Systems, apparatus, and methods for using a wearable device to confirm the identity of an individual

ABSTRACT

A wearable device includes at least one sensor for obtaining a unique identifier from the wearer when the wearer and for transmitting the unique identifier to one or more computer processors for use in determining whether the wearer is a particular individual. The wearable device may also include a wireless communications device for transmitting a signal (e.g., to a remote computing device) that confirms the identity of the wearer as the particular individual. A remote computing device, or other device, or individual, may then, based at least in part on receiving the signal, grant wearer access to a computer program, computing system, and/or a particular physical space.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 15/594,898, filed May 15, 2017, now U.S. Pat. No. 10,188,323 entitled “Systems, Apparatus, and Methods for Using Eyewear, or Other Wearable Item, to Confirm the Identity of an Individual,” which is a divisional of U.S. patent application Ser. No. 14/588,122, filed Dec. 31, 2014, now U.S. Pat. No. 9,649,052, issued May 16, 2017, entitled “Systems, Apparatus, and Methods for Using Eyewear, or Other Wearable Item, to Confirm the Identity of an individual,” which claims the benefit of U.S. Provisional Patent Application Ser. No. 62/046,406, filed Sep. 5, 2014, entitled “Wearable Health Computer Apparatus, Systems, and Related Methods,” the disclosures of which are hereby incorporated by reference herein in their entirety.

BACKGROUND

Currently, users must often provide a password and/or produce other identifying information to gain access to a particular computer system, particular computer program, or to a particular building or secure area within a building. This can be inconvenient and time consuming. Accordingly, there is a need for improved systems, apparatus, and methods for facilitating access, by an individual, to computer systems, computer programs, and secure areas.

SUMMARY OF THE VARIOUS EMBODIMENTS

It should be appreciated that this Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to be used to limit the scope of the claimed subject matter.

According to a first aspect of the disclosure, a computer-implemented method is provided for providing a particular individual with access to a computer system or computer program. The method includes receiving a wireless signal from a wearable device. The wireless signal includes a unique identifier associated with the particular person. In response to receiving the wireless signal, the unique identifier is compared with a stored identifier for the particular individual. In response to determining that the unique identifier at least partially matches the stored identifier, the particular individual is provided with access to the computer system or computer program.

According to another aspect, a system for confirming an identity of an individual is provided. The system includes a wearable device having one or more processors, one or more sensors in communication with the processors, and at least one electronic communications device in communication with the processors. The electronic communications device is adapted to broadcast a wireless signal that has a unique identifier associated with a particular individual wearing the wearable device. The wireless signal is configured to be received by a remote computer system that uses the unique identifier to compare to a stored identifier for the particular individual so that the remote computer system can allow the particular individual access to one of the remote computer system, a secure area associated with the remote computer system, or a payment system associated with the remote computer system.

According to yet another aspect, a system for confirming an identity of an individual is provided. The system includes a wearable device having one or more processors operative to receive a unique identifier associate with the individual from one or more sensors. The system also includes one or more electronic communications devices in communication with the processors and configured to broadcast a wireless signal that has a unique identifier associated with the individual wearing the wearable device. The wireless signal is configured to be received by a remote computer system that uses the unique identifier to compare to a stored identifier for the individual so that the remote computer system can allow the individual access to one of the remote computer system, a secure area associated with the remote computer system, or a payment system associated with the remote computer system.

The features, functions, and advantages that have been discussed can be achieved independently in various embodiments of the present disclosure or may be combined in yet other embodiments, further details of which can be seen with reference to the following description and drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

Various embodiments of systems and methods for confirming the identity of an individual are described below. In the course of this description, reference will be made to the accompanying drawings, which are not necessarily drawn to scale and wherein:

FIG. 1 is a block diagram of an Identity Confirmation System in accordance with an embodiment of the present system.

FIG. 2 is a block diagram of the Identity Confirmation Server of FIG. 1.

FIG. 3 depicts a flowchart that generally illustrates various steps executed by an Identity Confirmation Module according to a particular embodiment.

FIG. 4 is an exemplary wearable health monitoring device of FIG. 1.

DETAILED DESCRIPTION OF SOME EMBODIMENTS

Various embodiments will now be described more fully hereinafter with reference to the accompanying drawings. It should be understood that the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Like numbers refer to like elements throughout.

Overview

Eyewear, according to various embodiments, includes one or more electronic devices (or other devices) that are used to confirm the identity of the wearer and to facilitate identifying the wearer of the eyewear to one or more individuals or computing devices. For example, the eyewear may include one or more biometric sensors that are adapted for selectively confirming that the individual wearing the eyewear is, in fact, the owner of the eyewear (or other specific individual associated with the eyewear). In various embodiments, the eyewear may be configured to, at least partially in response to confirming the individual's identity, communicate the individual's identity to a remote computing device. The eyewear may do this, for example, by broadcasting a unique identification code associated with the user via Near Field Communications, Bluetooth, or any other suitable wireless communications technology. This may be useful, for example, in allowing a user to access a computing system or secure area without presenting any other form of physical identification, and/or without entering a password or passcode.

A wearable identity confirmation system, in various embodiments, may, for example, be embodied in any suitable wearable device configured to confirm the identity of a wearer. The system may, for example, be embodied as a pair of eyewear (e.g., eyeglasses or goggles), contact lenses, a wristwatch, a suitable piece of clothing (e.g., such as a suitable shirt, pair of pants, undergarment, compression sleeve, etc.), footwear, a hat, a helmet, an orthopedic cast, or any other suitable wearable item. In a particular example, an identity confirmation system is embodied as a pair of computerized eyewear.

