System and method for concealing sensitive data on a computing device
First Claim
1. A computer-implemented method of hiding sensitive information, the method comprising:
- commencing or executing, via one or more processors in a computing device, an eavesdropper detection functionality or application;
detecting, via the one or more processors, an unauthorized viewer or eavesdropper is viewing, or potentially viewing, a display screen associated with the computing device for more than a threshold duration of at least one second;
determining, via the one or more processors, that sensitive or confidential information is being displayed or about to be displayed, on the display screen; and
preventing, via the one or more processors, the unauthorized viewer or eavesdropper from viewing the sensitive or confidential information via the display screen to facilitate hiding sensitive or confidential information.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method may hide sensitive information, such as sensitive information relating to auto, home, life, or renters insurance, banking, and/or vehicle loans. In one aspect, the method may commence or execute an eavesdropper detection functionality or application. The method may also detect an unauthorized viewer or eavesdropper is viewing, or potentially viewing, a display screen associated with the mobile device for more than a threshold duration of at least one second, determine that sensitive or confidential information is being displayed or about to be displayed, on the display screen, and prevent the unauthorized viewer or eavesdropper from viewing the sensitive or confidential information via the display screen to facilitate hiding sensitive or confidential information.
-
Citations
20 Claims
-
1. A computer-implemented method of hiding sensitive information, the method comprising:
-
commencing or executing, via one or more processors in a computing device, an eavesdropper detection functionality or application; detecting, via the one or more processors, an unauthorized viewer or eavesdropper is viewing, or potentially viewing, a display screen associated with the computing device for more than a threshold duration of at least one second; determining, via the one or more processors, that sensitive or confidential information is being displayed or about to be displayed, on the display screen; and preventing, via the one or more processors, the unauthorized viewer or eavesdropper from viewing the sensitive or confidential information via the display screen to facilitate hiding sensitive or confidential information. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A mobile device for hiding sensitive information, the mobile device comprising a processor configured to:
-
commence or execute an eavesdropper detection functionality or application; detect an unauthorized viewer or eavesdropper is viewing, or potentially viewing, a display screen associated with the mobile device for more than a threshold duration of at least one second; determine that sensitive or confidential information is being displayed or about to be displayed, on the display screen; and prevent the unauthorized viewer or eavesdropper from viewing the sensitive or confidential information via the display screen to facilitate hiding sensitive or confidential information. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable memory storing thereon instructions that, when executed by one or more processors, cause the one or more processors to:
-
commence or execute an eavesdropper detection functionality or application; detect an unauthorized viewer or eavesdropper is viewing, or potentially viewing, a display screen associated with a computing device for more than a threshold duration of at least one second; determine that sensitive or confidential information is being displayed or about to be displayed, on the display screen; and prevent the unauthorized viewer or eavesdropper from viewing the sensitive or confidential information via the display screen to facilitate hiding sensitive or confidential information. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification