View images of unauthorized shoulder surfing individuals gazing on specific application or document on your device integrated with front camera by using eye/face recognition technology
Publication Date: 2015-Jun-01
The IP.com Prior Art Database
Disclosed is a security feature in a device which automatically detects potential threats of shoulder surfers or frequent gazers who could harm the user in stealing his data, valuables or targeting to attack him. On detecting the threat, the feature automatically saves or uploads the details like the image of the gazer, location, date, time, frequency of gaze, social profile of gazer, the application or document that was being used at the time of gaze, and any other useful information which can be processed at a later time, in case of a human or device or data security compromise.
Page 01 of 2
View images of unauthorized shoulder surfing individuals gazing on specific application or document on your device integrated with front camera by using eye /face recognition technology
Data Security is of prime importance to all when using a device (like computer, mobile, tablet, ATM, or any other device, etc.). Shoulder surfing is one of the risks that each of us face. We need a more advanced and quicker method of knowing where the threat is coming from. We need more details about the gazer like the picture of the individual who is gazing at the device, location where the gazer was found, data, time and frequency of gazer, social profile of gazer by searching his details from internet, and the application which the user was accessing at the time of gaze.
This feature can be configured to be enabled only for specific applications or documents in the device, as not all applications are confidential. When this feature is enabled for the whole device, it actively monitors the gazers when the device is active.
This is how the feature works :
a) Device owner(s) registers his eye/face with the eye/face recognition tool installed on his device. The registration happens using the camera installed or connected in the device.
b) Device owner(s) selects specific applications or documents which require the eye/face recognition security system to be enabled. He can also enable the security for the whole device.
c) Device owner(s) specifies the actions to be performed. In case of identification of the risk, the actions that need to be formed when using the specific application or document or the security could be for the whole device or individual.
Whenever device owner(s) is using these specific applications or documents or the device, the eye/face recognition software keeps scanning all the unauthorized individuals around the owner, mainly the visible area in front or it keeps scanning individuals behinds the device's camera. If any person is looking at the device for a specified time, the device immediately shows the image of the i...