In various embodiments, the system comprises one or more sensors configured to determine the wearer's identity. The one or more sensors may be coupled to the wearable device in any suitable way. For instance, the one or more sensors may be embedded into the wearable device, and/or operatively coupled to the wearable device. The one or more sensors may include, for example, one or more wireless communications devices (e.g., one or more near field communications devices (e.g., an NFC Chip), one or more Bluetooth devices (e.g., a Bluetooth chip)), one or more GPS units, one or more RFID tags, one or more fingerprint readers, one or more iris readers, one or more retinal scanners, one or more voice recognition systems, one or more heart rate monitors, one or more electrocardiogram (EKG) sensors, one or more electroencephalograms (EEGs), one or more pedometers, one or more thermometers, one or more transdermal transmitter sensors, one or more front-facing cameras, one or more eye-facing cameras, one or more microphones, one or more accelerometers, one or more blood pressure sensors, one or more pulse oximeters, one or more respiratory rate sensors, one or more blood alcohol concentration (BAC) sensors, one or more near-field communication sensors, one or more motion sensors, one or more gyroscopes, one or more geomagnetic sensors, one or more global position system (GPS) sensors, one or more impact sensors, one or more tear sensors, one or more DNA and/or genome sampling devices (e.g., a “lab on a chip” system that may sample and/or analyze DNA and/or genome information for an individual), and/or any other suitable sensors (e.g., any other suitable biometric sensors). In particular embodiments, the system is configured to gather and store data, for example, using the one or more sensors, about the wearer (e.g., such as the wearer's facial contours, iris patterns, overall facial image, body temperature, user DNA and/or genome sequence information, balance, heart rate, level of activity, position, body motion, facial muscle movements, etc.).

Exemplary Technical Platforms

As will be appreciated by one skilled in the relevant field, the present systems and methods may be, for example, embodied as a computer system, a method, or a computer program product. Accordingly, various embodiments may be entirely hardware or a combination of hardware and software. Furthermore, particular embodiments may take the form of a computer program product stored on a computer-readable storage medium having computer-readable instructions (e.g., software) embodied in the storage medium. Various embodiments may also take the form of web-implemented computer software. Any suitable computer-readable storage medium may be utilized including, for example, hard disks, compact disks, DVDs, optical storage devices, and/or magnetic storage devices.

Various embodiments are described below with reference to block diagram and flowchart illustrations of methods, apparatuses, (e.g., systems), and computer program products. It should be understood that each block of the block diagrams and flowchart illustrations, and combinations of blocks in the block diagrams and flowchart illustrations, respectively, can be implemented by a computer executing computer program instructions. These computer program instructions may be loaded onto a general purpose computer, a special purpose computer, or other programmable data processing apparatus that can direct a computer or other programmable data processing apparatus to function in a particular manner such that the instructions stored in the computer-readable memory produce an article of manufacture that is configured for implementing the functions specified in the flowchart block or blocks.

The computer instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on a user's computer and partly on a remote computer, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including but not limited to: a local area network (LAN); a wide area network (WAN); a cellular network; or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).

These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner such that the instructions stored in the computer-readable memory produce an article of manufacture that is configured for implementing the function specified in the flowchart block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process (e.g., method) such that the instructions that execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks.

Exemplary System Architecture

FIG. 1 is a block diagram of an Identity Confirmation System 100 according to particular embodiments. As may be understood from this figure, the Identity Confirmation System 100 includes one or more Networks 115, one or more Third Party Servers 50, an Identity Confirmation Server 120 that may, for example, be adapted to execute an Identity Confirmation Module 300, a Database 140, one or more Remote Computing Devices 154 (e.g., such as a smart phone, a tablet computer, a wearable computing device, a laptop computer, a desktop computer, etc.), and one or more Wearable Devices 156, which may, for example, be embodied as one or more of eyewear, headwear, clothing, a watch, a hat, a helmet, a cast, an adhesive bandage, a piece of jewelry (e.g., a ring, earring, necklace, bracelet, etc.), or any other suitable wearable device. In particular embodiments, the one or more computer networks 115 facilitate communication between the one or more Third Party Servers 50, the Identity Confirmation Server 120, Database 140, one or more Remote Computing Devices 154, and the one or more Wearable Devices 156.

The one or more networks 115 may include any of a variety of types of wired or wireless computer networks such as the Internet, a private intranet, a mesh network, a public switch telephone network (PSTN), or any other type of network (e.g., a network that uses Bluetooth or near field communications to facilitate communication between computing devices). The communication link between the one or more Remote Computing Devices 154 and the Identity Confirmation Server 120 may be, for example, implemented via a Local Area Network (LAN) or via the Internet.

FIG. 2 illustrates a diagrammatic representation of the architecture for the Identity Confirmation Server 120 that may be used within the Identity Confirmation System 100. It should be understood that the computer architecture shown in FIG. 2 may also represent the computer architecture for any one of the one or more Remote Computing Devices 154, one or more Third Party Servers 50, and one or more Wearable Devices 156 shown in FIG. 1. In particular embodiments, the Identity Confirmation Server 120 may be suitable for use as a computer within the context of the Identity Confirmation System 100 that is configured for confirming the identity of a wearer by detecting characteristics of the wearer or the one or more Wearable Devices 156 using signals received from sensors coupled to the one or more Wearable Devices 156.

In particular embodiments, the Identity Confirmation Server 120 may be connected (e.g., networked) to other computing devices in a LAN, an intranet, an extranet, and/or the Internet as shown in FIG. 1. As noted above, the Identity Confirmation Server 120 may operate in the capacity of a server or a client computing device in a client-server network environment, or as a peer computing device in a peer-to-peer (or distributed) network environment. The Identity Confirmation Server 120 may be a desktop personal computing device (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a cellular telephone, a web appliance, a network router, a switch or bridge, or any other computing device capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that computing device. Further, while only a single computing device is illustrated, the term “computing device” shall also be interpreted to include any collection of computing devices that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.

