US20170078529A1 - System and Method for Deterring the Ability of a Person to Capture a Screen Presented on a Handheld Electronic Device - Google Patents

System and Method for Deterring the Ability of a Person to Capture a Screen Presented on a Handheld Electronic Device Download PDF

Info

Publication number
US20170078529A1
US20170078529A1 US15/340,974 US201615340974A US2017078529A1 US 20170078529 A1 US20170078529 A1 US 20170078529A1 US 201615340974 A US201615340974 A US 201615340974A US 2017078529 A1 US2017078529 A1 US 2017078529A1
Authority
US
United States
Prior art keywords
touch screen
image
screen display
electronic device
display
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/340,974
Inventor
Isaac Datikashvili
Nigel Brady
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US15/340,974 priority Critical patent/US20170078529A1/en
Publication of US20170078529A1 publication Critical patent/US20170078529A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/03Arrangements for converting the position or the displacement of a member into a coded form
    • G06F3/041Digitisers, e.g. for touch screens or touch pads, characterised by the transducing means
    • G06F3/0412Digitisers structurally integrated in a display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/14Digital output to display device ; Cooperation and interconnection of the display device with other functional units
    • G06F3/147Digital output to display device ; Cooperation and interconnection of the display device with other functional units using display panels
    • G06K9/00255
    • G06K9/00288
    • G06K9/00624
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/001Image restoration
    • G06T5/002Denoising; Smoothing
    • G06T5/70
    • G06T7/0042
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/70Determining position or orientation of objects or cameras
    • G06T7/73Determining position or orientation of objects or cameras using feature-based methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/161Detection; Localisation; Normalisation
    • G06V40/166Detection; Localisation; Normalisation using acquisition arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • G06V40/172Classification, e.g. identification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N23/00Cameras or camera modules comprising electronic image sensors; Control thereof
    • H04N23/60Control of cameras or camera modules
    • H04N23/62Control of parameters via user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2203/00Indexing scheme relating to G06F3/00 - G06F3/048
    • G06F2203/048Indexing scheme relating to G06F3/048
    • G06F2203/04808Several contacts: gestures triggering a specific function, e.g. scrolling, zooming, right-click, when the user establishes several contacts with the surface simultaneously; e.g. using several fingers or a combination of fingers and pen
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/30Subject of image; Context of image processing
    • G06T2207/30196Human being; Person
    • G06T2207/30201Face
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09GARRANGEMENTS OR CIRCUITS FOR CONTROL OF INDICATING DEVICES USING STATIC MEANS TO PRESENT VARIABLE INFORMATION
    • G09G2358/00Arrangements for display data security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2101/00Still video cameras
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/0077Types of the still picture apparatus
    • H04N2201/0089Image display device

