Wearable Computing: Yuanfang Cai Dec. 6, 2000

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 25

Wearable Computing

Yuanfang Cai
Dec. 6, 2000
Discussion Outline

What is Wearable computing


Wearable computing implementation
Wearable computing Networking
Wearable computing and Ubiquitous computing
What is wearable computing

 Wearable
 Portable while
operational
 Hand-free or one-
handed operation
 unobtrusive
 Augmented reality
 situation aware
>>Wearable Computer Implementation

Overall System Block Diagram :

Input Device Display Device

Com port VGA out


Frame grabber

Network card
Wireless
Wireless
Network
Network
Video Camera Main Unit

Parallel port Back plane

Low Power Indicator Power Supply


>>Wearable Computer Implementation>>Input Device

 speech recognizer
 keyboard alternative including chording keyboards and special
purpose keyboards
 mouse alternatives including trackballs, joysticks
 tab alternatives including buttons, dial
 eye trackers
 head trackers
 pen
 gesturing
 bar code reader
 video capture devices, microphones, GPS locators
 other exotic devices such as skin sensors
>>Wearable Computer Implementation>>Input Device

Wireless Finger Ring

 Detection of finger-tip typing


 Wireless Link
 Block Diagrams
 Chording METHOD
Wearable Computer Implementation>>Input Device

Wireless finger Ring>>Detection of finger-tip typing


Wearable Computer Implementation>>Input Device

Wireless finger Ring>>Wireless Link


Wearable Computer Implementation>>Input Device

Wireless finger Ring>>Block Diagrams


Wearable Computer Implementation>>Input Device

Wireless finger Ring>>Chording Method


>>Wearable Computer Implementation>>Output
Device

head mounted displays (HMDs)


flat panels, text to speech
tactile output
non speech auditory output
paper and olfactory output (scent)
>>Wearable Computer Implementation>>Output
Device

Augmented Reality

Typical Augmented Reality System


Display Technologies in Augmented
Reality
>>Wearable Computer Implementation>>Output
Device

Augmented Reality>> Typical Augmented Reality System


>>Wearable Computer Implementation>>Output
Device

Augmented Reality>> Display Technologies in Augmented Reality

Video See-through Augmented Reality Display


Optical See-through Augmented Reality Display
>>Wearable Computer Networking

General Security
requirements requirements

 Short-ranged  Privacy
 Simple in design  Data Confidentiality
 Low power consumption  Data integrity
 Self-configuration  Access Control
 Restricted to the user  Availability
 Security  Source Authentication
>>Wearable Computer Networking

BlueTooth Security>>Security Architecture


>>Wearable Computer Networking

BlueTooth Security>>Key Management


PIN PIN

E2 E2

Authenticati
on
Link Key Link Key

E3 E3
Encryption

Encryption Key Encryption Key

Encryption and Key Control


>>Wearable Computer Networking

BlueTooth Security>>Authentication

Verifier Verifier
(User A) (User B)

SRES’ = E(key, IDB, RAND) RAND SRES = E(key, IDB,


RAND)

SRES

Checks:SRES’ = SRES
Challenge-response for symmetric key
system
Wearable Computing & Ubiquitous
Computing

 Properties and Problems with Ubiquitous


Computing
 Privacy issues
 Difficulty with personalized information:
 Properties and Problem with Wearable
Computing

 Localized information:

 Localized control

 Resource management:

 The Combination-Hive and Locust Swarm


 A General Scenario
Wearable Computing & Ubiquitous
Computing
 Properties and Problems with Ubiquitous Hi all, I am Mike,
Computing your new Boss
 Privacy issues
 Difficulty with personalized information:

I am Tom !

Tom:
Oh, it’s Tom Oh, it’s Tom
Me Too! Tom:
Age:
Let me25 check Let me check
OK, let me check
It’s really My god, a new man!
my databse Age:
OK,25I my
will play
databse
Email:
his email
troublesome! I have
thistosong
update
[email protected] Favorite Song:
my database!
My heart will go
on
Wearable Computing & Ubiquitous
Computing
Properties and Problem with Wearable Computing

I am Tom !
OK, I will play
this song

Tom:

OK, let me check Age: 25


his email Favorite Song:
My heart will go on
Email: [email protected]
Wearable Computing & Ubiquitous
Computing
Properties and Problem with Wearable Computing
 1. Localized information:
 2. Localized control

Where
A New is the
device!
I am
printer’s Tom !
driver?
It should be
shouldto
added I my DB.
install it?

Device Table:
Device Table:
--------------------
--------------------
1.Computer
1.Computer
2.Recorder
2.Recorder
3.Printer
Wearable Computing & Ubiquitous
Computing
Properties and Problem with Wearable Computing

 Resource management:
Hi all, I am Mike

I am Tom ! Oh my,
What should I do?

Tom: Mike:
Age: 25 Age: 30
Favorite Song: Favorite Song:
My heart will go on Salvage Garden
Email: Email:
[email protected] [email protected]
Wearable Computing & Ubiquitous
Computing

The Combination-Hive and Locust Swarm


Why Hive?
 Agents are Autonomous
 Agents are proactive
 Agents can interact
 Agents can be mobile
What is Locust Swarm?
Wearable Computing & Ubiquitous
Computing

You might also like