Continuous digital content protection
First Claim
Patent Images
1. A computer-implemented method, comprising:
- acquiring an image of a user seeking to access protected content on a computing device from a camera of the computing device after successful authentication and authorization of the user;
embedding the image into the protected content as a visible watermark;
initiating presentation of the protected content;
monitoring one or more sensors of the computing device during presentation of the protected content; and
halting presentation of the protected content in response to detecting a change in a number of users of the protected content detected as a function of data from the one or more of the sensors.
2 Assignments
0 Petitions
Accused Products
Abstract
Data from one or more sensors of a computing device can be employed to provide continuous protection of digital content. After user authentication and authorization, sensor data can be utilized to control access to protected content. More specifically, sensor data can be employed as a basis for initially providing an authorized user access to protected content and subsequently terminating access to the protected content. For additional security, content can be embedded with user identifying information in the form of a watermark. Further, such user identifying information can be provided to a content owner identifying one or more users who viewed the content.
26 Citations
22 Claims
-
1. A computer-implemented method, comprising:
-
acquiring an image of a user seeking to access protected content on a computing device from a camera of the computing device after successful authentication and authorization of the user; embedding the image into the protected content as a visible watermark; initiating presentation of the protected content; monitoring one or more sensors of the computing device during presentation of the protected content; and halting presentation of the protected content in response to detecting a change in a number of users of the protected content detected as a function of data from the one or more of the sensors. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-readable storage medium having instructions stored thereon that enable at least one processor to perform a method upon execution of the instructions, the method comprising:
-
acquiring a first image of a user seeking to open protected content on a computing device from a camera of the computing device after successful authentication and authorization of the user; determining how many faces are present in the first image; opening the protected content if solely one face is present in the first image; and embedding the first image into the protected content as a visible watermark. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A computer system, comprising:
-
one or more processors; one or more computer-readable hardware storage devices having stored thereon computer-executable instructions that are executable by the one or more processors to cause the computer system to control access to protected content, and further to cause the computer system to perform at least the following; receive a request to access protected content, wherein the request includes a set of user credentials; identify a user based on the received set of user credentials; using one or more hardware sensors of the computer system, continuously monitor a plurality of factors that are associated with the access of the protected content, wherein the plurality of factors that are monitored includes counting a number of persons having a particular proximity and particular orientation relative to the computer system; analyze the continuously monitored factors to detect whether one or more conditions that compromise the protected content are present; and upon detecting a condition in which the analysis indicates that the one or more conditions are present, terminate access to the protected content. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A computer system, comprising:
-
one or more processors; one or more computer-readable hardware storage devices having stored thereon computer-executable instructions that are executable by the one or more processors to cause the computer system to control access to protected content, and further to cause the computer system to perform at least the following; acquire an image of a user seeking to access protected content on a computing device from a camera of the computing device after successful authentication and authorization of the user; embed the image into the protected content as a visible watermark; initiate presentation of the protected content; monitor one or more sensors of the computing device during presentation of the protected content; and halt presentation of the protected content in response to detecting a change in a number of users of the protected content detected as a function of data from the one or more of the sensors.
-
Specification