An exemplary Identity Confirmation Server 120 includes a processing device 202, a main memory 204 (e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM) or Rambus DRAM (RDRAM), etc.), a static memory 206 (e.g., flash memory, static random access memory (SRAM), etc.), and a data storage device 218, which communicate with each other via a bus 232.

The processing device 202 represents one or more general-purpose or specific processing devices such as a microprocessor, a central processing unit (CPU), or the like. More particularly, the processing device 202 may be a complex instruction set computing (CISC) microprocessor, reduced instruction set computing (RISC) microprocessor, very long instruction word (VLIW) microprocessor, or processor implementing other instruction sets, or processors implementing a combination of instruction sets. The processing device 202 may also be one or more special-purpose processing devices such as an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), network processor, or the like. The processing device 202 may be configured to execute processing logic 226 for performing various operations and steps discussed herein.

The Identity Confirmation Server 120 may further include a network interface device 208. The Identity Confirmation Server 120 may also include a video display unit 210 (e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT)), an alpha-numeric input device 212 (e.g., a keyboard), a cursor control device 214 (e.g., a mouse), and a signal generation device 216 (e.g., a speaker).

The data storage device 218 may include a non-transitory computing device-accessible storage medium 230 (also known as a non-transitory computing device-readable storage medium, a non-transitory computing device-readable medium, or a non-transitory computer-readable medium) on which is stored one or more sets of instructions (e.g., the Identity Confirmation Module 300) embodying any one or more of the methodologies or functions described herein. The one or more sets of instructions may also reside, completely or at least partially, within the main memory 204 and/or within the processing device 202 during execution thereof by the Identity Confirmation Server 120—the main memory 204 and the processing device 202 also constituting computing device-accessible storage media. The one or more sets of instructions may further be transmitted or received over a network 115 via a network interface device 208.

While the computing device-accessible storage medium 230 is shown in an exemplary embodiment to be a single medium, the term “computing device-accessible storage medium” (or “computer readable medium”) should be understood to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “computing device-accessible storage medium” should also be understood to include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by the computing device and that causes the computing device to include any one or more of the methodologies of the present invention. The term “computing device-accessible storage medium” should accordingly be understood to include, but not be limited to, solid-state memories, optical and magnetic media, etc.

Exemplary System Platform

As noted above, a system, according to various embodiments, is adapted to confirm the identity of a wearer of a wearable device. Various aspects of the system's functionality may be executed by certain system modules, including Identity Confirmation Module 300. The Identity Confirmation Module 300 is discussed in greater detail below.

Identity Confirmation Module

FIG. 3 is a flow chart of operations performed by an exemplary Identity Confirmation Module 300, which may, for example, run on the Identity Confirmation Server 120, or any suitable computing device (such as the one or more Wearable Devices 156 or a suitable mobile computing device). In particular embodiments, the Identity Confirmation Module 300 may confirm a wearer's identity and may communicate the wearer's identity to a remote computing device.

The system begins, in various embodiments, at Step 305 by providing a wearer with computerized eyewear comprising one or more sensors coupled to the eyewear that are adapted to confirm the identity of the wearer and to facilitate identifying the wearer of the eyewear to one or more individuals and/or computing devices. In various embodiments, the system may do this by, for example: (1) facilitating delivery of the eyewear to an address associated with a particular individual; (2) facilitating distribution of the eyewear from a healthcare worker to the individual; and (3) placing an order of the eyewear from a third party for delivery to the individual. In other embodiments, this step may be executed manually (e.g., by a human being) rather than a computer.

The system continues, at Step 310 by using the eyewear to confirm the identity of the wearer of the eyewear. In various embodiments, the eyewear may confirm the identity of the wearer in any suitable way. In particular embodiments, the eyewear may confirm the identity of the wearer using one or more facial characteristics of the wearer. In other embodiments, the eyewear may confirm the identity of the wearer using biometric data received from the one or more sensors (e.g., a fingerprint sensor, an iris scanner, a tear or blood sampling device, a DNA and/or genome testing device etc. . . .). In further embodiments, the eyewear may confirm the identity of the wearer by requesting a password (e.g., an alphanumeric password) from the wearer, receiving a password from the wearer via any suitable input device (e.g., a keyboard, camera, or microphone), and verifying that the password matches a password associated with the wearer. In some embodiments, the eyewear may confirm the identity of the wearer using voice recognition techniques, or any other suitable identity confirmation technique.

In some embodiments, the eyewear may confirm the identity of the wearer substantially automatically after the wearer puts the eyewear on. Also, in particular embodiments, the eyewear may confirm the identity of the wearer on a substantially periodic basis (e.g., once per second, once per minute, once per hour, once per day, etc.). For example, the eyewear may confirm the identity of the wearer every thirty seconds throughout the day. In other embodiments, the eyewear may confirm the identity of the wearer at least partially in response to receiving an indication from the wearer that the eyewear should confirm the identity of the wearer. For instance, the wearer may speak a voice command to the wearable device requesting that the device scan the wearer's iris. In various embodiments, the eyewear may receive an indication from the wearer of when to have the eyewear confirm the identity of the wearer. For example, the eyewear may receive an indication from the wearer to have the eyewear conduct a retinal scan of the user (e.g., receive at least one retinal scan) at 8:00 a.m. and at 2:00 p.m. on a particular day. In other embodiments, the eyewear may confirm the identity of the wearer according to an established schedule. In some embodiments, the established schedule may be determined randomly. For example, the established schedule may be different each day that the eyewear confirms the identity of the wearer.

