Você está na página 1de 25

Wearable Computing

Yuanfang Cai
Dec. 6, 2000
Discussion Outline

What is Wearable computing


Wearable computing implementation
Wearable computing Networking
Wearable computing and Ubiquitous computing
What is wearable computing

 Wearable
 Portable while
operational
 Hand-free or one-
handed operation
 unobtrusive
 Augmented reality
 situation aware
>>Wearable Computer Implementation

Overall System Block Diagram :

Input Device Display Device

Com port VGA out


Frame grabber

Network card
Wireless
Wireless
Network
Network
Video Camera Main Unit

Parallel port Back plane

Low Power Indicator Power Supply


>>Wearable Computer Implementation>>Input Device

 speech recognizer
 keyboard alternative including chording keyboards and special
purpose keyboards
 mouse alternatives including trackballs, joysticks
 tab alternatives including buttons, dial
 eye trackers
 head trackers
 pen
 gesturing
 bar code reader
 video capture devices, microphones, GPS locators
 other exotic devices such as skin sensors
>>Wearable Computer Implementation>>Input Device

Wireless Finger Ring

 Detection of finger-tip typing


 Wireless Link
 Block Diagrams
 Chording METHOD
Wearable Computer Implementation>>Input Device

Wireless finger Ring>>Detection of finger-tip typing


Wearable Computer Implementation>>Input Device

Wireless finger Ring>>Wireless Link


Wearable Computer Implementation>>Input Device

Wireless finger Ring>>Block Diagrams


Wearable Computer Implementation>>Input Device

Wireless finger Ring>>Chording Method


>>Wearable Computer Implementation>>Output
Device

head mounted displays (HMDs)


flat panels, text to speech
tactile output
non speech auditory output
paper and olfactory output (scent)
>>Wearable Computer Implementation>>Output
Device

Augmented Reality

Typical Augmented Reality System


Display Technologies in Augmented
Reality
>>Wearable Computer Implementation>>Output
Device

Augmented Reality>> Typical Augmented Reality System


>>Wearable Computer Implementation>>Output
Device

Augmented Reality>> Display Technologies in Augmented Reality

Video See-through Augmented Reality Display


Optical See-through Augmented Reality Display
>>Wearable Computer Networking

General Security
requirements requirements

 Short-ranged  Privacy
 Simple in design  Data Confidentiality
 Low power consumption  Data integrity
 Self-configuration  Access Control
 Restricted to the user  Availability
 Security  Source Authentication
>>Wearable Computer Networking

BlueTooth Security>>Security Architecture


>>Wearable Computer Networking

BlueTooth Security>>Key Management


PIN PIN

E2 E2

Authenticati
on
Link Key Link Key

E3 E3
Encryption

Encryption Key Encryption Key

Encryption and Key Control


>>Wearable Computer Networking

BlueTooth Security>>Authentication

Verifier Verifier
(User A) (User B)

SRES’ = E(key, IDB, RAND) RAND SRES = E(key, IDB,


RAND)

SRES

Checks:SRES’ = SRES
Challenge-response for symmetric key
system
Wearable Computing & Ubiquitous
Computing

 Properties and Problems with Ubiquitous


Computing
 Privacy issues
 Difficulty with personalized information:
 Properties and Problem with Wearable
Computing

 Localized information:

 Localized control

 Resource management:

 The Combination-Hive and Locust Swarm


 A General Scenario
Wearable Computing & Ubiquitous
Computing
 Properties and Problems with Ubiquitous Hi all, I am Mike,
Computing your new Boss
 Privacy issues
 Difficulty with personalized information:

I am Tom !

Tom:
Oh, it’s Tom Oh, it’s Tom
Me Too! Tom:
Age:
Let me25 check Let me check
OK, let me check
It’s really My god, a new man!
my databse Age:
OK,25I my
will play
databse
Email:
his email
troublesome! I have
thistosong
update
Tt@yahoo.com Favorite Song:
my database!
My heart will go
on
Wearable Computing & Ubiquitous
Computing
Properties and Problem with Wearable Computing

I am Tom !
OK, I will play
this song

Tom:

OK, let me check Age: 25


his email Favorite Song:
My heart will go on
Email: Tt@yahoo.com
Wearable Computing & Ubiquitous
Computing
Properties and Problem with Wearable Computing
 1. Localized information:
 2. Localized control

Where
A New is the
device!
I am
printer’s Tom !
driver?
It should be
shouldto
added I my DB.
install it?

Device Table:
Device Table:
--------------------
--------------------
1.Computer
1.Computer
2.Recorder
2.Recorder
3.Printer
Wearable Computing & Ubiquitous
Computing
Properties and Problem with Wearable Computing

 Resource management:
Hi all, I am Mike

I am Tom ! Oh my,
What should I do?

Tom: Mike:
Age: 25 Age: 30
Favorite Song: Favorite Song:
My heart will go on Salvage Garden
Email: Email:
Tt@yahoo.com Mm@yahoo.com
Wearable Computing & Ubiquitous
Computing

The Combination-Hive and Locust Swarm


Why Hive?
 Agents are Autonomous
 Agents are proactive
 Agents can interact
 Agents can be mobile
What is Locust Swarm?
Wearable Computing & Ubiquitous
Computing

Você também pode gostar