Definitions

  • the present invention relates to software applications that are designed to prevent unauthorized people from capturing information on a screen of a smart phone, tablet, or other handheld electronic device. More particularly, the present invention relates to software applications that prevent selected screens from either being photographed or being captured using a screen shot function.
  • a communications network such as a cellular network or WiFi connections to the World Wide Web.
  • the screen shot function is typically activated by pressing one or more of the controls on the handheld electronic device while an image is on the screen of that device.
  • the screen shot function turns the image on the screen into a picture file that can later viewed. Consequently, images in a screen that appear only for an instant can be readily captured.
  • Encryption protects a message in transit. However, once a message, image or video is decrypted, that screen can be easily captured or photographed. Consequently, encryption does little to prevent a person from capturing an image that is intended to be viewed only once or only for a short time period.
  • the present invention is a system and method that deters a person from capturing the image in the display of a handheld electronic device, such as a smart phone or tablet.
  • the handheld electronic device has a touch screen display. Multiple security parameters are used to ensure the secrecy of any image, such as a text message, email, picture or video, that a user may recall to the touch screen display.
  • One security parameter is a touch security parameter. This requires a person to repeatedly tap the touch screen display with one or two fingers. The touch screen display will only accurately display an image for as long as the tapping continues. This inhibits a person from being able to take a screen shot of the image being displayed.
  • Another security parameter is a camera security parameter. If the handheld electronic device comes with a camera that faces in the same direction as the touch screen display, then a subroutine is run that senses the location of a face in the field of view of the camera. The touch screen display will only accurately show the image for as long as a face is detected in the camera's field of view. If the camera is turned away from a face, the image will distort or fade to black.
  • a third security parameter is a position security parameter.
  • the internal sensors of the handheld electronic device are capable of detecting its pitch and yaw with respect to the downward direction of gravity. If the handheld electronic device is moved outside of a certain predetermined range of acceptable positions, then the image on the display will distort or fade to black.
  • the security parameters ensure that only the person holding the handheld electronic device can consistently view an image on the screen. If the image is turned toward another, the image distorts. Likewise, if a person attempts to take a screen shot, the image distorts. Thus, images can be kept safe from conventional capture techniques.
  • FIG. 1 is a schematic showing the hardware and infrastructure needed to operate the present invention system and method with an administrative screen on a handheld electronic device;
  • FIG. 2 is a block flow diagram of a touch screen security parameter subroutine
  • FIG. 3 is a block flow diagram of camera security parameter subroutine
  • FIG. 4 is a block flow diagram of a position security parameter subroutine
  • FIG. 5 shows the operational range of the handheld electronic device used with the position security parameter subroutine of FIG. 4 .
  • a handheld electronic device 12 is provided that has a touch screen display 14 .
  • a smart phone is illustrated, other handheld electronic devices that run software applications, such as tablet computers, can be substituted provided the handheld electronic device has a touch screen display.
  • the handheld electronic device 12 is coupled to a communications network 16 .
  • the communications network 16 can be either a cellular network or a WiFi connection to the World Wide Web.
  • a software application 18 is downloaded to the handheld electronic device 12 through the communications network 16 .
  • the software application 18 is accessed through a server 20 that runs an access port to an on-line store, such as iTunes® or Google Play®.
  • the application software 18 can be selectively run by the user. As can be seen on the touch screen display 14 of FIG. 1 , once the software application 18 is run, it presents a user with an administration screen 22 .
  • the administration screen 22 enables the user to activate, deactivate, and set values for a variety of security parameters.
  • the security parameters include “expiration”, “time period”, “touch security”, “camera security” and “position security”.
  • the “expiration” security parameter can be selectively activated or deactivated by the user. If deactivated, the “expiration” security parameter has no effect on the functioning of the handheld electronic device 12 . Alternatively, if the “expiration” security parameter is activated, a variable field 26 becomes accessible where the user can enter an expiration period. For example, the user can enter two minutes or ten days as the expiration period. The selected expiration period begins the moment the handheld electronic device 12 receives a particular message, picture or video from the communications network 16 . The user must then view the message, picture or video within the selected expiration period. If the message, picture or video is not viewed within the selected period of time, then the message, picture or video is automatically deleted so it cannot be recalled.
  • the “time period” security parameter can be selectively activated or deactivated by the user. If deactivated, the “time period” security parameter has no effect on the functioning of the handheld computing device 12 . Alternatively, if the “time period” security parameter is activated, a variable field 24 becomes accessible where the user can enter a time period. For example, the user can enter two seconds or two minutes as the time period. The selected time period begins the moment a user calls a particular message, picture or video to the screen. Once the selected expiration period expires, the selected message, picture or video is automatically deleted so it cannot be recalled. As such, a person must view the message picture or video in the selected time period.
  • the “touch security” parameter requires the user to elect between one finger and two fingers.
  • the touch security parameter if activated, requires a user to continuously tap on the touch screen display 14 in order to see a clear image on the display 14 .
  • the continuous tap must be performed at a cycle rate of no longer than one tap every few seconds.
  • the preferred required frequency is at least a few taps every second. If a person stops tapping on the touch screen display 14 , then the display 14 goes dark, fades out of focus, or otherwise renders the image on the touch screen display 14 unreadable.
  • a user activates the touch security parameter and selects either a one finger touch or a two finger touch. If the one finger touch is selected, a user must tap the touch screen display 14 repeatedly with one finger. Thus, there is one tapping event occurring on the touch screen display 14 . The tapping event must occur at or over the required tapping frequency. See Block 36 . As long as the tapping continues at or above the required frequency, the touch screen display 14 accurately displays the message, picture or video. See Block 38 . However, as soon as the tapping stops or becomes inconsistent, the touch screen display 14 goes dark or goes out of focus. See Block 40 .
  • the user must tap the touch screen 14 repeatedly with two fingers.
  • the two tapping events must occur at or above the required minimum tapping frequency. See Block 42 .
  • the touch screen display 14 displays the message, picture or video. See Block 44 .
  • the touch screen display 14 goes dark or goes out of focus. See Block 46 .
  • the tapping of two fingers inevitably requires a person to hold the electronic device 12 with two hands. This makes it very difficult to press any button required for a screen shot without help from another person.
  • the “camera security” parameter can also be selected on the administration screen 22 .
  • the camera security parameter is used on handheld electronic devices 12 that have integrated cameras 48 that face in the same direction as the touch screen display 14 . Referring to FIG. 3 in conjunction with FIG. 1 , it can be seen that once activated, the handheld electronic device 12 runs a face location subroutine 52 that identifies the location of any face in the field of view of the camera 48 . See Block 50 and Block 52 . Many smart phone and tablet computers have such face location subroutines as part of their basic programming package. The face location subroutine enables the camera 48 to locate and automatically focus upon any face as the camera takes a picture or video.
  • the face location subroutine is used as a trigger to the touch display screen 14 .
  • the face location subroutine determines if a face is in the field of view of the camera 48 . See Block 54 . If the face location subroutine does not identify a face in the field of view of the camera 48 , it can be assumed that the handheld electronic device 12 is not being positioned in front of the face of the user. If no face is recognized, the screen goes black or out of focus. See Block 56 . Conversely, if a face is located in the field of view, the touch screen display 14 accurately presents the image. See Block 58 . Optionally, if the face location subroutine determines that more than one face is in the camera's field of view, then the touch screen display 14 can be made to go black or out of focus.
  • the handheld electronic device 12 prevents the handheld electronic device 12 from being placed flat on a surface and observed at an angle. It also prevents a person from turning the touch screen display 14 toward another person while a message, picture or video is being displayed. The system prevents a person from positioning a camera or another phone over the touch screen display 14 to image the message, picture or video being displayed. Lastly, by determining if more than one face is present, the security parameter prevents a person from looking over the shoulder of the user to view a screen.
  • the final security parameter accessible from the administrative screen 22 is the “position security” parameter.
  • Most modern smart phones and tablets contain internal accelerometers and other such sensors that enable the handheld electronic device 12 to determine its orientation with respect to the downward direction of gravity. Referring to FIG. 4 in conjunction with FIG. 5 , it can be seen that the handheld electronic device 12 must be held within a certain orientation range in order to operate properly.
  • Two orientation parameters are monitored. They include the tilt angle “A” of the touch screen display 14 and the rotation angle “B” of the touch screen display 14 .
  • the touch screen display 14 exists in a fixed plane with peripheral edges that include a bottom edge 60 .
  • the preferred orientation positions the touch screen display 14 with its bottom edge 60 in the horizontal plane. If the bottom edge 60 has a tilt angle “A” that is inclined more than a threshold angle away from the horizontal plane, then the image on the touch screen display either goes dark or out of focus. See Block 64 and Block 66 .
  • the threshold handle is preferably between thirty degrees and sixty degrees.
  • the rotation angle “B” of the touch screen display 14 must remain in a range. The preferred range is between vertical and inclined 30 to 60 degrees from vertical.
  • the touch screen display 14 If the touch screen display 14 is inclined out of this position, the image on the screen either will go dark or will go out of focus. See Block 68 and Block 66 . This prevents the handheld electronic device 12 from being placed flat on a horizontal surface where it can be observed by many people at once. Likewise, it deters the handheld electronic device 12 from being positioned in an orientation that can be easily recorded by another camera.
  • a user would only be able to view an incoming message, picture or video in the following manner.
  • an incoming message, picture or video would have to be viewed within the time period selected by the user.
  • the user would have to hold the touch screen display 14 of the handheld electronic device 12 in front of the user's face.
  • the presence of the user's face would be detected by the “camera security” parameter of the system.
  • the orientation of the touch screen display 14 would be detected by the “position security” parameter of the system.
  • the position in front of the user's face would have to be maintained while the user continuously taps on the touch screen display 14 with either one or two fingers.
  • All the parameters typically require that a person hold the handheld electronic device 12 with two hands. This prevents the user from being able to screen shot images or otherwise orient the touch screen display 14 so that it can be imaged by another device.
  • the results are messages, pictures, and/or videos that can be viewed by the holder of a phone, but are very difficult to be shared with any other person.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Telephone Function (AREA)