In particular embodiments, the eyewear may receive a request from the wearer to have particular biometric data received from a particular sensor at the same time that the eyewear receives a second particular biometric data from a second particular sensor. For example, when the eyewear receives biometric data for the wearer's fingerprint, the eyewear may, at least partially in response to receiving the fingerprint data, also obtain iris data of the wearer's eye from an iris reader associated with the eyewear. As a further example, the eyewear may be configured to simultaneously receive biometric data from both an eye-facing camera and a fingerprint reader associated with the eyewear.

In various embodiments, the eyewear may receive singular biometric data from a single sensor associated with the eyewear. For example, the eyewear may receive a single iris scan from the iris reader. In other embodiments, the eyewear may receive singular biometric data from a plurality of the sensors associated with the eyewear. For instance, the eyewear may receive an iris scan from the iris reader, a fingerprint from the fingerprint reader, and a body temperature from the thermometer. In yet other embodiments, the system may receive multiple sets of biometric data from one or more of the sensors. For example, the eyewear may receive multiple fingerprints from the fingerprint reader and/or multiple temperature readings from the thermometer. In various embodiments, the eyewear, or other computer, may facilitate storing the received biometric data in the Identity Information Database 140. In some embodiments, the eyewear, or other computing device, may associate the received biometric data with an account associated with the wearer. In other embodiments, the eyewear, or other computing device, may associated the received biometric data with an account associated with the eyewear.

In particular embodiments, the eyewear may confirm the identity of the wearer by comparing the received biometric data to the stored biometric data. In some embodiments, the eyewear may confirm the identity of the wearer based on the comparison between the received biometric data and the stored biometric data only when there is a complete match between the received biometric data and the stored biometric data. In other embodiments, the eyewear may confirm the identity of the wearer based on the comparison between the received biometric data and the stored biometric data when there is at least a partial match between the received biometric data and the stored biometric data (e.g., at least a predetermined percentage of the received biometric data matches the stored biometric data). For instance, the eyewear may confirm the identity of the wearer in response to at least about 90 percent of the received biometric data matching the stored biometric data. In particular embodiments, the eyewear may use any suitable algorithm to confirm the identity of the wearer.

In various embodiments, the eyewear may confirm the identity of the wearer using a single set of biometric data. For instance, the eyewear may confirm the identity of the wearer using only the wearer's fingerprint. In other embodiments, the eyewear may require a plurality of sets of biometric data to confirm the identity of the wearer. For example, the eyewear may only confirm the identity of the wearer after receiving a fingerprint, an iris reading, and a retinal scan (or other eye scan) for the wearer.

At Step 315, at least partially in response to confirming the identity of the wearer, the eyewear confirms the identity of the wearer to one or more individuals and/or computing devices. In various embodiments, the eyewear may confirm the identity of the wearer to one or more individuals or computing devices by broadcasting a unique identifier associated with the wearer. In some embodiments, the eyewear may broadcast the unique identifier associated with the wearer to one or more individuals or computing devices substantially automatically at least partially in response to the eyewear confirming the identity of the wearer. In other embodiments, the eyewear may broadcast the unique identifier associated with the wearer to one or more individuals or computing devices on a substantially periodic basis (e.g., by the second, by the minute, hourly, daily, etc.). For example, the eyewear may broadcast the identity of the wearer to one or more individuals or computing devices every thirty seconds throughout the day. In yet other embodiments, the eyewear may broadcast the identity of the wearer to one or more individuals or computing devices substantially continuously (e.g., once every second substantially without pause). In some embodiments, the eyewear may broadcast the identity of the wearer to one or more individuals or computing devices according to a predetermined schedule.

In various embodiments, the eyewear may broadcast (e.g., wirelessly broadcast) the identity of the wearer to one or more individuals and/or computing devices at least partially in response to receiving an indication from the wearer that the eyewear should broadcast the identity of the wearer to one or more individuals or computing devices. For instance, the wearer may speak a voice command to the wearable device requesting that the device broadcast the wearer's identity to a remote computing device. In yet other embodiments, the eyewear may broadcast the identity of the wearer to one or more individuals or computing devices at least partially in response to receiving an indication from the one or more individuals or computing devices that the eyewear should broadcast the identity of the wearer. For instance, a particular remote computing device may send a request to the wearable device to broadcast the wearer's identity. In various embodiments, the eyewear may receive an indication from the wearer of when to have the eyewear broadcast the identity of the wearer to the one or more individuals or computing devices. For example, the eyewear may receive an indication from the wearer to have the eyewear broadcast the wearer's identity to a remote computing device at 8:00 a.m. and at 2:00 p.m. every weekday (e.g., Monday, Tuesday, Wednesday, Thursday, Friday).

In particular embodiments, the one or more individuals receiving the wearer's broadcast identity information may be the owner of the eyewear, the wearer's employer, the parent and/or guardian of the wearer, etc. In other embodiments, the one or more computing devices receiving the wearer's broadcast identity information may be any suitable computing device (e.g., such as a smart phone, a tablet computer, a wearable computing device, a laptop computer, a desktop computer, etc.). In some embodiments, the eyewear may broadcast the identity of the wearer to the one or more individuals or computing devices for any suitable reason. For instance, the eyewear may broadcast the identity of the wearer to a laptop computer for the wearer to gain access to the laptop computer without having to manually enter a password.

