System and method for concealing sensitive data on a computing device
First Claim
1. A computer-implemented method for concealing sensitive data displayed within a viewport of a display of a computing device, the method comprising:
- receiving, via a computer network and/or one or more processors, a user credential authenticating a user of the computing device;
determining, by the one or more processors, that a sensitive data flag has been triggered, wherein the sensitive data flag indicates that sensitive user data is being, or about to be, displayed within a viewport of the computing device;
initiating, by the one or more processors, a biometric detection service, application, or functionality in response to determining that the sensitive data flag has been triggered;
detecting, by the one or more processors, a first biometric identifier belonging to the user of the computing device;
detecting, by the one or more processors, a second biometric identifier belonging to an eavesdropper or someone other than the user of the computing device, andobscuring, via the computer network and/or the one or more processors, the sensitive user data displayed within the viewport of the computing device in response to detecting that the eavesdropper or someone other than the user of the computing device is viewing, or potentially viewing, a display screen of the computing device for more than a threshold duration of at least one second.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method may conceal sensitive data displayed within a viewport of a display of a client computing device, such as sensitive data relating to auto, home, life, or renters insurance, banking, and/or vehicle loans. In one aspect, the method may receive a user credential authenticating a user of the computing device and determine that a sensitive data flag has been triggered. The sensitive data flag may indicate that sensitive user data is displayed within a viewport of the computing device. The method may also initiate a biometric detection service, application, and/or functionality in response to determining that the sensitive data flag has been triggered and detect a first biometric identifier belonging to the user of the computing device. The method may further detect a second biometric identifier belonging to someone other than the user, and obscure the sensitive user data displayed within the viewport of the computing device.
-
Citations
20 Claims
-
1. A computer-implemented method for concealing sensitive data displayed within a viewport of a display of a computing device, the method comprising:
-
receiving, via a computer network and/or one or more processors, a user credential authenticating a user of the computing device; determining, by the one or more processors, that a sensitive data flag has been triggered, wherein the sensitive data flag indicates that sensitive user data is being, or about to be, displayed within a viewport of the computing device; initiating, by the one or more processors, a biometric detection service, application, or functionality in response to determining that the sensitive data flag has been triggered; detecting, by the one or more processors, a first biometric identifier belonging to the user of the computing device; detecting, by the one or more processors, a second biometric identifier belonging to an eavesdropper or someone other than the user of the computing device, and obscuring, via the computer network and/or the one or more processors, the sensitive user data displayed within the viewport of the computing device in response to detecting that the eavesdropper or someone other than the user of the computing device is viewing, or potentially viewing, a display screen of the computing device for more than a threshold duration of at least one second. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer device for concealing sensitive data displayed within a viewport of a display, the method comprising:
-
one or more processors; and one or more memories coupled to the one or more processors;
the one or more memories including non-transitory computer executable instructions stored therein that, when executed by the one or more processors, cause the one or more processors to;determine that a sensitive data flag has been triggered, wherein the sensitive data flag indicates that sensitive user data is being, or about to be, displayed within a viewport of the computing device; initiate a biometric detection service, application, or functionality in response to determining that the sensitive data flag has been triggered; detect a first biometric identifier belonging to the user of the computing device; detect a second biometric identifier belonging to someone other than the user of the computing device, and obscure or blur the sensitive user data being, or about to be, displayed within the viewport of the computing device in response to detecting that someone other than the user of the computing device is viewing, or potentially viewing, a display screen of the computing device for more than a threshold duration of at least one second. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer-implemented method of sensitive information security, the method comprising:
-
determining, by one or more processors, that confidential or sensitive information is about to be, or is currently being, displayed on a display screen or other display of, or associated with a mobile or other computing device of a user; collecting, by the one or more processors, image data from a front facing camera mounted on, or associated with, the mobile or other computing device of the user; determining, by the one or more processors, that a potential eavesdropper or unauthorized user is viewing the display screen or other display from computer analysis of the image data collected; blurring or obscuring, by the one or more processors, the confidential or sensitive information being displayed on the display screen or other display when it is determined that the potential eavesdropper or unauthorized user is viewing the display screen or other display for more than a threshold duration of at least one second; and generating, by the one or more processors, a warning to the user indicating a presence of the potential eavesdropper or unauthorized user when (a) it is determined that the potential eavesdropper or unauthorized user is viewing the display screen or other display, and (b) confidential or sensitive information is about to be displayed, or is being displayed, on the display screen or other display to maintain information security. - View Dependent Claims (17, 18, 19, 20)
-
Specification