System and method for concealing sensitive data on a computing device
First Claim
1. A computer-implemented method for displaying potential eavesdroppers when hiding sensitive information, the method comprising:
- commencing, at one or more processors in a first computing device, an eavesdropping detection functionality in response to detecting a trigger event;
directing, by the one or more processors in the first computing device, a camera mounted on the first computing device to capture one or more images including one or more persons looking at or potentially viewing a display screen on the first computing device;
analyzing, by the one or more processors in the first computing device, the one or more images to detect an unauthorized viewer or eavesdropper is viewing, or potentially viewing, the display screen on the first computing device for more than a threshold duration of at least one second; and
transmitting, by the one or more processors in the first computing device, the one or more images which include the unauthorized viewer or the eavesdropper to a second computing device to be displayed to a user on the second computing device.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer-implemented method may conceal sensitive data displayed within a viewport of a display of a client computing device, such as sensitive data relating to auto, home, life, or renters insurance, banking, and/or vehicle loans. In one aspect, the method may receive a user credential authenticating a user of the computing device and determine that a sensitive data flag has been triggered. The sensitive data flag may indicate that sensitive user data is displayed within a viewport of the computing device. The method may also initiate a biometric detection service, application, and/or functionality in response to determining that the sensitive data flag has been triggered and detect a first biometric identifier belonging to the user of the computing device. The method may further detect a second biometric identifier belonging to someone other than the user, and obscure the sensitive user data displayed within the viewport of the computing device.
45 Citations
17 Claims
-
1. A computer-implemented method for displaying potential eavesdroppers when hiding sensitive information, the method comprising:
-
commencing, at one or more processors in a first computing device, an eavesdropping detection functionality in response to detecting a trigger event; directing, by the one or more processors in the first computing device, a camera mounted on the first computing device to capture one or more images including one or more persons looking at or potentially viewing a display screen on the first computing device; analyzing, by the one or more processors in the first computing device, the one or more images to detect an unauthorized viewer or eavesdropper is viewing, or potentially viewing, the display screen on the first computing device for more than a threshold duration of at least one second; and transmitting, by the one or more processors in the first computing device, the one or more images which include the unauthorized viewer or the eavesdropper to a second computing device to be displayed to a user on the second computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A mobile device for displaying potential eavesdroppers when hiding sensitive information, the mobile device comprising a processor configured to:
-
commence an eavesdropping detection functionality in response to detecting a trigger event; direct a camera mounted on the mobile device to capture one or more images including one or more persons looking at or potentially viewing a display screen on the mobile device; analyze the one or more images to detect an unauthorized viewer or eavesdropper is viewing, or potentially viewing, the display screen on the mobile device for more than a threshold duration of at least one second; generate a push notification message indicative of potential eavesdropping; and transmit from a mobile device transceiver the push notification message to a smart watch also associated with the user to alert the user that a potential eavesdropper may be viewing the user'"'"'s mobile device display screen. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A computer system for detecting and displaying potential eavesdroppers, such as when displaying or hiding sensitive information on a mobile device display screen, the computer system comprising:
-
a mobile device having a processor, memory, front facing camera, a transceiver, and a display screen; and a smart watch having a processor, memory, a transceiver, and a display screen, wherein the mobile device processor is configured to (i) direct the front facing camera to acquire one or more images;
(ii) detect a face or eyes of a potential eavesdropper in the one or more images to determine that the potential eavesdropper is viewing the display screen of the mobile device for more than a threshold duration at least one second;
(iii) compare the one or more images of the potential eavesdropper with a list of images of authorized users of the mobile device to confirm that the potential eavesdropper is an unrecognized or unauthorized user of the mobile device; and
(iv) when an unrecognized or unauthorized user of the mobile device has been identified within the images by the processor, generate an electronic notification indicative of potential eavesdropping and transmit the electronic notification via wireless communication and/or data transmission using the transceiver to the transceiver of the smart watch;and the smart watch is configured to receive the electronic notification via the smart watch transceiver from the mobile device transceiver and display the electronic notification on the smart watch display screen to alert the user of potential eavesdropping of information being displayed on the mobile device via the smart watch. - View Dependent Claims (15, 16, 17)
-
Specification