaying “H” onthe “G” key of display 4 as seen through the lens of crypto-glasses 1.This method is not limited to the exemplary embodiments above and mayinclude any approach that makes it clear to the user as to what isactually being entered by means of the key map.

The actual image/method used to convey the key map information to theuser is not particularly limited. For instance, the display unit 2 mayshow a key map in a table form, or some other form, which communicatesto the user which character(s) are associated with which key on thedisplay such as G→H.

When a password is to be entered into the smartphone 3, a display screen4, such as a touch screen of smartphone 3, displays a blank keypad or akeypad with encrypted characters. The method of encryption for thedisplayed characters may vary. For instance, the character displayed ona key may differ with the actual character the key corresponds to whenactivated or “pressed” by a user. The location of the displayedcharacters may also be scrambled from that of a normal keypad. Oneexample of communicating the correct (mapped) keyboard to the user isdisplaying the “actual” keyboard with the crypto-glasses so that usercan correlate an actual character with the encrypted character or keylocation. In addition, combinations of pressed keys can also be mappedto a character.

Examples of a displayed scrambled keypad and the actual keyscorresponding to the display (key map) are shown in FIGS. 3A and 3B. Forinstance, in the embodiment of FIG. 3A, if the “S1” is pressed on thesmartphone display 4, an “a” will actually be entered.

FIG. 3B illustrates another means of encryption where (p, n) is theprivate RSA key, (g, n) is the public key, and r is a random numbergreater than 1. Of course, any encrypting concept may be used on the keymap displayed with the crypto-glasses 1 and smartphone display 4.

In addition, the position of the keys, displayed on the smartphone 3and/or the actual location of the keys, can be reshuffled. Thereshuffling of the keys may occur after every key press or some otherinterval. Since the actual key locations are not displayed on display 1,and the position of the key pressed may not correspond with the normalposition, an observer may not be able to discern the password. Further,if the keys are reshuffled, such as after every key entry, it will bemore difficult for an observer to decipher which position relates towhich key after a number of characters have been entered.

Embodiments of crypto-glasses 1 may also include a headphone(s) 7 orother biometric mechanisms. Headphones 7 can be used to provide the useraudible information as to which keys correspond to which actual letteror some other information to facilitate entry of the password on display4. In addition, the headphones 7 may recite the actual key entered whenthe user “presses” a key on the display 4. This enables a user to knowthat the correct key has been entered without the need to display theentered key on display 4. The headphones 7 may communicate directly tothe display device 4 or to crypto-glasses 1. The method of communicationis not particularly limited. For instance, the communication may beperformed wirelessly through an encrypted signal. In addition, theactual key entered may be displayed to the user with the crypto-glasses1.

In an aspect of the invention, in order to add another layer ofsecurity, after the user enters a character into smartphone 3, thesmartphone 3 may send out another code to the crypto-glasses orheadphones. The crypto-glasses 1 or headphones 7 decrypt thecommunication and transmits the code to the user. The user then speaksor types the code to/on the smartphone 3, adding another layer ofsecurity.

In another aspect of the invention, crypto-glasses 1 are used inconjunction with a “physical” keyboard (e.g., a keyboard for acomputer). For example, crypto-glasses 1 may show a user the key map forthe standard keyboard so as to allow secure entry of data. In thisinstance, the normal keys can correspond to different actual characterswhen pressed. For increased security, the key map can be reshuffledafter every key entry or some other period. Thus, data entry using aphysical keyboard of a computer can be made secure.

Through the use of a key map visible only to the wearer of thecrypto-glasses, secure entry of passwords may be obtained. This in turnmay allow a display device, such as a smart phone, to be made suitablefor accessing secure information.

Another exemplary embodiment of the invention includes a pair ofcrypto-glasses 1, which communicates with a smartphone 3 as discussed inthe previous embodiments. In this exemplary embodiment the user entersthe password by a physical gesture, such as blinking (e.g., sequence,specific eye or duration), eye movement, hand gestures, etc., which isdetected by crypto-glasses 1.

The smartphone 3 may decrypt the output of crypto-glasses 1 and blinkdecoding. For example, smartphone 3 may correlate the blink or blinksequence to a table in order to determine the character or word that theblink or blink sequence corresponds to.

In an exemplary operation of crypto-glasses 1, a user blinks accordingto the password to be entered into smartphone 3 and the mapping betweenblinks and characters/words. Crypto-glasses 1 then encrypts the blinkpattern and transmits the pattern to smartphone 3 directly or via someother device such as headphones 7. The smartphone 3 then decrypts thepattern by using a conversion table for blinks to characters/words.Crypto-glasses 1 may display on display unit 2 a blinking keycorrelating blink patterns with characters/words.

