CONTINUOUS DIGITAL CONTENT PROTECTION
First Claim
1. A computer-implemented method, comprising:
- monitoring one or more sensors of a computing device during presentation of protected digital content with the computing device; and
halting presentation of the protected digital content in response to detecting a change in number of users of the protected digital content detected as a function of data from the one or more of the sensors.
3 Assignments
0 Petitions
Accused Products
Abstract
Data from one or more sensors of a computing device can be employed to provide continuous protection of digital content. After user authentication and authorization, sensor data can be utilized to control access to protected content. More specifically, sensor data can be employed as a basis for initially providing an authorized user access to protected content and subsequently terminating access to the protected content. For additional security, content can be embedded with user identifying information in the form of a watermark. Further, such user identifying information can be provided to a content owner identifying one or more users who viewed the content.
97 Citations
20 Claims
-
1. A computer-implemented method, comprising:
-
monitoring one or more sensors of a computing device during presentation of protected digital content with the computing device; and halting presentation of the protected digital content in response to detecting a change in number of users of the protected digital content detected as a function of data from the one or more of the sensors. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system, comprising:
-
a processor coupled to a memory, the processor configured to execute the following computer-executable components stored in the memory; a first component configured to initiate authorization of a user seeking access to protected content with one or more user credentials; a second component configured to analyze data from one or more sensors accessible by a computing device of the user; and a third component configured to unlock protected content for presentation by the computing device after successful authorization and detection of a single user of the computing device by the second component. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computer-readable storage medium having instructions stored thereon that enable at least one processor to perform a method upon execution of the instructions, the method comprising:
-
acquiring a first image of a user seeking to open a protected content on a computing device from a camera of the computing device after successful authentication and authorization of the user; determining how many faces are present in the image; and opening the protected content if solely one face is present in the image. - View Dependent Claims (17, 18, 19, 20)
-
Specification