Protecting content on a mobile device from mining
First Claim
Patent Images
1. A mobile device comprising:
- at least one processor;
a display device; and
memory storing instructions that, when executed by the at least one processor, cause the mobile device to perform operations including;
identifying a mining-restriction mark in low order bits or high order bits in a frame buffer of the mobile device,determining whether the mining-restriction mark prevents mining of content, wherein mining includes non-transient storage of a copy or derivations of data in the frame buffer, andpreventing the mining of data in the frame buffer when the mining-restriction mark prevents mining.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods prevent or restrict the mining of content on a mobile device. For example, a method may include identifying a mining-restriction mark in low order bits or high order bits in a frame buffer of a mobile device and determining whether the mining-restriction mark prevents mining of content. Mining includes non-transient storage of a copy or derivations of data in the frame buffer. The method may also include preventing the mining of data in the frame buffer when the mining-restriction mark prevents mining.
-
Citations
14 Claims
-
1. A mobile device comprising:
-
at least one processor; a display device; and memory storing instructions that, when executed by the at least one processor, cause the mobile device to perform operations including; identifying a mining-restriction mark in low order bits or high order bits in a frame buffer of the mobile device, determining whether the mining-restriction mark prevents mining of content, wherein mining includes non-transient storage of a copy or derivations of data in the frame buffer, and preventing the mining of data in the frame buffer when the mining-restriction mark prevents mining. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A mobile device comprising:
-
at least one processor; a display device; and memory storing instructions that, when executed by the at least one processor, generates a user interface configured to; receive a mining-restriction trigger, the mining-restriction trigger being associated by default with a first mining-restriction mark that prevents mining; receive a restriction for the mining-restriction trigger; replace the association of the mining-restriction trigger with the first mining-restriction mark with an association of the mining-restriction trigger with a second mining-restriction mark that permits mining with the restriction; and store the mining-restriction trigger associated with the second mining-restriction mark. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14)
-
Specification