In various embodiments, the step of broadcasting the identity of the wearer to the one or more individuals or computing devices may also include translating the identity of the wearer into a picture, a name, an ID number, a password, a passcode, an access code, etc. For example, in the course of broadcasting the identity of the wearer to the computing device, the eyewear may first translate the identity of the wearer into a password associated with the wearer for one or more applications on the computing device, and then broadcast the password in any suitable manner. As a further example, in broadcasting the identity of the wearer to an individual such as the wearer's employer, the eyewear may translate the identity of the wearer into a unique image, such as a picture of the wearer.

Structure of the Eyewear

As shown in FIG. 4, eyewear 400, according to various embodiments, includes: (1) an eyewear frame 410; (2) a first temple 412; and (3) a second temple 414. These various components are discussed in more detail below.

Eyewear Frame

Referring still to FIG. 4, the eyewear 400, in various embodiments, may include any suitable eyewear frame 410 configured to support one or more lenses 418, 420. In the embodiment shown in this figure, the eyewear frame 410 has a first end 402 and a second end 404. The eyewear frame 410 may be made of any suitable material such as metal, ceramic, one or more polymers or any combination thereof. In particular embodiments, the eyewear frame 410 is configured to support the first and second lenses 418, 420 about the full perimeter of the first and second lenses 418, 420. In other embodiments, the eyewear frame 410 may be configured to support the first and second lenses 418, 420 about only a portion of each respective lens. In various embodiments, the eyewear frame 410 is configured to support a number of lenses other than two lenses (e.g., a single lens, a plurality of lenses, etc.). In particular embodiments, the lenses 418, 420 may include prescription lenses, sunglass lenses, or any other suitable type of lens (e.g., reading lenses, non-prescription lenses), which may be formed from glass or one or more polymers.

The eyewear frame 410 includes a first and second nose pad 422 (not shown in figure), 424, which may be configured to maintain the eyewear 400 adjacent the front of a wearer's face such that the lenses 418, 420 are positioned substantially in front of the wearer's eyes while the wearer is wearing the eyewear 400. In particular embodiments, the nose pads 422, 424 may comprise a material that is configured to be comfortable when worn by the wearer (e.g., rubber, etc.). In other embodiments, the nose pads 422, 424 may include any other suitable material (e.g., plastic, metal, etc.). In still other embodiments, the nose pads 422, 424 may be integrally formed with the frame 410.

The eyewear frame 410 includes a first and second hinge 426, 428 that attach the first and second temples 412, 414 to the frame first and second ends 402, 404, respectively. In various embodiments, the hinges 426, 428 may be formed by any suitable connection (e.g., tongue and groove, ball and socket, spring hinge, etc.). In particular embodiments, the first hinge 426 may be welded to, or integrally formed with, the frame 410 and the first temple 412 and the second hinge 428 may be welded to, or integrally formed with, the frame 410 and the second temple 414.

First and Second Temples

As shown in FIG. 4, the first temple 412, according to various embodiments, is rotatably connected to the frame 410 at a right angle to extend the first temple 412 substantially perpendicular, substantially parallel, or anywhere in between the right angle to the frame 410. The first temple 412 has a first and second end 412 a, 412 b. Proximate the first temple second end 412 b, the first temple 412 includes an earpiece 413 configured to be supported by a wearer's ear. Similarly, the second temple 414, according to various embodiments, is rotatably connected to the frame 410 at a right angle to extend the second temple 414 substantially perpendicular, substantially parallel, or anywhere in between the right angle to the frame 410. The second temple 414 has a first and second end 414 a, 414 b. Proximate the second temple second end 414 b, the second temple 414 includes an earpiece 415 configured to be supported by a wearer's ear.

Sensors

In various embodiments, the second temple 414 has one or more sensors 430 connected to the second temple 414. In various embodiments, the one or more sensors 430 may be coupled to the frame 410, the first and second temples 412, 414, the first and second lenses 418, 410, or any other portion of the eyewear 400 in any suitable way. For instance, the one or more sensors 430 may be embedded into the eyewear 400, coupled to the eyewear 400, and/or operatively coupled to the eyewear 400. In various embodiments, the one or more sensors may be formed at any point along the eyewear 400. For instance, a fingerprint reader may be disposed adjacent the first temple of the eyewear 400. In various embodiments, the one or more sensors may be formed in any shape. In addition, the one or more sensors may be formed on the inner (back) surface of the frame 410, the first and second temples 412, 414, the first and second lenses 418, 410, or any other portion of the eyewear 400. In other embodiments, the one or more sensors may be formed on the outer (front) surface of the frame 410, the first and second temples 412, 414, the first and second lenses 418, 410, or any other portion of the eyewear 400.

In various embodiments, the one or more sensors 430 that are coupled to the eyewear (or other wearable device) are adapted to detect one or more characteristics of the eyewear or a wearer of the eyewear, wherein the one or more characteristics of the wearer are associated with the wearer's identity. In various embodiments, the one or more sensors coupled to the eyewear or other health monitoring device may include, for example, one or more of the following: a near-field communication sensor, a Bluetooth chip, a GPS unit, an RFID tag (passive or active), a fingerprint reader, an iris reader, a retinal scanner, a voice recognition sensor, a heart rate monitor, an electrocardiogram (EKG), a pedometer, a thermometer, a front-facing camera, an eye-facing camera, a microphone, an accelerometer, a magnetometer, a blood pressure sensor, a pulse oximeter, a skin conductance response sensor, any suitable biometric reader, or any other suitable sensor. In some embodiments, the one or more sensors may include a unique shape, a unique code, or a unique design physically inscribed into the eyewear that may be readable by an individual or a remote computing device. In particular embodiments, the sensors coupled to the eyewear may include one or more electronic communications devices such as a near field communication chip, a Bluetooth chip, an active RFID, and a GPS unit.