Many different gestures or blink patterns may be used to enter data.Such exemplary systems can range from using Morse code to entercharacters, through long/short or left right blinks for example, blinkmaps relating blink patters to characters, and/or using blinks as aselection method.

For instance, as illustrated in FIG. 4, blink signals may bedifferentiated by using left versus right eye, an open eye versus apartially open eye, long versus short blinks, or some other combination.

As shown in FIG. 5, a group of possible characters is selected and thenthe individual character is selected. This may, for example, be done bygoing through (“scrolling”) the options until the correct character isreached, and then another blink would select the unique character. Ofcourse, many other deviations are possible. This could also be done in ahierarchical system where a group is selected, and then another blinktype selects an actual character or further subgroup. In other words, ablink can correspond to a group of characters, a single character, or ahierarchical group election.

FIG. 6 illustrates an exemplary flowchart of a method of processingblinks into a password.

As shown in FIG. 6, a physical gesture(s) is performed (S3-1). Thisgesture is detected by the glasses 1 by a camera 6, motion sensor, or bysome other detection means (S3-2). The input from the camera isconverted into “unmapped credentials” (S3-3). The unmapped credentialsare then mapped to produce mapped credentials (S3-4). These mappedcredentials (S3-5 a), along with optional traditional credentials (S3-5b) form the final credentials (S3-6).

Additionally, in an exemplary embodiment, the crypto-glasses 1,smartphone 3, or another device/application may have the password storedin encrypted memory. In this example, a series of blinks correspondingto one or more characters is entered and the appropriate device discernsif the sequence corresponds a stored password. If a match is found, thenthe stored password is entered.

An example of such a blink table which may be used is shown in FIG. 5.We use lb to denote a long blink of both eyes, sr to denote a shortblink with the right eye, etc. Using this table for a password ofwH0Zon1$st, the blink sequence would be lb,sl,sb,sl,sr,sb,sr,sl,sl,sb.

In the above example, even with each blink type corresponding to morethan one possible character, the probability of a random correct guessis 6^(−n) for a password of length n. This means that with an8-character password, there is less than one millionth chance of acorrect guess. Of course, this is only an example, and exemplaryembodiments may use more than 6 groups or less as the tradeoff betweensecurity and ease-of-use dictates.

In another exemplary embodiment, the blink table may have a hierarchicalstructure such that one group of characters is selected by blinking anda sub set is subsequently selected by blinking, either by blink code orby waiting as the entries in the group are highlighted in an imagedisplayed in crypto-glasses 1. In this way, many characters may beentered by using relatively few blink patterns.

For instance, in this example all the letters of the alphabet are placedinto 3 groups on the screen (group 1 for left eye blink, group 2 forright eye blink, and group 3 for blinking both eyes together). Once aselection is made, the user is presented with another set of 3 groups,and so on. The set of letters can be replaced with any set ofobjects/shapes, numbers, alpha-numeric combinations, etc.

As shown in FIG. 7, the system may allow a particular blink sequence,blink duration or eye movement pattern to be associated with a user'scredentials. For example, a user may perform a certain physical gesture,such as a blink pattern, which is captured by crypto-glasses 1 (S4-1)through a camera 6, motion sensor, or some other device (S4-2). Theunmapped credentials are thus detected (S4-3). Once this pattern istrained, it is associated with the user's unmapped credentials (S4-4).The mapping relationship is produced and stored (S4-5). Then, when themapped relationship is performed by the user, it is translated into theuser's credentials (S4-6 a). In addition, the smartphone 3 may requireother traditional credentials to be entered such as a fingerprint,retina scan, voiceprint, other biometrics, etc (S4-6 b). Thiscombination can become the final credentials (S4-7).

For instance, the user blinks a certain sequence and this information issent to smartphone 3. The smartphone 3 will then convert the blinksequence into some value that is the password. Of course, the passwordcan be converted by the crypto-glasses 1 and the result sent to thesmartphone 3.

The key-blink mapping may be displayed in crypto-glasses 1. This allowsthe user to avoid memorizing key blink-codes, which in turn helps reducethe cognitive load on the user. The selected key can be displayed withthe crypto-glasses 1 to aid the user. In addition, the key-blink mappingcan be changed each time data is entered, or at some other interval, sothat even if the eye blinks are being tracked it does not lead topassword exposure.

To make things both interesting from an interaction perspective, to andmake the password harder to crack by tracking eye-blinks, theauthentication interaction can be modeled as a game (and even havelevels), where, based on the skill level of the user, various parametersmay be changed dynamically; for example, a pair of rapid blinks (insteadof one) for a letter, changing the combination of L/R blinks for aletter, invoking the correct letter by providing (guessing) the blinksthat will produce it, etc. If the system thinks that the user is takingtoo much time, or the user is in a hurry, the user can always reduce thelevel of difficulty of the game and enter the password. In addition, thespeed of blinking, etc. may be customized for each user.