Abstract

A system that deters an unauthorized person from viewing the image in the display of a handheld electronic device. The handheld electronic device has a touch screen display. A touch security parameter requires a person to repeatedly tap the touch screen display with one or two fingers. The touch screen display will only accurately display an image for as long as the tapping continues. A camera security parameter senses the location of a face in the field of view of a camera. The touch screen display will only accurately show the image for as long as a face is detected in the camera's field of view. A position security parameter detects pitch and yaw with respect to the downward direction of gravity. The touch screen display will only accurately show the image for as long as the display is held within a range of acceptable positions.

Description

    RELATED APPLICATIONS
  • This application is a continuation of co-pending application Ser. No. 14/488,264, filed Sep. 16, 2014.
  • BACKGROUND OF THE INVENTION
  • 1. Field Of The Invention
  • In general, the present invention relates to software applications that are designed to prevent unauthorized people from capturing information on a screen of a smart phone, tablet, or other handheld electronic device. More particularly, the present invention relates to software applications that prevent selected screens from either being photographed or being captured using a screen shot function.
  • 2. Prior Art Description
  • Many people communicate using smart phones or other handheld electronic devices. Such devices communicate through a communications network, such as a cellular network or WiFi connections to the World Wide Web.
  • Often the communications between people involve much more than audible data. Rather, data in the form of pictures, videos, and texts are sent between people. Such communications are visual in nature and are intended to be viewed on the screen of the receiver's device. The problem with sending information that is displayed on a screen is that the sender does not know who will be viewing that information. The screens of smart phones and other handheld electronic devices can be observed by anyone near that device. Furthermore, smart phones and similar devices are often left unattended as they charge. This provides an opportunity for unauthorized users to view private communications.
  • To complicate matters, many handheld electronic devices, have screen shot functions. The screen shot function is typically activated by pressing one or more of the controls on the handheld electronic device while an image is on the screen of that device. The screen shot function turns the image on the screen into a picture file that can later viewed. Consequently, images in a screen that appear only for an instant can be readily captured.
  • In the prior art, software applications have been developed for smart phones and other handheld electronic devices that are intended to keep certain communications private. For instance, the SnapChat® software application deletes a communication shortly after it is viewed. Other applications delete communications after certain periods of time. Such software applications are exemplified by U.S. Pat. No. 8,291,026 to Collins; U.S. Pat. No. 7,359,722 to Kim and U.S. Patent Application Publication No. 2014/0181689 to Collins. However, such prior art software application are easily bypassed
  • Software applications that delete expired communications are good. However, they are readily bypassed by using the screen capture function of the handheld electronic device or by simply taking a picture of the screen while a message is being displayed. Consequently, messages that quickly expire can easily be preserved. Furthermore, deleting a sensitive message is not always appropriate. For example, a person might receive a note from a loved one on his/her smart phone. The recipient may not want anyone else to see the note. However, the recipient may also want to keep the note indefinitely and not have it automatically erased.
  • Other prior art solutions to the problem involve the encryption of communications. Encryption protects a message in transit. However, once a message, image or video is decrypted, that screen can be easily captured or photographed. Consequently, encryption does little to prevent a person from capturing an image that is intended to be viewed only once or only for a short time period.
  • A need therefore exists for a software application for a smart phone or other handheld electronic device that can deter any displayed screen from being captured or photographed by an unintended or unauthorized people. This need is met by the present invention as described and claimed below.
  • SUMMARY OF THE INVENTION
  • The present invention is a system and method that deters a person from capturing the image in the display of a handheld electronic device, such as a smart phone or tablet. The handheld electronic device has a touch screen display. Multiple security parameters are used to ensure the secrecy of any image, such as a text message, email, picture or video, that a user may recall to the touch screen display.
  • One security parameter is a touch security parameter. This requires a person to repeatedly tap the touch screen display with one or two fingers. The touch screen display will only accurately display an image for as long as the tapping continues. This inhibits a person from being able to take a screen shot of the image being displayed.
  • Another security parameter is a camera security parameter. If the handheld electronic device comes with a camera that faces in the same direction as the touch screen display, then a subroutine is run that senses the location of a face in the field of view of the camera. The touch screen display will only accurately show the image for as long as a face is detected in the camera's field of view. If the camera is turned away from a face, the image will distort or fade to black.
  • A third security parameter is a position security parameter. The internal sensors of the handheld electronic device are capable of detecting its pitch and yaw with respect to the downward direction of gravity. If the handheld electronic device is moved outside of a certain predetermined range of acceptable positions, then the image on the display will distort or fade to black.
