CONTROLLING ACCESS TO DIGITAL IMAGES POST-TRANSMISSION
First Claim
1. A method for controlling access to a digital image, the method comprising the steps of:
- a first computing device receiving a digital image from a second computing device;
the first computing device storing the digital image in local storage on the first computing device;
the first computing device displaying the digital image to an authorized user in a first user interface provided by the first computing device;
subsequently, the first computing device receiving instructions from the second computing device to disallow the digital image from being displayed in the first user interface; and
responsive to receiving the instructions from the second computing device, the first computing device deleting the digital image from local storage on the first computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments of the present invention provide a system, method, and program product for controlling access to a digital image. A first computing device receives a digital image from a second computing device. The first computing device stores the digital image in local storage on the first computing device. The first computing device displays the digital image to an authorized user in a first user interface provided by the first computing device. Subsequently, in response to receiving instructions from the second computing device, the first computing device deletes the digital image from local storage on the first computing device. The first computing device can transmit a second digital image to another computing device for display in a user interface and, subsequently, transmit instructions to the other computing device that, when received, cause the other computing device to delete the digital image from local storage.
17 Citations
20 Claims
-
1. A method for controlling access to a digital image, the method comprising the steps of:
-
a first computing device receiving a digital image from a second computing device; the first computing device storing the digital image in local storage on the first computing device; the first computing device displaying the digital image to an authorized user in a first user interface provided by the first computing device; subsequently, the first computing device receiving instructions from the second computing device to disallow the digital image from being displayed in the first user interface; and responsive to receiving the instructions from the second computing device, the first computing device deleting the digital image from local storage on the first computing device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer system for controlling access to a digital image, the computer system comprising:
-
one or more processors; at least one tangible, computer-readable memory for storing program instructions which when executed by the processor perform the steps of; receiving a digital image from a second computing device; storing the digital image in local storage; displaying the digital image to an authorized user in a first user interface; subsequently, receiving instructions from the second computing device to disallow the digital image from being displayed in the first user interface; and responsive to receiving the instructions from the second computing device, deleting the digital image from local storage. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product for controlling access to a digital image, the computer program product comprising:
-
one or more computer-readable tangible storage media and program instructions stored on at least one of the one or more storage media which when executed by a processor perform the steps of; receiving a digital image from a second computing device; storing the digital image in local storage; displaying the digital image to an authorized user in a first user interface; subsequently, receiving instructions from the second computing device to disallow the digital image from being displayed in the first user interface; and responsive to receiving the instructions from the second computing device, deleting the digital image from local storage. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification