Data protection based on user and gesture recognition
First Claim
Patent Images
1. A computing device, comprising:
- at least one processor circuit configured to receive image data from one or more image capturing devices connected to or integrated with the computing device and to analyze the image data to determine a number of persons located proximate to the computing device; and
the at least one processor circuit being further configured to determine if the number of persons located proximate to the computing device exceeds a threshold value, to activate a first mode of operation of the computing device in response to a determination that the number of persons located proximate to the computing device does not exceed the threshold value, and to activate a second mode of operation of the computing device in response to a determination that the number of persons located proximate to the computing device exceeds the threshold value, the first mode of operation of the computing device being a mode in which sensitive data stored on the computing device and non-sensitive data stored on the computing device are both visible and accessible to a user, and the second mode of operation of the computing device being a mode in which the non-sensitive data stored on the computing device is visible and accessible to the user and the sensitive data stored on the computing device is rendered one or more of invisible to the user and inaccessible to the user,the second mode of operation being a mode in which at least one item of sensitive data is rendered invisible to the user or inaccessible to the user by performing one or more of;
hard deleting the item of sensitive data;
soft deleting the item of sensitive data;
orcausing file system requests for the item of sensitive data to be ignored.
2 Assignments
0 Petitions
Accused Products
Abstract
A computing device is described herein that automatically enters a data protection mode in response to determining that a certain number of persons are located proximate to the computing device, that an owner or authorized user is not located proximate to the computing device, or that a certain user gesture has or has not been recognized. When the device enters the data protection mode, sensitive data stored on the device is automatically rendered invisible and/or inaccessible to a user thereof. The sensitive data may be rendered invisible and/or inaccessible in a manner that is not likely to be apparent to the user of the computing device.
-
Citations
17 Claims
-
1. A computing device, comprising:
-
at least one processor circuit configured to receive image data from one or more image capturing devices connected to or integrated with the computing device and to analyze the image data to determine a number of persons located proximate to the computing device; and the at least one processor circuit being further configured to determine if the number of persons located proximate to the computing device exceeds a threshold value, to activate a first mode of operation of the computing device in response to a determination that the number of persons located proximate to the computing device does not exceed the threshold value, and to activate a second mode of operation of the computing device in response to a determination that the number of persons located proximate to the computing device exceeds the threshold value, the first mode of operation of the computing device being a mode in which sensitive data stored on the computing device and non-sensitive data stored on the computing device are both visible and accessible to a user, and the second mode of operation of the computing device being a mode in which the non-sensitive data stored on the computing device is visible and accessible to the user and the sensitive data stored on the computing device is rendered one or more of invisible to the user and inaccessible to the user, the second mode of operation being a mode in which at least one item of sensitive data is rendered invisible to the user or inaccessible to the user by performing one or more of; hard deleting the item of sensitive data; soft deleting the item of sensitive data;
orcausing file system requests for the item of sensitive data to be ignored. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for protecting sensitive data stored on a computing device, comprising:
-
receiving image data from one or more image capturing devices connected to or integrated with the computing device; analyzing the image data to determine if an owner or authorized person is located proximate to the computing device; in response to a determination that the owner or authorized person is located proximate to the computing device, activating a first mode of operation of the computing device in which sensitive data stored on the computing device and non-sensitive data stored on the computing device are both visible and accessible to a user; and in response to a determination that the owner or authorized person is not located proximate to the computing device, activating a second mode of operation of the computing device in which the non-sensitive data stored on the computing device is visible and accessible to the user and the sensitive data stored on the computing device is rendered one or more of invisible to the user and inaccessible to the user, the second mode of operation of the computing device being a mode in which at least one item of sensitive data is rendered invisible to the user or inaccessible to the user by performing one or more of; hard deleting the item of sensitive data; soft deleting the item of sensitive data;
orcausing file system requests for the item of sensitive data to be ignored. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer program product comprising a computer-readable memory having computer program logic recorded thereon that when executed by at least one processor causes the at least one processor to perform a method for protecting sensitive data stored on a computing device, the method comprising:
-
receiving image data from one or more image capturing devices connected to or integrated with the computing device; analyzing the image data to determine whether a particular user gesture is recognized; and based on the determination, selectively activating one of a first mode of operation of the computing device in which sensitive data stored on the computing device and non-sensitive data stored on the computing device are both visible and accessible to a user and a second mode of operation of the computing device in which the non-sensitive data stored on the computing device is visible and accessible to the user and the sensitive data stored on the computing device is rendered one or more of invisible to the user and inaccessible to the user, the second mode of operation of the computing device being a mode in which at least one item of sensitive data is rendered invisible to the user or inaccessible to the user by performing one or more of; hard deleting the item of sensitive data; soft deleting the item of sensitive data;
orcausing file system requests for the item of sensitive data to be ignored. - View Dependent Claims (15, 16, 17)
-
Specification