In various embodiments, the one or more sensors are coupled to a computing device that is associated with (e.g., embedded within, attached to) the eyewear or other wearable device. In particular embodiments, the eyewear or other wearable device comprises at least one processor, computer memory, suitable wireless communications components (e.g., a Bluetooth chip) and a power supply for powering the wearable device and/or the various sensors.

As noted above, the one or more sensors may be coupled to a Bluetooth device (e.g., a Bluetooth communications chip), or other wireless communications device, that is configured to transmit the one or more signals to a handheld wireless device, and the step of using the eyewear to confirm the identity of the wearer of the eyewear (discussed above in reference to Step 310) further comprises receiving the one or more signals from the wireless handheld device (e.g., via the Internet). In particular embodiments, one or more of the sensors may be detachable from the eyewear. For instance, if a wearer does not need a temperature sensor or other particular sensor, the sensor may be removed from the eyewear.

Functionality of the Eyewear

In various embodiments, different embodiments of the eyewear may identify the wearer in any suitable way. In particular embodiments, the eyewear may identify the wearer by broadcasting the identity of the wearer (e.g., always, at a particular time of day, in response to receiving a request, etc.). In some embodiments, the eyewear may broadcast the identity of the wearer by communicating a unique identifier to one or more individuals or computing devices without independently confirming the wearer's identity. For example, rather than confirming the identity of the wearer before notifying the individual of the wearer's identity, the eyewear may interpret possession of the eyewear to mean that the wearer is the owner of the eyewear or has permission from the owner of the eyewear to use their identity to perform one or more various activities (such as accessing a computer or a secure area). In various embodiments, in broadcasting the wearer's identity, the eyewear may transmit the wearer's identity substantially continuously. In certain embodiments, the eyewear may transmit the wearer's identity at least partially in response to receiving a request from a remote computing device for the wearer's identity. In still other embodiments, the eyewear may transmit the wearer's identity at least partially in response to receiving a “transmit identification” request from the wearer of the eyewear.

In particular embodiments, in transmitting the identification of the wearer, the eyewear may display a unique identifier on the outside of the eyewear. For example, the eyewear may capture the wearer's image and then the eyewear may display an OCR readable code, or other machine-readable code, that is associated with the wearer's identity. In other embodiments, in transmitting the identification of the wearer, the eyewear may have a unique shape such that the shape of the eyewear is a unique identifier. In still other embodiments, the unique shape of the eyewear in conjunction with the shape of the wearer's face may function as a unique identifier. For example, the eyewear may use facial recognition and/or object recognition techniques to determine the shape of the eyewear and the shape of the wearer's face.

In other embodiments, the eyewear may identify the wearer by first confirming the wearer's identity as the owner of the eyewear and then communicating the identity of the wearer (e.g., in any of the ways discussed above).

Exemplary User Experience

As discussed above, in various embodiments, the eyewear is adapted to confirm the identity of the wearer for any suitable reason. In particular embodiments, the eyewear may be used to interact (e.g., substantially automatically, or in response to an activation by one or more individuals or computing devices) with an adjacent computing device (or other computing device) to automatically confirm the identity of the individual. Several examples exist to demonstrate the eyewear confirming the identity of a wearer.

Identification for Access to a Computer

In a particular example, the eyewear may be used to confirm the identity of a wearer who wishes to access a computerized device (e.g., a handheld device), a computer program, or a particular electronic document on a computing device in order to accomplish a task, thereby eliminating the need for the wearer to manually enter a password. Before the wearer may gain access to the computerized device using the eyewear, the wearer may create an identity with the eyewear that will be used to access the computerized device. For instance, the wearer may place the eyewear on the wearer's face and request that the eyewear scan the wearer's face, eyes, fingerprint, and/or other attributes to determine the wearer's identity. The wearer may then create an account on the computerized device and instruct the computerized device to accept the wearer's identity from the eyewear as the wearer's password rather than requiring the wearer to manually enter a password into the computerized device. After setting up the computerized device to accept the wearer's identity from the eyewear, while the wearer is wearing the eyewear, the eyewear may confirm the identity of the wearer thereby eliminating the need for the wearer to enter a password to gain access to the computerized device.

Continuous Broadcasting of Identity

Similar to the wearer using the eyewear to access a computer, the eyewear may also continuously or intermittently broadcast the wearer's identity to access any computing device or application that requires a password or other authorizing information. For example, after creating an identity with the eyewear as described above, the wearer may enable various computing devices and applications to recognize the wearer's identity from the eyewear in lieu of entering a password to access the particular computer or computer program. Once the wearer has created an identity, the eyewear may continuously confirm the identity of the wearer by performing a retinal scan or any other suitable scan of the wearer. The eyewear will also continuously broadcast the wearer's identity at least partially in response to confirming the wearer's identity. This may allow the wearer to access particular computing devices, computer programs, restricted-access physical locations, etc. . . . by using a unique code sent from the eyewear to a suitable computing device without requiring the wearer to manually enter login information such as a username and password. For example, the wearer may walk into a room where the wearer's laptop computer and mobile phone are located. Although both of these devices require a password to unlock the devices, by walking within range of the devices with the eyewear on and wirelessly broadcasting the wearer's identity, both devices will unlock, thereby providing convenient access to the wearer without the wearer first entering an alphanumeric password.

