Browse Prior Art Database

Selection of privacy policy based on environment (e.g. multiple viewers, etc) and content metadata

IP.com Disclosure Number: IPCOM000237761D
Publication Date: 2014-Jul-09
Document File: 1 page(s) / 20K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed are a method and system that enable applications, which display private or confidential data, to detect a potential violation of privacy and prompt the applications to protect the data.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 95% of the total text.

Page 01 of 1

Selection of privacy policy based on environment (e.g. multiple viewers, etc) and content metadata

With the advent of mobile computing, more working professionals are starting to carry confidential data on mobile devices in public places. Viewing confidential data in a public setting requires the person to actively monitor the environment to maintain privacy and confidentiality.

A solution is needed to enable the computing device and application to protect the privacy when it detects a potential threat to the confidentiality.

Disclosed are a method and system that enable applications, which display private or confidential data, to detect a potential violation of privacy and prompt the applications to protect the data. This system obscures only the data that has been marked private or confidential, rather than the whole screen, and prevents the use of specific system instruments (e.g., camera, microphone, etc.).

The system works as follows

1. The system, using existing technology (e.g., face recognition using the camera, and voice recognition using the system microphone), identifies the authorized user

2. The user sets individual applications to be in a privacy mode (e.g., privacy mode on a web browser) or to view data marked as confidential

3. When the system detects a threat to privacy or confidentiality, it alerts the applications running in privacy mode or viewing confidential data to protect against the threat by obscuring only the confidential data or priva...