METHOD AND DEVICE FOR SECURELY SHARING IMAGES ACROSS UNTRUSTED CHANNELS
First Claim
1. A method comprising:
- downloading an encrypted image and an image of an authorized user to a computing device;
receiving an image of a current user of the computing device from a camera communicatively coupled to the computing device;
authenticating the current user by performing a facial recognition procedure on the image of the current user using the image of the authorized user to verify that the current user is the authorized user;
determining whether the authenticated current user is authorized to view a decrypted image of the encrypted image; and
in response to the authenticated current user being authorized to view the decrypted image, (i) decrypting the encrypted image and (ii) displaying the decrypted image on the computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and device for securely sharing images across untrusted channels includes downloading an encrypted image from a remote server to a computing device. The encrypted image may be encrypted at the time of uploading by another user. The current user of the computing device is authenticated using a facial recognition procedure. If the current user is authenticated and is determined to be authorized to view the decrypted image, the encrypted image is decrypted and displayed to the user. If the user becomes unauthenticated (e.g., the user leaves the computing device or another user replaces the current user), the encrypted image is displayed in place of the encrypted image such that the decrypted image is displayed only for authorized persons physically present at the computing device.
15 Citations
24 Claims
-
1. A method comprising:
-
downloading an encrypted image and an image of an authorized user to a computing device; receiving an image of a current user of the computing device from a camera communicatively coupled to the computing device; authenticating the current user by performing a facial recognition procedure on the image of the current user using the image of the authorized user to verify that the current user is the authorized user; determining whether the authenticated current user is authorized to view a decrypted image of the encrypted image; and in response to the authenticated current user being authorized to view the decrypted image, (i) decrypting the encrypted image and (ii) displaying the decrypted image on the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 9, 10, 11, 12, 13)
-
-
8. (canceled)
-
14. A computing device comprising:
-
a processor graphics circuitry; a processor; and a memory having stored therein a plurality of instructions that, in response to being executed by the processor, causes the processor to; download a webpage including an encrypted image and an image of an authorized user that is authorized to view the decrypted image; determine whether a current user of the computing device is authorized to view a decrypted image of the encrypted image as a function of the current user being authenticated by performing a facial recognition procedure on a real-time image of the current user; and in response to the current user being authorized to view the decrypted image, (i) decrypt the encrypted image and (ii) display the decrypted image on the computing device, wherein the processor graphics circuitry is to perform the facial recognition procedure on the real-time image of the current user to verify that the current user is the authorized user. - View Dependent Claims (20, 21, 22, 23)
-
-
15-16. -16. (canceled)
-
24-26. -26. (canceled)
Specification