Browse Prior Art Database

Method and System for Logging Visual Breach of Sensitive Data on a Screen of a Device

IP.com Disclosure Number: IPCOM000199076D
Publication Date: 2010-Aug-25
Document File: 1 page(s) / 19K

Publishing Venue

The IP.com Prior Art Database

Abstract

A method and system for logging visual breach of sensitive data on a screen of a device is disclosed. The method involves determining portions of the sensitive data being compromised due to the visual breach. Further, the method identifies an offender causing the visual breach using a camera or an iris/biometric scanning technology.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 80% of the total text.

Page 1 of 1

Method and System for Logging Visual Breach of Sensitive Data on a Screen of a

Device

Disclosed is a method and system for logging visual breach of sensitive data on a screen of a device. The method involves determining portions of the sensitive data being compromised due to the visual breach. Further, the method identifies an offender causing the visual breach using a camera or an iris/biometric scanning technology.

The system includes a logging apparatus for logging visual breach of sensitive data on the screen of the device. The sensitive data may be a document or an application displayed on the screen of the device. The logging apparatus is configured to track portions of a document being viewed by a user on the screen of the device. In other words, the logging apparatus tracks information pertaining to a document being viewed by the user. For example, the information pertaining to the document may be document name, page number of the document, line number on a page, and images in the document. In addition to tracking the information pertaining to the document being viewed by the user, the logging apparatus also records portions of the document being visually breached by an offender. Further, the logging apparatus records the portions of the document for an entire duration of the visual breach.

The system also captures an identity of an offender performing a visual breach on the screen. In an embodiment, the identity of the offender is captured by taking a ph...