In particular embodiments, the eyewear will cease broadcasting the wearer's identity at least partially in response to the eyewear determining that the wearer's identity can no longer be confirmed as that of a particular individual who is associated with the eyewear (e.g., the owner of the eyewear). For instance, where the wearer has removed the eyewear, the eyewear may stop broadcasting the wearer's identity as soon as the eyewear is unable to confirm the identity of the wearer due to the increased distance between the eyewear and the wearer. Also, in various embodiments, where the eyewear is worn by someone other than the owner of the eyewear, the eyewear will not be able to confirm the wearer's identity as the owner of the eyewear and may, accordingly, turn off the broadcasting of the wearer's identity. In such an embodiment, the eyewear may, in response to not being able to confirm the identity of the individual wearing the eyewear as the owner of the eyewear, send a notification to the owner of the eyewear (e.g., the wearer) that the eyewear is being worn by someone other than the wearer. In various embodiments, the eyewear may also capture the identity of the current wearer of the eyewear (e.g., an individual who has stolen the eyewear) using any suitable sensor (e.g., a face-facing camera) in order to alert a suitable individual of the identity of the individual who is currently in possession of the eyewear.

In various embodiments, the eyewear may also capture the identity of an individual who is determined not to be the owner of the eyewear in order to create a separate account for that individual so that each wearer of the eyewear has a unique identification established with the eyewear in order to access particular computing devices or applications. This may be particular suitable for non-prescription eyewear, such as sunglasses and vanity glasses.

Identification for Access to a Particular Area

In addition, the eyewear may be used to confirm the identity of a wearer who wishes to gain access to a secure area. For example, a secure area such as a passenger area of an airport or a secure area of a building may require identification to enter that particular area. In various embodiments, by wearing the eyewear, the wearer may be able to forgo the process of presenting a security badge or other identification to enter the particular area because the eyewear will confirm the identity of the wearer automatically. For example, in a building that requires a security badge to be swiped and a passcode to be entered in order to gain access to a particular area, the eyewear may be used to provide substantially instant access to the area by capturing an image of the wearer's face using the eye-facing camera and a fingerprint of the wearer using the fingerprint reader as the wearer enters an area with a computing device that communicates directly (e.g., wirelessly) with the eyewear. After receiving the image of the wearer and the wearer's fingerprint, the eyewear may confirm the identity of the wearer to the computing device, which may provide the wearer access to the secured area (e.g., by unlocking a door to the secured area, or by displaying an indication to a security guard that the individual should be allowed to enter the area).

Identification for Making a Payment

The situation may also arise where the eyewear confirms the identity of the wearer who wishes to make a payment for a particular good or service. In various embodiments, wearing the eyewear may eliminate the need for the wearer to confirm the wearer's identity before sending a wire, paying by credit or debit card, or paying by NFC (e.g., near field communication via the wearer's phone). Accordingly, in various embodiments, the eyewear may include wireless payment functionality. For example, the wearer may have his or her credit card information associated with the wearer's identity stored in the eyewear, or in a remote computing device associated with the eyewear. In the course of making a purchase at a retail location that accepts payment by wireless communications, in lieu of having payment completed via a swipe of the wearer's credit card, the eyewear may confirm the wearer's identity and then wirelessly communicate the wearer's credit card information to the retailer's payment terminal for use in facilitating payment for a particular item or service.

Identification for Signing a Document

In various embodiments, the eyewear may confirm the identity of a wearer signing a particular document. For instance, in signing an important legal document, the eyewear may confirm the identity of the wearer (e.g., in any suitable manner described above) in order to reduce the risk of fraud, etc. The eyewear may also be used to confirm a wearer's identity when no witnesses are available to confirm the wearer's identity. The eyewear, in this situation, may use one or more secure measurements such as a retinal scan, a fingerprint, etc. in order to confirm the identity of the wearer.

Conclusion

Many modifications and other embodiments of the invention will come to mind to one skilled in the art to which this invention pertains, having the benefit of the teaching presented in the foregoing descriptions and the associated drawings. For example, while various embodiments above describe certain processes (e.g., confirming the identity of an individual) as being done by a computing device associated with eyewear, in various embodiments, those processes may be done by a computer that is remote from the eyewear. For example, the eyewear may transmit a fingerprint pattern or other biometric information to a remote server, which would confirm the wearer's identity by matching the biometric information to biometric information for the owner of the eyewear that is stored in a database on the remote server. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for the purposes of limitation. 

