Protecting confidential conversations on devices
First Claim
Patent Images
1. A computer-implemented method comprising:
- receiving, by a first mobile device, user-input data for generation of an electronic message, wherein the electronic message is generated as the user-input data is received;
identifying sensitive information within the electronic message;
securing the sensitive information, wherein securing the sensitive information comprises;
identifying a location of a secured database of the first mobile device, wherein the secured database is a preprogrammed, cryptographically secure area, andstoring the sensitive information in the secured database;
disabling a screen capture function of the first mobile device;
masking the sensitive information, wherein masking the sensitive information includes;
replacing one or more elements of the sensitive information on the first mobile device with one or more associated characters, andgenerating an icon that enables viewing of the sensitive information when selected by a user on a graphical user interface on the first mobile device; and
sending the electronic message to a second mobile device, wherein the electronic message includes the secured sensitive information.
1 Assignment
0 Petitions
Accused Products
Abstract
A first mobile device may receive user-input data for generation of an electronic message. The electronic message may be generated as the user-input data is received. The first mobile device may identify sensitive information, within the electronic message. The first mobile device may secure the sensitive information. The first mobile device may disable a screen capture function of the first mobile device. The first mobile device may send the electronic message to a second mobile device. The sending of the electronic message to the second mobile device may include the sending of the secured sensitive information.
34 Citations
15 Claims
-
1. A computer-implemented method comprising:
-
receiving, by a first mobile device, user-input data for generation of an electronic message, wherein the electronic message is generated as the user-input data is received; identifying sensitive information within the electronic message; securing the sensitive information, wherein securing the sensitive information comprises; identifying a location of a secured database of the first mobile device, wherein the secured database is a preprogrammed, cryptographically secure area, and storing the sensitive information in the secured database; disabling a screen capture function of the first mobile device; masking the sensitive information, wherein masking the sensitive information includes; replacing one or more elements of the sensitive information on the first mobile device with one or more associated characters, and generating an icon that enables viewing of the sensitive information when selected by a user on a graphical user interface on the first mobile device; and sending the electronic message to a second mobile device, wherein the electronic message includes the secured sensitive information. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer program product comprising a computer readable storage medium having program instructions embodied therewith, the program instructions executable by a processor to cause the processor to perform a method, the method comprising:
-
receiving, by a first mobile device, user-input data for generation of an electronic message, wherein the electronic message is generated as the user-input data is received; identifying sensitive information within the electronic message; securing the sensitive information, wherein securing the sensitive information comprises; identifying a location of a secured database of the first mobile device, wherein the secured database is a preprogrammed, cryptographically secure area, and storing the sensitive information in the secured database; disabling a screen capture function of the first mobile device; masking the sensitive information, wherein masking the sensitive information includes; replacing one or more elements of the sensitive information on the first mobile device with one or more associated characters, and generating an icon that enables viewing of the sensitive information when selected by a user on a graphical user interface on the first mobile device; and sending the electronic message to a second mobile device, wherein the electronic message includes the secured sensitive information. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system comprising:
-
a memory; and a processor in communication with the memory, the processor being configured to perform operations comprising; receiving, by a first mobile device, user-input data for generation of an electronic message, wherein the electronic message is generated as the user-input data is received; identifying sensitive information within the electronic message; securing the sensitive information, wherein securing the sensitive information comprises; identifying a location of a secured database of the first mobile device, wherein the secured database is a preprogrammed, cryptographically secure area, and storing the sensitive information in the secured database; disabling a screen capture function of the first mobile device; masking the sensitive information, wherein masking the sensitive information includes; replacing one or more elements of the sensitive information on the first mobile device with one or more associated characters, and generating an icon that enables viewing of the sensitive information when selected by a user on a graphical user interface on the first mobile device; and sending the electronic message to a second mobile device, wherein the electronic message includes the secured sensitive information. - View Dependent Claims (12, 13, 14, 15)
-
Specification