Image analysis and management
First Claim
1. A method, comprising:
- performing, by a computing device, image analysis on an image stored by the computing device to determine one or more text elements present in the image and one or more graphical elements present in the image;
determining that the image is a work product image based on determining that at least one of the one or more text elements or the one or more graphical elements includes proprietary information; and
responsive to determining that the image is a work product image, restricting image security to prevent unauthorized viewing of the image.
8 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods and apparatuses are described herein that allow an enterprise to analyze and manage work product images that are stored on a mobile device. Employees of an enterprise may use a mobile device to store both work product images (e.g., images of sensitive or proprietary information) and non-work product images (e.g., personal images). An enterprise may desire to enforce security protocols on the work product images, but the employee may not want the security protocols applied to the non-work product images. In some embodiments, by installing and executing an image manager that is able to analyze and manage images, the enterprise can enforce security protocols on only the work product images. Such security protocols may include the prevention of unauthorized viewing of the work product image (e.g., by encrypting the work product image) or deleting any work product image from the mobile device when the employee'"'"'s employment has ended.
-
Citations
20 Claims
-
1. A method, comprising:
-
performing, by a computing device, image analysis on an image stored by the computing device to determine one or more text elements present in the image and one or more graphical elements present in the image; determining that the image is a work product image based on determining that at least one of the one or more text elements or the one or more graphical elements includes proprietary information; and responsive to determining that the image is a work product image, restricting image security to prevent unauthorized viewing of the image. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
performing, by a computing device, image analysis on an image stored by the computing device to determine one or more text elements present in the image and one or more graphical elements present in the image; determining that the image is a work product image based on an analysis of the one or more text elements and the one or more graphical elements that determines presence of proprietary information in at least one of the one or more text elements or the one or more graphical elements; and responsive to determining that the image is a work product image, restricting image security to prevent unauthorized viewing of the image. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An apparatus, comprising:
-
one or more processors; and memory storing executable instructions configured to, when executed by the one or more processors, cause the apparatus to; perform image analysis on an image stored by the apparatus to determine one or more text elements present in the image and one or more graphical elements present in the image; determine that the image is a work product image based on an analysis of the one or more text elements and the one or more graphical elements that determines presence of proprietary information in at least one of the one or more text elements or the one or more graphical elements; and responsive to determining that the image is a work product image, restrict image security to prevent unauthorized viewing of the image. - View Dependent Claims (20)
-
Specification