  • In combination, the security parameters ensure that only the person holding the handheld electronic device can consistently view an image on the screen. If the image is turned toward another, the image distorts. Likewise, if a person attempts to take a screen shot, the image distorts. Thus, images can be kept safe from conventional capture techniques.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • For a better understanding of the present invention, reference is made to the following description of an exemplary embodiment thereof, considered in conjunction with the accompanying drawings, in which:
  • FIG. 1 is a schematic showing the hardware and infrastructure needed to operate the present invention system and method with an administrative screen on a handheld electronic device;
  • FIG. 2 is a block flow diagram of a touch screen security parameter subroutine;
  • FIG. 3 is a block flow diagram of camera security parameter subroutine;
  • FIG. 4 is a block flow diagram of a position security parameter subroutine; and
  • FIG. 5 shows the operational range of the handheld electronic device used with the position security parameter subroutine of FIG. 4.
  • DETAILED DESCRIPTION OF THE DRAWINGS
  • Although the software application being described can be run on any computing device that has a touch screen display, the embodiment illustrated shows the software being applied to a smart phone. This embodiment is selected in order to set forth the best mode contemplated for the invention. The illustrated embodiment, however, is merely exemplary and should not be considered a limitation when interpreting the scope of the appended claims.
  • Referring to FIG. 1, the infrastructure and hardware needed to operate the present invention system 10 is shown. A handheld electronic device 12 is provided that has a touch screen display 14. Although a smart phone is illustrated, other handheld electronic devices that run software applications, such as tablet computers, can be substituted provided the handheld electronic device has a touch screen display.
  • The handheld electronic device 12 is coupled to a communications network 16. The communications network 16 can be either a cellular network or a WiFi connection to the World Wide Web. A software application 18 is downloaded to the handheld electronic device 12 through the communications network 16. The software application 18 is accessed through a server 20 that runs an access port to an on-line store, such as iTunes® or Google Play®.
  • Once the application software 18 is loaded onto the handheld electronic device 12, it can be selectively run by the user. As can be seen on the touch screen display 14 of FIG. 1, once the software application 18 is run, it presents a user with an administration screen 22. The administration screen 22 enables the user to activate, deactivate, and set values for a variety of security parameters. The security parameters include “expiration”, “time period”, “touch security”, “camera security” and “position security”.
  • The “expiration” security parameter can be selectively activated or deactivated by the user. If deactivated, the “expiration” security parameter has no effect on the functioning of the handheld electronic device 12. Alternatively, if the “expiration” security parameter is activated, a variable field 26 becomes accessible where the user can enter an expiration period. For example, the user can enter two minutes or ten days as the expiration period. The selected expiration period begins the moment the handheld electronic device 12 receives a particular message, picture or video from the communications network 16. The user must then view the message, picture or video within the selected expiration period. If the message, picture or video is not viewed within the selected period of time, then the message, picture or video is automatically deleted so it cannot be recalled.
  • The “time period” security parameter can be selectively activated or deactivated by the user. If deactivated, the “time period” security parameter has no effect on the functioning of the handheld computing device 12. Alternatively, if the “time period” security parameter is activated, a variable field 24 becomes accessible where the user can enter a time period. For example, the user can enter two seconds or two minutes as the time period. The selected time period begins the moment a user calls a particular message, picture or video to the screen. Once the selected expiration period expires, the selected message, picture or video is automatically deleted so it cannot be recalled. As such, a person must view the message picture or video in the selected time period.
  • Referring to FIG. 2 in conjunction with FIG. 1, it can be seen that the “touch security” parameter requires the user to elect between one finger and two fingers. The touch security parameter, if activated, requires a user to continuously tap on the touch screen display 14 in order to see a clear image on the display 14. The continuous tap must be performed at a cycle rate of no longer than one tap every few seconds. The preferred required frequency is at least a few taps every second. If a person stops tapping on the touch screen display 14, then the display 14 goes dark, fades out of focus, or otherwise renders the image on the touch screen display 14 unreadable. These features deter a person from being able to take a screen shot while viewing the message, picture or video on the touch screen display 14. As soon as a person stops tapping the touch screen display 14 to access the screen shot button, the touch screen display 14 will go dark or go out of focus and the screen shot will be ruined.
  • As is indicated by Block 32 and Block 34, a user activates the touch security parameter and selects either a one finger touch or a two finger touch. If the one finger touch is selected, a user must tap the touch screen display 14 repeatedly with one finger. Thus, there is one tapping event occurring on the touch screen display 14. The tapping event must occur at or over the required tapping frequency. See Block 36. As long as the tapping continues at or above the required frequency, the touch screen display 14 accurately displays the message, picture or video. See Block 38. However, as soon as the tapping stops or becomes inconsistent, the touch screen display 14 goes dark or goes out of focus. See Block 40.