What is claimed is:
 1. A computer-implemented method of providing a particular individual with access to a computer system or computer program, the method comprising: receiving at least one wireless signal from a wearable device, the at least one wireless signal comprising a unique identifier associated with the particular individual; at least partially in response to receiving the at least one wireless signal, comparing the unique identifier with a stored identifier for the particular individual; and at least partially in response to determining that the unique identifier at least partially matches the stored identifier, providing the particular individual with access to the computer system or computer program.
 2. The computer-implemented method of claim 1, wherein the method further comprises: transmitting at least one wireless signal to the wearable device requesting an identification signal from the wearable device, wherein receiving the at least one wireless signal from the wearable device is completed after transmitting the at least one wireless signal to the wearable device.
 3. The computer-implemented method of claim 1, further comprising providing the wearable device, the wearable device comprising: one or more processors; one or more sensors operatively coupled to the one or more sensors; and one or more wireless chips operatively coupled to the one or more processors, wherein the one or more sensors are configured to: generate a signal that confirms the identity of the particular individual; and the one or more wireless chips are configured to transmit the at least one wireless signal that comprises the unique identifier associated with the particular individual.
 4. The computer-implemented method of claim 3, wherein the one or more sensors is a biometric sensor that is configured to identify the particular individual by an attribute selected from a group consisting of: the particular individual's finger print; the particular individual's voice; the particular individual's gait; the particular individual's one or more facial characteristics; the particular individual's iris; the particular individual's tear; the particular individual's blood; and the particular individual's DNA.
 5. The computer-implemented method of claim 3, further comprising: determining a biometric reading of the particular individual from the generated signal; comparing the biometric reading of the particular individual with biometric data that is associated with the particular individual; and at least partially in response to the results of the biometric reading at least partially matching the biometric data associated with the particular individual, generating the unique identifier associated with the particular individual.
 6. The computer-implemented method of claim 1, wherein the unique identifier is a passcode associated with the particular individual, and wherein the computer system or computer program is selected from a group consisting of: a secure entry system; a password protected computing device; a password protected smart phone; a password protected alarm system; an electronic payment system; and an automobile.
 7. The computer-implemented method of claim 1, wherein providing the particular individual with access to the computer system or computer program comprises deactivating a home alarm system at least partially based on the unique identifier.
 8. The computer-implemented method of claim 1, wherein providing the particular individual with access to the computer system or computer program comprises executing an electronic payment for the particular individual at least partially based on the unique identifier.
 9. The computer-implemented method of claim 1, wherein providing the particular individual with access to the computer system or computer program comprises unlocking an automobile associated with the particular individual at least partially based on the unique identifier.
 10. The computer-implemented method of claim 1, wherein the wearable device is selected from a group consisting of: one or more contact lenses; a wristwatch; at least a portion of a shirt; at least a portion of a pair of pants; at least a portion of an undergarment; at least a portion of a shirt; at least a portion of a compression sleeve; at least a portion of footwear; at least a portion of a hat; at least a portion of a helmet; at least a portion of an orthopedic cast; an adhesive bandage; and a piece of jewelry.
 11. A system for confirming an identity of an individual, the system comprising: a wearable device comprising: one or more processors; one or more sensors operatively coupled to the one or more processors; and at least one electronic communications device operatively coupled to the one or more processors and adapted to broadcast a wireless signal comprising a unique identifier associated with a particular individual wearing the wearable device, wherein the wireless signal is configured to be received by a remote computer system that uses the unique identifier to compare to a stored identifier for the particular individual so that the remote computer system can allow the particular individual access to one of the remote computer system, a secure area associated with the remote computer system, or a payment system associated with the remote computer system.
 12. The system of claim 11, wherein the wearable device is selected from a group consisting of: one or more contact lenses; a wristwatch; at least a portion of a shirt; at least a portion of a pair of pants; at least a portion of an undergarment; at least a portion of a shirt; at least a portion of a compression sleeve; at least a portion of footwear; at least a portion of a hat; at least a portion of a helmet; at least a portion of an orthopedic cast; an adhesive bandage; and a piece of jewelry.
 13. The system of claim 12, wherein the one or more sensors comprises a biometric sensor configured to capture biometric information from the particular individual, the biometric information selected from a group consisting of: the particular individual's finger print, the particular individual's voice, the particular individual's one or more facial characteristics, the particular individual's iris, the particular individual's tear, the particular individual's blood, and the particular individual's DNA; and the one or more processors analyze the captured information from the biometric sensor and generate the unique identifier.
 14. The system of claim 12, wherein: the biometric sensor captures information about the particular individual's gait; and the one or more processors analyze the particular individuals gait information and generate the unique identifier based on the analyzed gait information.
 15. The system of claim 11, further comprising a remote computer system comprising: one or more processors; memory operatively coupled to the one or more processors; and one or more electronic communication devices that is operatively coupled to the one or more processors of the remote computer system, wherein the remote computer system is configured to: receive the wireless signal from the wearable device containing the unique identifier associated with the particular individual; at least partially in response to receiving the wireless signal, compare the unique identifier with a stored identifier for the particular individual; and at least partially in response to determining that the unique identifier at least partially matches the stored identifier, allow the particular individual access to one of the remote computer system, a secure area associated with the remote computer system, or a payment system associated with the remote computer system.
 16. The system of claim 15, wherein the remote computer system is associated with an automobile and the remote computer system allows the particular individual to access the automobile when the unique identifier at least partially matches the stored identifier.
 17. The system of claim 15, wherein the remote computer system is associated with a smartphone and the remote computer system allows the particular individual access to the smartphone when the unique identifier at least partially matches the stored identifier.
 18. A system for confirming an identity of an individual, the system comprising: a wearable device comprising: one or more processors operative to receive a unique identifier associated with the individual from one or more sensors; and one or more electronic communication devices operatively coupled to the one or more processors and configured to broadcast a wireless signal comprising the unique identifier associated with the individual wearing the wearable device, wherein the wireless signal is configured to be received by a remote computer system that uses the unique identifier to compare to a stored identifier for the individual so that the remote computer system can allow the individual access to one of the remote computer system, a secure area associated with the remote computer system, or a payment system associated with the remote computer system.
 19. The system of claim 18, further comprising the remote computer system comprising: one or more processors; memory operatively coupled to the one or more processors; and one or more electronic communication devices that is operatively coupled to the one or more processors of the remote computer system, wherein the remote computer system is configured to: receive the wireless signal from the computerized eyewear containing the unique identifier associated with the individual; at least partially in response to receiving the wireless signal, compare the unique identifier with a stored identifier for the individual; and at least partially in response to determining that the unique identifier at least partially matches the stored identifier, allow the individual access to one of the remote computer system, the secure area associated with the remote computer system, or the payment system associated with the remote computer system.
 20. The system of claim 18, wherein the wearable device is selected from a group consisting of: one or more contact lenses; a wristwatch; at least a portion of a shirt; at least a portion of a pair of pants; at least a portion of an undergarment; at least a portion of a shirt; at least a portion of a compression sleeve; at least a portion of footwear; at least a portion of a hat; at least a portion of a helmet; at least a portion of an orthopedic cast; an adhesive bandage; and a piece of jewelry. 