Further embodiments of the invention may include additional biometricauthentication with the crypto-glasses 1. Such biometric authenticationmethods could include retina scans, fingerprint, voice recognition, orother known techniques. Such biometric authentications may be requiredto utilize the crypto-glasses 1 in order to prevent an attacker fromusing stolen crypto-glasses 1.

In addition, the authentication of the crypto-glasses 1 may beauthenticated for a specific duration of time or until an event occursbased on an access control policy on the smartphone 3, thecrypto-glasses 1, or both devices. Once the crypto-glasses 1 and/orsmartphone 3 are authenticated the devices may be paired and startcommunicating with each other.

While the invention has been described in teens of exemplaryembodiments, those skilled in the art will recognize that the inventioncan be practiced with modification within the spirit and scope of theappended claims.

Further, it is noted that Applicant's intent is to encompass equivalentsof all claim elements, even if amended later during prosecution.

What is claimed is:
 1. Crypto-glasses including systems that implement amethod of authentication of users by blinking, the crypto-glassescomprising: a frame configured so as to be worn by a user; a processor;a display device communicating with the processor so as to dynamicallydisplay data; and a communication unit, as executed by the processor, toexecute the method of authentication by transmitting data to the displaydevice for performing the authentication of the user to interact withthe display device, wherein the communication unit is configured todisplay in an optical unit of the crypto-glasses a key map whichcorrelates data input into the display device with keys of the displaydevice, the key map indicating data different from that of the keys ofthe display device.
 2. The crypto-glasses according to claim 1, whereinthe key map is generated by the display device to be authenticated andto transmit the crypto-glasses.
 3. The crypto-glasses according to claim1, further comprising a lens connected to the frame, wherein the displaydevice comprises a projector configured so as to project an image on thelens of the crypto-glasses.
 4. The crypto-glasses according to claim 1,wherein a new key map is generated after a predetermined event.
 5. Thecrypto-glasses according to claim 1, wherein a new key map is generatedafter every key press.
 6. The crypto-glasses according to claim 1,further comprising a biometric information input unit configured so asto authenticate biometric information of the user.
 7. The crypto-glassesaccording to claim 1, wherein the communication unit is configured so asto pair with the display device performing the authentication until acertain predetermined event occurs.
 8. The crypto-glasses according toclaim 1, further comprising an auditory device configured so as toprovide feedback information relating to the key map to the user.
 9. Amethod of authentication of a user based on blinking of at least one eyeof the user, the method comprising: detecting, by crypto-glasses, theblinking of the eye of the user; determining a blinking pattern; mappingthe blinking pattern in a database; processing the blinking pattern;applying an encrypted communication channel between the crypto-glassesand a display device for performing the authentication of the user tointeract with the display device; and displaying in the crypto-glasses akey map which correlates data input into the display device with keys ofthe display device, the key map indicating data different from that ofthe keys of the display device.
 10. The method according to claim 9,further comprising: transmitting the key map from the display device tothe crypto-glasses; selecting a key; and entering into the displaydevice the data correlated by the key map to the selected key.
 11. Themethod according to claim 9, wherein the display device further includesa display screen, and wherein the display screen displays the keys ofthe display device.
 12. The method according to claim 11, wherein thekeys displayed on the display device are blank.
 13. The method accordingto claim 11, wherein the keys displayed on the display device areencrypted.
 14. The method according to claim 13, wherein the keysdisplayed on the display device form a keyboard, and wherein the keysare scrambled from a predetermined position on the keyboard. 15.Crypto-glasses including systems that implement a method ofauthentication of users by blinking, the crypto-glasses comprising: aframe configured so as to be worn by a user; a processor; a cameradisposed so as to record a gesture of the user; and a communicationunit, as executed by the processor, to execute the method ofauthentication by transmitting data to a display device for performingthe authentication of the user to interact with the display device,wherein the communication unit is configured to display in an opticalunit of the crypto-glasses a key map which correlates data input intothe display device with keys of the display device, the key mapindicating data different from data of the keys of the display device.16. The crypto-glasses according to claim 15, wherein the gesturecomprises the blinking performed by the user.
 17. The crypto-glassesaccording to claim 15, wherein the display device is configured tocommunicate with the processor so as to dynamically display information.18. The crypto-glasses according to claim 15, wherein the data includesa blinking key, the blinking key correlating a blinking pattern to oneof characters to be entered into the display device performing theauthentication.
 19. The crypto-glasses according to claim 15, furthercomprising an auditory device configured so as to communicate the dataentered into the display device performing the authentication to theuser.
 20. The crypto-glasses according to claim 15, further comprising abiometric information input unit configured so as to authenticatebiometric information of the user.