  • Similarly, if the user elects two fingers, the user must tap the touch screen 14 repeatedly with two fingers. Thus, there are two tapping events occurring simultaneously on the touch screen display 14. The two tapping events must occur at or above the required minimum tapping frequency. See Block 42. As long as both tapping events continue at or above the required frequency, then the touch screen display 14 displays the message, picture or video. See Block 44. However, as soon as one or both of the tapping events stop or becomes inconsistent, the touch screen display 14 goes dark or goes out of focus. See Block 46. The tapping of two fingers inevitably requires a person to hold the electronic device 12 with two hands. This makes it very difficult to press any button required for a screen shot without help from another person.
  • The “camera security” parameter can also be selected on the administration screen 22. The camera security parameter is used on handheld electronic devices 12 that have integrated cameras 48 that face in the same direction as the touch screen display 14. Referring to FIG. 3 in conjunction with FIG. 1, it can be seen that once activated, the handheld electronic device 12 runs a face location subroutine 52 that identifies the location of any face in the field of view of the camera 48. See Block 50 and Block 52. Many smart phone and tablet computers have such face location subroutines as part of their basic programming package. The face location subroutine enables the camera 48 to locate and automatically focus upon any face as the camera takes a picture or video.
  • The face location subroutine is used as a trigger to the touch display screen 14. The face location subroutine determines if a face is in the field of view of the camera 48. See Block 54. If the face location subroutine does not identify a face in the field of view of the camera 48, it can be assumed that the handheld electronic device 12 is not being positioned in front of the face of the user. If no face is recognized, the screen goes black or out of focus. See Block 56. Conversely, if a face is located in the field of view, the touch screen display 14 accurately presents the image. See Block 58. Optionally, if the face location subroutine determines that more than one face is in the camera's field of view, then the touch screen display 14 can be made to go black or out of focus.
  • These features prevent the handheld electronic device 12 from being placed flat on a surface and observed at an angle. It also prevents a person from turning the touch screen display 14 toward another person while a message, picture or video is being displayed. The system prevents a person from positioning a camera or another phone over the touch screen display 14 to image the message, picture or video being displayed. Lastly, by determining if more than one face is present, the security parameter prevents a person from looking over the shoulder of the user to view a screen.
  • The final security parameter accessible from the administrative screen 22 is the “position security” parameter. Most modern smart phones and tablets contain internal accelerometers and other such sensors that enable the handheld electronic device 12 to determine its orientation with respect to the downward direction of gravity. Referring to FIG. 4 in conjunction with FIG. 5, it can be seen that the handheld electronic device 12 must be held within a certain orientation range in order to operate properly. Two orientation parameters are monitored. They include the tilt angle “A” of the touch screen display 14 and the rotation angle “B” of the touch screen display 14.
  • As is indicated by Block 62, the user activates the position security from the administrative screen 22. The touch screen display 14 exists in a fixed plane with peripheral edges that include a bottom edge 60. The preferred orientation positions the touch screen display 14 with its bottom edge 60 in the horizontal plane. If the bottom edge 60 has a tilt angle “A” that is inclined more than a threshold angle away from the horizontal plane, then the image on the touch screen display either goes dark or out of focus. See Block 64 and Block 66. The threshold handle is preferably between thirty degrees and sixty degrees. Likewise, the rotation angle “B” of the touch screen display 14 must remain in a range. The preferred range is between vertical and inclined 30 to 60 degrees from vertical. If the touch screen display 14 is inclined out of this position, the image on the screen either will go dark or will go out of focus. See Block 68 and Block 66. This prevents the handheld electronic device 12 from being placed flat on a horizontal surface where it can be observed by many people at once. Likewise, it deters the handheld electronic device 12 from being positioned in an orientation that can be easily recorded by another camera.
  • If all of the security parameters are activated, a user would only be able to view an incoming message, picture or video in the following manner. First, due to the “time limit” parameter, an incoming message, picture or video would have to be viewed within the time period selected by the user. To view the message, picture or video, the user would have to hold the touch screen display 14 of the handheld electronic device 12 in front of the user's face. The presence of the user's face would be detected by the “camera security” parameter of the system. The orientation of the touch screen display 14 would be detected by the “position security” parameter of the system. The position in front of the user's face would have to be maintained while the user continuously taps on the touch screen display 14 with either one or two fingers. All the parameters typically require that a person hold the handheld electronic device 12 with two hands. This prevents the user from being able to screen shot images or otherwise orient the touch screen display 14 so that it can be imaged by another device. The results are messages, pictures, and/or videos that can be viewed by the holder of a phone, but are very difficult to be shared with any other person.
  • It will be understood that the embodiment of the present invention that is illustrated and described is merely exemplary and that a person skilled in the art can make many variations to that embodiment. All such embodiments are intended to be included within the scope of the present invention as defined by the claims.

