Video-based privacy supporting system
First Claim
1. A computer-controlled system for regulating the interaction between a computer and a user of said computer based on the environment of said computer and said user, said computer-controlled system comprising:
- a data input device and a data output device, each of said data input device and said data output device in electronic communication with said computer;
an image sensor, said image sensor being configured to collect facial recognition data proximate to said computer, said image sensor being further configured to communicate said facial recognition data to a security processor, wherein said facial recognition data comprises user data of said user and unauthorized user data of an unauthorized user;
a user security parameter database, said database including data encoding security parameters associated with said user and said unauthorized user, and said database configured to communicate with said security processor; and
said security processor configured to receive said facial recognition data and said security parameters associated with said user and said unauthorized user to (i) determine a calibrated attention point of said user with respect to said data output device and substantially locate said calibrated attention point of said user with respect to said data output device, and (ii) determine an unauthorized attention point of said unauthorized user, said security processor being further configured to at least partially control the operation of said data input device and said data output device in response to said calibrated attention point of said user and said unauthorized attention point of said unauthorized user.
7 Assignments
0 Petitions
Accused Products
Abstract
Computer display privacy and security for computer systems. In one aspect, the invention provides a computer-controlled system for regulating the interaction between a computer and a user of the computer based on the environment of the computer and the user. For example, the computer-controlled system provided by the invention comprises an input-output device including an image sensor configured to collect facial recognition data proximate to the computer. The system also includes a user security parameter database encoding security parameters associated with the user; the database is also configured to communicate with the security processor. The security processor is configured to receive the facial recognition data and the security parameters associated with the user, and is further configured to at least partially control the operation of the data input device and the data output device in response to the facial recognition data and the security parameters associated with the user.
32 Citations
20 Claims
-
1. A computer-controlled system for regulating the interaction between a computer and a user of said computer based on the environment of said computer and said user, said computer-controlled system comprising:
-
a data input device and a data output device, each of said data input device and said data output device in electronic communication with said computer; an image sensor, said image sensor being configured to collect facial recognition data proximate to said computer, said image sensor being further configured to communicate said facial recognition data to a security processor, wherein said facial recognition data comprises user data of said user and unauthorized user data of an unauthorized user; a user security parameter database, said database including data encoding security parameters associated with said user and said unauthorized user, and said database configured to communicate with said security processor; and said security processor configured to receive said facial recognition data and said security parameters associated with said user and said unauthorized user to (i) determine a calibrated attention point of said user with respect to said data output device and substantially locate said calibrated attention point of said user with respect to said data output device, and (ii) determine an unauthorized attention point of said unauthorized user, said security processor being further configured to at least partially control the operation of said data input device and said data output device in response to said calibrated attention point of said user and said unauthorized attention point of said unauthorized user.
-
-
2. The system of claim 1, wherein said data input device and said data output device include at least one of a video display or a microphone.
-
3. The system of claim 2, wherein said system includes a video display.
-
4. The system of claim 3, wherein said facial recognition data includes image data relevant to determining the presence of a third party in a region behind said user.
-
5. The system of claim 4, wherein said security processor is configured to display a warning upon detecting the presence of a third party in said region.
-
6. The system of claim 5, wherein said warning comprises an image of said third party.
-
7. The system of claim 4, wherein said security processor is configured to modify the operation of said video display upon detecting the presence of a third party in said region.
-
8. The system of claim 4, wherein said system includes a microphone for collecting sounds from said user, and said security processor is configured to modify the operation of said microphone upon detecting the presence of a third party in said region.
-
9. The system of claim 3, wherein said image sensor device is further configured to track said user'"'"'s gaze on said display, and said security processor is configured to modify the operation of said video display upon detecting that said user'"'"'s gaze is not on said video display.
-
10. The system of claim 9, wherein said system includes a microphone for collecting sounds from said user, and said security processor is configured to modify the operation of said microphone upon detecting that said user'"'"'s gaze is not on said video display.
-
11. The system of claim 1, wherein said user security parameter database is at a location remote from said computer.
-
12. A method for regulating the interaction between a computer and a user of said computer based on the environment of said computer and said user, said method comprising:
-
obtaining facial recognition data from an image sensor device configured to collect facial recognition data, said image sensor being configured to communicate said facial recognition data to a security processor and pass said facial recognition data to said security processor, wherein said facial recognition data comprises user data of said user and unauthorized user data of an unauthorized user; receiving user security parameters from a user security parameter database including data encoding security parameters associated with said user and said unauthorized user at said security processor; and using said security processor to (i) determine a calibrated attention point of said user with respect to a data output device and substantially locate said calibrated attention point of said user with respect to said data output device in electronic communication with said computer, (ii) determine an unauthorized attention point of said unauthorized user, and (iii) at least partially control the operation of at least one of a data input device and said data output device connected with said computer in response to said calibrated attention point of said user and said unauthorized attention point of said unauthorized user.
-
-
13. The method of claim 12, including detecting the presence of a third party in a region extending behind said user.
-
14. The method of claim 13, including displaying a warning to said user in response to detecting the presence of a third party in said region, or modifying the operation of at least one of said data output device and said data input device comprising a video display device or a microphone connected to said computer, or any combination thereof, in response to said detecting the presence of a third party in said region.
-
15. The method of claim 12, including detecting that said user'"'"'s gaze has moved away from a video display device connected with said computer.
-
16. The method of claim 15, including detecting the presence of a third party in a region extending behind said user, and displaying a warning to said user in response to said detecting the presence of a third party in said region, or modifying the operation of at least one of a video display device or a microphone connected to said computer, or any combination thereof, in response to said detecting the presence of a third party in said region.
-
17. A non-transitory computer-readable medium containing computer-readable program control devices thereon, said computer-readable program control device being configured to enable a computer to:
-
obtain facial recognition data from an image sensor device configured to collect facial recognition data, said image sensor being further configured to communicate said facial recognition data to a security processor and pass said facial recognition data to said security processor, wherein said facial recognition data comprises user data of said user and unauthorized user data of an unauthorized user; receive user security parameters from a user security parameter database including data encoding security parameters associated with said user and said unauthorized user at said security processor; and enable said security processor to (i) determine a calibrated attention point of said user with respect to a data output device and substantially locate said calibrated attention point of said user with respect to said data output device in electronic communication with said computer, (ii) determine an unauthorized attention point of said unauthorized user, and (iii) at least partially control the operation of a least one of a data input device and said data output device in response to said calibrated attention point of said user and said unauthorized attention point of said unauthorized user.
-
-
18. The non-transitory computer-readable medium of claim 17, wherein said computer-readable program control devices are further configured to cause said security processor to display a warning to said user, or modify the operation of at least one of said data output device and said data input device comprising a video display device or a microphone connected to said computer, or any combination thereof, in response to detecting the presence of a third party in a region proximate to said computer.
-
19. The non-transitory computer-readable medium of claim 17, wherein said computer-readable program control devices are further configured to enable said security processor to determine that said user'"'"'s gaze has moved away from a video display device connected with said computer.
-
20. The non-transitory computer-readable medium of claim 19, wherein said computer-readable program control devices are further configured to enable said security processor to display a warning to said user, or modify the operation of at least one of a video display device or a microphone connected to said computer, or any combination thereof, in response to detecting the presence of a third party in a region proximate to said computer.
Specification