18402709. SECURING DISPLAYED DATA ON COMPUTING DEVICES simplified abstract (Microsoft Technology Licensing, LLC)
Contents
- 1 SECURING DISPLAYED DATA ON COMPUTING DEVICES
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SECURING DISPLAYED DATA ON COMPUTING DEVICES - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 How does this technology handle scenarios where multiple users are in the field of view?
- 1.11 What languages are supported for converting user data in the event of an unauthorized user?
- 1.12 Original Abstract Submitted
SECURING DISPLAYED DATA ON COMPUTING DEVICES
Organization Name
Microsoft Technology Licensing, LLC
Inventor(s)
Varun Khanna of Hyderabad (IN)
SECURING DISPLAYED DATA ON COMPUTING DEVICES - A simplified explanation of the abstract
This abstract first appeared for US patent application 18402709 titled 'SECURING DISPLAYED DATA ON COMPUTING DEVICES
Simplified Explanation
The abstract of the patent application describes a technique for securing displayed data on computing devices by using facial recognition to determine if the user is authorized to view the data. If an unauthorized user is detected, the user data is converted to a different language for display, ensuring security even when the device is unlocked.
- Upon determining that the computing device is unlocked, an image is captured and analyzed to detect a human face.
- Facial attributes of the human face are determined using facial recognition technology to verify if it belongs to an authorized user.
- If the face does not match an authorized user, the user data is converted to a new language for display, securing the information.
Potential Applications
This technology could be applied in various industries such as banking, healthcare, and government agencies where sensitive information needs to be protected from unauthorized access.
Problems Solved
This technology addresses the issue of unauthorized users gaining access to sensitive data on computing devices by using facial recognition to verify the identity of the user.
Benefits
The benefits of this technology include enhanced security for displayed data, protection of sensitive information, and peace of mind for users knowing their data is secure even if the device is unlocked.
Potential Commercial Applications
Potential commercial applications of this technology include data security software for businesses, secure communication apps, and privacy-focused devices for individuals.
Possible Prior Art
One possible prior art for this technology could be existing facial recognition systems used for device unlocking or secure authentication.
Unanswered Questions
How does this technology handle scenarios where multiple users are in the field of view?
The technology does not address how it distinguishes between multiple faces in the field of view and determines which one is the authorized user.
What languages are supported for converting user data in the event of an unauthorized user?
The abstract does not specify which languages are supported for converting user data, leaving room for ambiguity regarding language compatibility.
Original Abstract Submitted
Techniques for securing displayed data on computing devices are disclosed. One example technique includes upon determining that the computing device is unlocked, capturing and analyzing an image in a field of view of the camera of the computing device to determine whether the image includes a human face. In response to determining that the image includes a human face, the technique includes determining facial attributes of the human face in the image via facial recognition and whether the human face is that of an authorized user of the computing device. In response to determining that the human face is not one of an authorized user of the computing device, the technique includes converting user data on the computing device from an original language to a new language to output on a display of the computing device, thereby securing the displayed user data even when the computing device is unlocked.