Claims (11)

What is claimed is:
1. In an electronic device having a touch screen display, a method of deterring an unauthorized person from viewing an image on said touch screen display, said method including the steps of:
positioning said touch screen display in an orientation within an orientation range; and
accurately displaying said image on said touch screen display only while said touch screen display is in said orientation range.
2. The method according to claim 1, wherein said touch screen display exists in a plane, and said orientation range includes when said plane is between vertical and an inclination of between 30 degrees and 60 degrees from vertical.
3. The method according to claim 1, wherein said touch screen display has a bottom edge and said orientation range includes when said bottom edge is between horizontal and an inclination of between 30 degrees and 60 degrees from horizontal.
4. The method according to claim 1, wherein said electronic device contains a camera and software that identifies a location of a face within a field of view being imaged by said camera, wherein said method further includes the step of accurately displaying said image on said touch screen display only while the face is identified within said field of view.
5. In a handheld electronic device having a display, a method of controlling the viewing of an image on said display, said method including the steps of:
holding said display in a predetermined orientation range, wherein said handheld electronic device distorts said image on said display when said display is positioned in any orientation outside of said orientation range.
6. The method according to claim 5, wherein said handheld electronic device distorts said image by fading said image to a blank screen.
7. The method according to claim 5, wherein said handheld electronic device distorts said image by displaying said image out of focus.
8. The method according to claim 5, wherein said display exists in a first plane and has a bottom edge, wherein said orientation range includes said first plane being vertical and an inclination of between 30 degrees and 60 degrees from vertical.
9. The method according to claim 8, wherein said orientation range includes said bottom edge being horizontal and being inclined no more than a selected inclination from horizontal, wherein said inclination is between 30 degrees and 60 degrees from horizontal.
10. The method according to claim 5, wherein said handheld electronic device contains a camera and software that identifies a location of a face within a field of view being imaged by said camera, wherein said method further includes the step of accurately displaying said image on said display only while the face is located within said field of view.
11. The method according to claim 10, wherein said method further includes the step of accurately displaying said image on said display only while a single face is located within said field of view.
US15/340,974 2014-09-16 2016-11-01 System and Method for Deterring the Ability of a Person to Capture a Screen Presented on a Handheld Electronic Device Abandoned US20170078529A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/340,974 US20170078529A1 (en) 2014-09-16 2016-11-01 System and Method for Deterring the Ability of a Person to Capture a Screen Presented on a Handheld Electronic Device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/488,264 US9516215B1 (en) 2014-09-16 2014-09-16 System and method for deterring the ability of a person to capture a screen presented on a handheld electronic device
US15/340,974 US20170078529A1 (en) 2014-09-16 2016-11-01 System and Method for Deterring the Ability of a Person to Capture a Screen Presented on a Handheld Electronic Device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US14/488,264 Continuation US9516215B1 (en) 2014-09-16 2014-09-16 System and method for deterring the ability of a person to capture a screen presented on a handheld electronic device

Publications (1)

Publication Number Publication Date
US20170078529A1 true US20170078529A1 (en) 2017-03-16

Family

ID=57400023

Family Applications (2)

Application Number Title Priority Date Filing Date
US14/488,264 Expired - Fee Related US9516215B1 (en) 2014-09-16 2014-09-16 System and method for deterring the ability of a person to capture a screen presented on a handheld electronic device
US15/340,974 Abandoned US20170078529A1 (en) 2014-09-16 2016-11-01 System and Method for Deterring the Ability of a Person to Capture a Screen Presented on a Handheld Electronic Device

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/488,264 Expired - Fee Related US9516215B1 (en) 2014-09-16 2014-09-16 System and method for deterring the ability of a person to capture a screen presented on a handheld electronic device

Country Status (1)

Country Link
US (2) US9516215B1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109960912A (en) * 2017-12-23 2019-07-02 深圳阜时科技有限公司 Electronic equipment
WO2020205502A1 (en) 2019-03-29 2020-10-08 Popsockets Llc Obscured media communication
US11144759B1 (en) * 2020-05-12 2021-10-12 Lenovo (Singapore) Pte. Ltd. Presentation of graphical objects on display based on input from rear-facing camera
CN114067441A (en) * 2022-01-14 2022-02-18 合肥高维数据技术有限公司 Shooting and recording behavior detection method and system
US11568640B2 (en) 2019-09-30 2023-01-31 Lenovo (Singapore) Pte. Ltd. Techniques for providing vibrations at headset

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10425445B2 (en) * 2016-12-15 2019-09-24 Interwise Ltd Deception using screen capture
SE543250C2 (en) * 2017-09-20 2020-11-03 Firefly Ab Flame detecting arrangement and method for assuring correct field of view
US11626010B2 (en) * 2019-02-28 2023-04-11 Nortek Security & Control Llc Dynamic partition of a security system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040023695A1 (en) * 2000-09-26 2004-02-05 Oliver Zechlin Electronic device for communicating with a mobile radio device
US8170621B1 (en) * 2011-02-16 2012-05-01 Google Inc. Mobile device display management
US20120320149A1 (en) * 2011-06-20 2012-12-20 Samsung Electronics Co., Ltd. Digital photographing apparatus, methods of controlling the same, and computer-readable storage medium to increase success rates in panoramic photography
US8922480B1 (en) * 2010-03-05 2014-12-30 Amazon Technologies, Inc. Viewer-based device control
US9423825B2 (en) * 2013-02-08 2016-08-23 Nvidia Corporation Mobile computing device with expanded display size
US20170104922A1 (en) * 2015-10-09 2017-04-13 Canon Kabushiki Kaisha Electronic apparatus and control method thereof

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100663510B1 (en) 2003-11-19 2007-01-02 삼성전자주식회사 Apparatus and method for deleting a short message received at mobile terminal equipment
US7610345B2 (en) 2005-07-28 2009-10-27 Vaporstream Incorporated Reduced traceability electronic message system and method
US9071970B2 (en) * 2011-12-05 2015-06-30 Sony Corporation Terminal device
KR102223277B1 (en) * 2014-01-06 2021-03-05 엘지전자 주식회사 Mobile terminal and control method for the mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040023695A1 (en) * 2000-09-26 2004-02-05 Oliver Zechlin Electronic device for communicating with a mobile radio device
US8922480B1 (en) * 2010-03-05 2014-12-30 Amazon Technologies, Inc. Viewer-based device control
US8170621B1 (en) * 2011-02-16 2012-05-01 Google Inc. Mobile device display management
US20120320149A1 (en) * 2011-06-20 2012-12-20 Samsung Electronics Co., Ltd. Digital photographing apparatus, methods of controlling the same, and computer-readable storage medium to increase success rates in panoramic photography
US9423825B2 (en) * 2013-02-08 2016-08-23 Nvidia Corporation Mobile computing device with expanded display size
US20170104922A1 (en) * 2015-10-09 2017-04-13 Canon Kabushiki Kaisha Electronic apparatus and control method thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109960912A (en) * 2017-12-23 2019-07-02 深圳阜时科技有限公司 Electronic equipment
WO2020205502A1 (en) 2019-03-29 2020-10-08 Popsockets Llc Obscured media communication
CN113632445A (en) * 2019-03-29 2021-11-09 鲍勃斯科特有限责任公司 Fuzzy media communication
EP3949371A4 (en) * 2019-03-29 2023-01-11 PopSockets LLC Obscured media communication
US11568640B2 (en) 2019-09-30 2023-01-31 Lenovo (Singapore) Pte. Ltd. Techniques for providing vibrations at headset
US11144759B1 (en) * 2020-05-12 2021-10-12 Lenovo (Singapore) Pte. Ltd. Presentation of graphical objects on display based on input from rear-facing camera
CN114067441A (en) * 2022-01-14 2022-02-18 合肥高维数据技术有限公司 Shooting and recording behavior detection method and system

Also Published As

Publication number Publication date
US9516215B1 (en) 2016-12-06

Similar Documents

Publication Publication Date Title
US9516215B1 (en) System and method for deterring the ability of a person to capture a screen presented on a handheld electronic device
US20230351054A1 (en) Systems and methods for authenticating photographic image data
US10992966B2 (en) Mobile phone as a police body camera over a cellular network
CN105491289B (en) Prevent from taking pictures the method and device blocked
CN111049978B (en) Notification information display method and device
WO2016061929A1 (en) Terminal exception handling method and device, and electronic equipment
EP2591439B1 (en) Above-lock camera access
WO2018058728A1 (en) Content sharing method and apparatus
WO2018058373A1 (en) Control method and apparatus for electronic device, and electronic device
CN105245775B (en) camera imaging method, mobile terminal and device
CN109557999B (en) Bright screen control method and device and storage medium
US20160072748A1 (en) Method and System for Secure Messaging in Social Network
WO2017096783A1 (en) Account management method and apparatus
CN106156663A (en) A kind of terminal environments detection method and device
CN107122679A (en) Image processing method and device
WO2016065750A1 (en) Item content display method and device
US20150154840A1 (en) System and method for managing video analytics results
WO2016045323A1 (en) Method and device for controlling presentation of video picture
WO2016011739A1 (en) Method, device, and system for anti-counterfeiting verification
CN106210543A (en) imaging apparatus control method and device
CN104408399A (en) Face image processing method and apparatus
JP2010277205A (en) Information processing device, method and program
EP2927835B1 (en) System and method for preventing observation of password entry using face detection
US9372965B2 (en) Methods and apparatus for displaying simulated digital content
GB2512140A (en) Messaging system and method

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION