Protection of confidential data being displayed or input in a mobile device

ABSTRACT

A display is presented on a screen of a mobile device having an electromagnetic radiation source. The electromagnetic radiation source is activated while confidential data is being input in an input field of the display. The electromagnetic radiation source is deactivated after completion of the confidential data in the input field of the display.

BACKGROUND

The disclosure generally relates to the field of data protection, andmore particularly to protection of confidential data being displayed orinput in a mobile device.

Many users are now using their mobile devices for a variety ofapplications. In addition to being used for telephone calls, texts, andemails, users are now using their mobile devices for banking, onlinepurchasing, etc. A number of these applications require the user toenter confidential data, such as passwords, pins, etc. prior to theiruse. Additionally, a number of these applications display confidentialdata (e.g., account numbers, social security numbers, dates of birth,etc.) during their execution. There is an increasing concern that thisconfidential data can be captured by various image capture devices,especially in public places. For example, a number of public places(e.g., such as malls, restaurants, government buildings, public streets,etc.) now include security cameras to monitor for criminal activity.These security cameras continue to evolve to capture higher resolutionvideo and images. Unfortunately, these security cameras can also be usedfor nefarious purposes. Specifically, these security cameras can be usedto capture video and images of the confidential data being displayed orinput on users' mobile devices.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the disclosure may be better understood by referencingthe accompanying drawings.

FIGS. 1-3 depict an example application environment for protection ofconfidential data being input by a user into their mobile device overtime, according to some embodiments.

FIG. 4 depicts an example mobile device, according to some embodiments.

FIG. 5 depicts an example display of an interface on a screen of amobile device, according to some embodiments.

FIG. 6 depicts a flowchart of operations for protection of confidentialdata being displayed on a mobile device, according to some embodiments.

FIG. 7 depicts a flowchart for protection of confidential data to beinput on an interface being displayed on a mobile device regardless ofscreen focus, according to some embodiments.

FIG. 8 depicts a flowchart for protection of confidential data to beinput on an interface being displayed on a mobile device when a screenfocus includes an interface element to receive the confidential data,according to some embodiments.

DESCRIPTION

The description that follows includes example systems, methods,techniques, and program flows that embody embodiments of the disclosure.However, it is understood that this disclosure may be practiced withoutthese specific details. For instance, this disclosure refers toprotection of input of confidential data into a mobile device using anelectromagnetic (e.g., light) source. But aspects of this disclosure canbe used for protection of confidential data into other devices (e.g.,notebook computers, tablet devices, Automatic Transaction Machines(ATM), etc.). In other instances, well-known instruction instances,protocols, structures and techniques have not been shown in detail inorder not to obfuscate the description.

Overview

Some embodiments provide protection of confidential data that isdisplayed or input by a user into their mobile device. Protection of theconfidential data can include activation of an electromagnetic radiationsource that is part of the mobile device to emit electromagneticradiation (such as visible light) while confidential data is beinginput. For example, a front facing LED light source on the mobile devicecan be activated while confidential data is being displayed or input tothe mobile device. Activation of the electromagnetic radiation sourcecan cause emission of electromagnetic radiation, which in turn canobscure the confidential data being displayed or input on a screen ofthe mobile device. After completion of display or input of theconfidential data, the electromagnetic radiation source can bedeactivated. In some embodiments, the activation of the electromagneticradiation source to provide confidential data protection occurs when themobile device is in a public place that can include security cameras.Accordingly, the electromagnetic radiation can preclude the securitycameras from capturing the confidential data.

Confidential data can be any type of data that intended to be keptprivate, restricted, secret, etc. Confidential data include passwords,pin numbers, account numbers, user names, social security number, datesof birth, etc. Public places can include any area that includes securitycameras used to monitor activity therein. For example, public places canbe as broadly defined to include any location outside a user's residencethat can include the use of security cameras. Examples of public placescan include malls, businesses, government buildings, convenience stores,college campuses, public streets, etc.

In some embodiments, a location of the mobile device can be determinedusing Global Positioning System (GPS) based technology. The mobiledevice's location can be determined to be public based on its GPSlocation. For example, various mobile applications provide mapping thatidentify locations using the GPS location of the mobile device. Thesemobile applications can provide identifying data for locations to definethe locations as public.

If the location of the mobile device is public, some embodiments monitorto determine when the mobile device is configured to receive or displayconfidential data. An example can be a main login screen displayed on amobile device's screen to allow the user to input a pin number to accessto the mobile device generally. Another example can be a mobileapplication for a bank executing on the mobile device to present aGraphical User Interface (GUI) to receive a password of the user. Insome embodiments, the mobile device is configured to receiveconfidential data if any type of interface is displayed on a screen ofthe mobile device to receive confidential data from the user. In someother embodiments, the mobile device is configured to receiveconfidential data if a screen focus of the mobile device includes aninput field (e.g., a dialog box) where the user is to input theirconfidential data. Some embodiments can also be triggered in response todisplay of any type of confidential data on the screen of the mobiledevice. For example, some mobile applications can display a user'sbirthday, a user's social security number or any other type of privateinformation about the user.

If the location of the mobile device is public and the mobile device isconfigured to receive confidential data from a user or displayconfidential data on the screen of the mobile device, etc., anelectromagnetic radiation source of the mobile device can be activatedduring the period when confidential data can be received or displayed.An example of an electromagnetic radiation source can include a visiblelight source, such as a Light Emitting Diode (LED) light source. In someembodiments, the electromagnetic radiation source is front facing. Inother words, the electromagnetic radiation source is facing out a samegeneral direction from the mobile device as the screen of the mobiledevice. A front facing electromagnetic radiation source can includesources that are positioned outward but at varying angles relative tothe screen (as long as the electromagnetic radiation emission results ina display on the screen being obscured for image or video capture bysecurity cameras). The electromagnetic radiation source can be a sourcethat is in addition to any source of light used for the actual displayon the screen of the mobile device.

Example Application Environment

FIGS. 1-3 depict an example application environment for protection ofconfidential data being input by a user into their mobile device overtime, according to some embodiments. FIGS. 1-3 depict a user 108 havinga mobile device 102 at a GPS location 130. In this example, the GPSlocation 130 is considered to be in a public place. FIGS. 1-3 alsodepict security cameras 120-122 that are capturing video or images ofthe public place. While depicted as security cameras, some embodimentsare applicable to any type of imaging device to capture video or imagesof the public place.

The mobile device 102 includes an electromagnetic radiation source 104and a screen 106. The electromagnetic radiation source 104 can be avisible light source (e.g., LED light). In this example, theelectromagnetic radiation source 104 can be front facing (facing a samedirection as the screen 106). When the electromagnetic radiation source104 is activated, the electromagnetic radiation source can obscure whatis being displayed on the screen 106. In some embodiments, emission ofthe electromagnetic radiation can be essentially constant.Alternatively, emission of the electromagnetic radiation can be ablinking emission (wherein the electromagnetic radiation source isswitched on and off quickly and repeatedly).

In some embodiments, the electromagnetic radiation source 104 isactivated to emit electromagnetic radiation in response to the mobiledevice 102 being in a public place and in response to the screen 106displaying confidential data or configured to receive input from theuser 108 that includes confidential data. After the confidential data isno longer displayed or the input of confidential data is completed, theelectromagnetic radiation source 104 is deactivated to cease emission ofelectromagnetic radiation. In some embodiments, the mobile device 102 isconfigured to receive confidential data if any type of interface isdisplayed on the screen 106 of the mobile device 102 to receiveconfidential data from the user. In some other embodiments, the mobiledevice 102 is configured to receive confidential data if a screen focusof the mobile device 102 includes an input filed (e.g., a dialog box)where the user is to input their confidential data. FIG. 5 (furtherdescribed below) helps illustrate these variations of displaying andreceiving confidential data on the mobile device 102.

The mobile device 102 can include a GPS module (as further describedbelow) to determine its GPS location. The mobile device 102 can alsoinclude a mobile application that provides maps that identify variouslocations on the earth (a mapping mobile application) using the GPSmodule. The locations can include businesses, malls, airports,government buildings, streets, public parks, schools, privateresidences, and other points of interest. In some embodiments, differentlocations identified by the mapping can be defined as a public place.The mapping mobile application can provide these identifications ofbeing a public place. For example, a location that includes a business,airport, mall, school, public park, downtowns of cities of at least aminimum population, certain public streets defined as busy, etc. can bedefined as a public place. The user can also personalize theidentification of public places for their mobile device. For example,the user can change a location from being identified as a public placeto not being a public place, or vice versa. To illustrate, the user canconfigure their mobile device to define a location as their residenceand that any location that does not include their residence isconsidered a public place.

In some embodiments, there can be varying security levels forconfidential data for a mobile device. For example, if the confidentialdata to be displayed or input at the mobile device is a user's socialsecurity number, a security level for this confidential data can beconsidered high. In contrast, if the confidential data to be displayedor input is a password to a kid's application, a security level for thisconfidential data can be considered low. The security levels of theconfidential data can also vary whether a location is a public place ornot. For example, if the confidential data's security level is high, anylocation external to the user's residence can be defined as a publicplace. In contrast, if the confidential data's security level is low,only businesses and government buildings are defined as a public place.

FIG. 1 depicts the example application environment in a first point intime when the user 108 with their mobile device 102 enters the publicplace defined by the GPS location 130. For FIG. 1, the screen 106 of themobile device 108 is not yet displaying or configured to receiveconfidential data from the user 108. For example, the mobile device 108could be turned off, in sleep mode, displaying a main screen ofclickable applications, executing an application that is not currentdisplaying or requesting input of confidential data, etc. Even though alocation of the mobile device 102 is defined to be public, theelectromagnetic radiation source 104 is not activated becauseconfidential data is not being displayed or input on the screen 106.

FIG. 2 depicts the example application environment in a second point intime when the mobile device 102 is in the public place defined by theGPS location 130 and when confidential data is being displayed or inputon the screen 106. For example, a user's account number could bedisplayed as part of the display on the screen 106 while a bankingmobile application is executing on the mobile device 102. Alternatively,or in addition, the same banking mobile application could be displayinga dialog box (which is currently part of the screen focus) for the userto input their password. In this example, the electromagnetic radiationsource 104 is activated to cause emission of electromagnetic radiation(e.g., visible light) to obscure the display on the screen 106. As aresult, the security cameras 120-122 are precluded from capturing imagesor video of the display on the screen 106. As described above, emissionof the electromagnetic radiation can be essentially a constant emissionor a blinking emission.

FIG. 3 depicts the example application environment in a third point intime when the mobile device 102 is still in the public place defined bythe GPS location 130 but subsequent to confidential data is beingdisplayed or input on the screen 106. For example, the display on thescreen 106 is no longer displaying confidential data. In anotherexample, the third point in time can be after the user has selected aninput button to accept the confidential data being input. Like in FIG.1, even though a location of the mobile device 102 is defined to bepublic, the electromagnetic radiation source 104 is not activatedbecause confidential data is not being displayed or input on the screen106.

Example Mobile Device

FIG. 4 depicts an example mobile device, according to some embodiments.A mobile device 400 depicted in FIG. 4 can represent the mobile device102 depicted in FIGS. 1-3. The mobile device 400 includes a processor401 (possibly including multiple processors, multiple cores, multiplenodes, and/or implementing multi-threading, etc.). The mobile device 400includes a memory 407. The memory 407 can represent a volatile memory(e.g., one or more of cache, SRAM, DRAM, zero capacitor RAM, TwinTransistor RAM, eDRAM, EDO RAM, DDR RAM, EEPROM, NRAM, RRAM, SONOS,PRAM, etc.) or any one or more of the above already described possiblerealizations of machine-readable media. The memory 407 can alsorepresent a nonvolatile memory (e.g., flash memory) for a persistentstorage of data.

In this example, the memory 407 is configured to store an operatingsystem 421 and a number of mobile applications (mobile applications423-425). The operating system 421 includes the software to manage thecomputer resources (hardware and software) of the mobile device 401. Theoperating system 421 can also provide common services for the mobileapplications 423-425. The mobile applications 423-425 can represent anytype of applications (pre-installed, downloaded) to provide a service onthe mobile device. At least some of the mobile applications 423-425 candisplay confidential data and/or allow for input of confidential datafrom a user of the mobile device 400 (as described above). The operatingsystem 421 or any of the mobile applications 423-425 can perform theprotection of confidential data, as described above. Any one of thepreviously described functionalities may be partially (or entirely)implemented in hardware and/or on the processor 401. For example, thefunctionality may be implemented with an application specific integratedcircuit, in logic implemented in the processor 401, in a co-processor ona peripheral device or card, etc. Although not shown, the mobile devicecan include other types of storage. For example, the mobile device 400can include a persistent data storage such as a hard disk drive (e.g.,magnetic storage device).

The mobile device 400 also includes a bus 403 (e.g., PCI, ISA,PCI-Express, HyperTransport® bus, InfiniBand® bus, NuBus, etc.) and anetwork interface 405 (e.g., a Fiber Channel interface, an Ethernetinterface, an internet small computer system interface, SONET interface,wireless interface, etc.). The mobile device 400 includes anelectromagnetic radiation source 411. The electromagnetic radiationsource 411 can be any type of component that can emit electromagneticradiation. For example, the electromagnetic radiation source 411 can bea light source to emit visible light. The electromagnetic radiationsource 411 can represent the electromagnetic radiation source 104depicted in FIGS. 1-3.

The mobile device 400 includes a GPS module 415. The GPS module 415 canbe hardware, software, firmware, or a combination thereof to providelocation and time. The GPS module 415 can receive signals from a numberof satellites orbiting around the Earth. The signals include data thatindicates the satellite position and current time. Based on thesatellite position and time when signals were sent from multiplesatellites, the GPS module 415 can use trilateration to determine itslocation on the Earth. In some example embodiments, differential GPS isused, wherein the area has already been surveyed using a GPS. The mobiledevice 400 also includes a screen 417 (e.g., Liquid Crystal Display(LCD) screen). The screen 417 can display various displays, graphics,etc. (including confidential data, as described above).

The processor 401, the memory 407, the network interface 405, theelectromagnetic radiation source 411, the GPS module 415, and the screen417 are coupled to the bus 403. Although illustrated as being coupled tothe bus 403, the memory 407 may be coupled to the processor 401.

FIG. 5 depicts an example display of an interface on a screen of amobile device, according to some embodiments. A screen 500 depicted inFIG. 5 can represent the screen 106 of the mobile device 102 depicted inFIGS. 1-3. The screen 500 includes a display of a Graphical UserInterface (GUI) that can be displayed by a banking mobile applicationexecuting on the mobile device. The display includes a display of auser's banking account number 502. The display also includes a displayof a dialog box 504, wherein a user's password can be entered using akeyboard 506 when a screen focus of the screen 500 includes the dialogbox 504. A screen focus of the screen 500 is that part of the screenthat is active to receive input from a user of the mobile device. Forexample, the dialog box 504 is part of the screen focus when the userselects the dialog box 504 to make the dialog box 504 active to receiveinput.

The keyboard 506 can a virtual keyboard displayed on the screen 500.Alternatively, the keyboard 506 can be a physical keyboard that is aseparate component of the mobile device. The display also includes adisplay of an input button 505. The user can select the input button 505after the password has been entered into the dialog box 504. The usercan select the input button 505 by touching the screen 500 at thelocation of the input button 505. Alternatively, the user can select theinput button 505 by using the keyboard 506 when a screen focus of thescreen 500 includes the input button 506.

In some embodiments, the electromagnetic radiation source becomes activeto emit electromagnetic radiation if the location of the mobile deviceis public and if confidential data is displayed on the screen of themobile device. To illustrate, assume that a location of the mobiledevice including the screen 500 of FIG. 5 is public. If the user'sbanking account number 502 is considered confidential data, its displayon the screen 500 would activate the electromagnetic radiation source.Activation of the electromagnetic radiation source in this example cancontinue until the confidential data is no longer displayed on thescreen 500.

The electromagnetic radiation source can also become active to emitelectromagnetic radiation if the location of the mobile device is publicand if any type of interface is displayed on a screen of the mobiledevice to receive confidential data from the user. To illustrate, againassume that a location of the mobile device including the screen 500 ofFIG. 5 is public. Because the display on the screen 500 includes adialog box 504 to receive confidential data, the electromagneticradiation source would be activated. In this example, activation of theelectromagnetic radiation source occurs regardless of whether the dialogbox 504 is active as part of the screen focus of the screen 500.Activation of the electromagnetic radiation source in this example cancontinue until the display does not include the dialog box 504 on thescreen 500.

The electromagnetic radiation source can also become active to emitelectromagnetic radiation if the location of the mobile device is publicand if a screen focus of the screen includes a dialog box that is activesuch that the user can input their confidential data. To illustrate,again assume that a location of the mobile device including the screen500 of FIG. 5 is public. Also assume that the screen focus of the screen500 includes the dialog box 504. Because the screen focus includes thedialog box 504 that is active such that the user can input theirconfidential data therein, the electromagnetic radiation source would beactivated. Activation of the electromagnetic radiation source in thisexample can continue until the dialog box 504 is no longer part of thescreen focus. Therefore, in this example, the electromagnetic radiationsource can be deactivated if the screen focus does not include thedialog box 504 (even though the dialog box 504 is still beingdisplayed).

Example Operations

To further illustrate operations of the example application environmentof FIGS. 1-3, FIGS. 6-8 depict flowcharts for protection of confidentialdata being displayed or input by a user into their mobile device,according to some embodiments. FIG. 6 depicts a flowchart of operationsfor protection of confidential data being displayed on a mobile device,according to some embodiments. FIGS. 7-8 depict flowcharts forprotection of confidential data to be input on an interface beingdisplayed on a mobile device. In particular, FIG. 7 depicts a flowchartfor protection of confidential data to be input on an interface beingdisplayed on a mobile device regardless of screen focus, according tosome embodiments. Whereas, FIG. 8 depicts a flowchart for protection ofconfidential data to be input on an interface being displayed on amobile device when a screen focus includes an interface element toreceive the confidential data, according to some embodiments. Operationsdepicted by the flowcharts in FIGS. 6-8 can be performed by software,firmware, hardware or a combination thereof (see for example one of themobile applications 423-425 and/or the operating system 421 depicted inFIG. 4). FIG. 6 is now described. Operations of the flowchart 600 startat block 602.

A display is presented on a screen of a mobile device having anelectromagnetic radiation source (602). With reference to FIGS. 1-3, amobile application executing on the mobile device 102 can present adisplay on the screen 106.

A determination is made of whether a location of the mobile device is ina public place such that an external camera can visually captureconfidential data being displayed on the screen of the mobile device(604). In some embodiments, the mobile application that is presentingthe confidential data can make this determination. The determination canbe made based on a GPS location of the mobile device. For example, themobile application can query a mapping mobile application executing onthe mobile device. The mapping mobile application can return the GPSlocation and whether the GPS location is associated with any point ofinterest. For example, the mapping mobile application can return the GPScoordinates and that these GPS coordinates are associated with aparticular business, government building, an airport, etc. In someembodiments, the mapping mobile application can also return whetherthese particular GPS coordinates are identified as being in a publicplace. Alternatively, the mobile application presenting the confidentialdata can determine whether these GPS coordinates are identified as beingin a public place. For example, the mobile application can make thisdetermination by querying a database of GPS coordinates that areidentified being in a public place or not. The database can be locallystored on the mobile device or remotely stored on a server that can bewirelessly queried.

Alternatively, the mobile application can make this determination basedon the identification of the point of interest. For example, if thepoint of interest is any type of business, government building, publicpark, airport, etc., the mobile device would be considered to be in apublic place. In some embodiments, the mobile application presenting theconfidential data can directly query the GPS module of the mobile deviceto determines the mobile device's GPS coordinates. The mobileapplication can make this determination by querying a database of GPScoordinates that are identified being in a public place or not. Whiledescribed as being performed by the mobile application presenting theconfidential data, in some embodiments, the operating system for themobile device can make this determination.

In some embodiments, the user of the mobile device can also personalizethe identification of public places for their mobile device. Forexample, the user can change a location from being identified as apublic place to not being a public place, or vice versa. In one example,the user can set the GPS location of their primary residence. The usercan then configure their mobile device such that that any location thatdoes not include their residence is considered a public place. If thelocation of the mobile device is not in a public place such that anexternal camera can visually capture confidential data being displayedon the screen of the mobile device, operations of the flowchart 600remain at 604, where this determination is again made. If the locationof the mobile device is in a public place such that an external cameracan visually capture confidential data being displayed on the screen ofthe mobile device, operations of the flowchart 600 continue at 606.

A determination is made of whether confidential data is being displayedon a screen of the mobile device (606). In some embodiments, the mobileapplication that is presenting the confidential data can make thisdetermination based on the type of data being displayed. For example,display elements on an interface being displayed on the screen 106 caninclude an attribute that identifies the data to be displayed asconfidential or non-confidential. For example, an attribute of a displayelement to display a user's username, date of birth, social securitynumber, or other type of private information can be confidential.Whereas, an attribute of a display element to display non-private data(e.g., time of day, current date, air temperature, etc.) can benon-confidential. If confidential data is not being displayed on ascreen of the mobile device, operations of the flowchart 600 return to604. If confidential data is being displayed on a screen of the mobiledevice, operations of the flowchart 600 continue at 608.

The electromagnetic radiation source is activated (608). In someembodiments, the mobile application or the operating system can activatethe electromagnetic radiation source. For example, the mobileapplication or the operating system can transmit a control signal orinstruction to the electromagnetic radiation source to activate to emitelectromagnetic radiation. Emission of electromagnetic radiation canobscure the confidential data being displayed or input on a screen ofthe mobile device. In some embodiments, emission of the electromagneticradiation can be essentially constant. Alternatively, emission of theelectromagnetic radiation can be a blinking emission (wherein theelectromagnetic radiation source is switched on and off quickly andrepeatedly). An example of an electromagnetic radiation source caninclude a visible light source, such as a Light Emitting Diode (LED)light source. In some embodiments, the electromagnetic radiation sourceis front facing.

After activation of the electromagnetic radiation source, adetermination is made of whether the confidential data is still beingdisplayed and whether a location of the mobile device is still in apublic place (610). In some embodiments, the mobile application can makethese determinations. For example, the mobile application can determinewhether any display element being displayed on the screen 106 is definedas confidential (as described above). The mobile application can querythe GPS module or a mobile mapping application to determine whether alocation of the mobile device is in a public place (as described above).If the confidential data is still being displayed and a location of themobile device is still a public place, operations of the flowchart 600remain at 610. If the confidential data is no longer being displayed ora location of the mobile device is no longer a public place, operationsof the flowchart 600 continue at 612.

The electromagnetic radiation source is deactivated (612). In someembodiments, the mobile application or the operating system candeactivate the electromagnetic radiation source. For example, the mobileapplication or the operating system can transmit a control signal orinstruction to the electromagnetic radiation source to deactivate tostop emission of electromagnetic radiation. Operations of the flowchart600 then return to 604 to whether a location of the mobile device is ina public place such that an external camera can visually captureconfidential data being displayed on the screen of the mobile device.Operations of the flowchart 600 can continue as long as the mobiledevice is powered-on. Alternatively, the user can deactivate thisfunctionality, thereby aborting operations of the flowchart 600.

FIG. 7 is now described. FIG. 7 depicts a flowchart for protection ofconfidential data to be input on an interface being displayed on amobile device regardless of screen focus, according to some embodiments.Operations of the flowchart 700 start at block 702.

A display is presented on a screen of a mobile device having anelectromagnetic radiation source (702). With reference to FIGS. 1-3, amobile application executing on the mobile device 102 can present adisplay on the screen 106.

A determination is made of whether a location of the mobile device is ina public place such that an external camera can visually captureconfidential data being displayed on the screen of the mobile device(704). In some embodiments, the mobile application that is presentingthe confidential data or the operating system can make thisdetermination. Operations for making this determination can be similarto the operations for making this determination as described above forthe flowchart 600 depicted in FIG. 6. If the location of the mobiledevice is not in a public place such that an external camera canvisually capture confidential data being displayed on the screen of themobile device, operations of the flowchart 700 remain at 704, where thisdetermination is again made. If the location of the mobile device is ina public place such that an external camera can visually captureconfidential data being displayed on the screen of the mobile device,operations of the flowchart 700 continue at 706.

A determination is made of whether the display on a screen of the mobiledevice includes a dialog box to receive confidential data (706). In someembodiments, the mobile application that is presenting the confidentialdata can make this determination. For example, each dialog box on aninterface for receiving user input can have an attribute that defineswhether the input to be received is confidential or non-confidential.For example, an attribute of a dialog box to receive a user's password,a user's username, date of birth, social security number, or other typeof private information can be confidential. Whereas, an attribute of adialog box to receive non-private data (e.g., user's first and lastname, current city and state of user's residence, etc.) can benon-confidential. If the display on a screen of the mobile deviceincludes a dialog box to not receive confidential data, operations ofthe flowchart 700 return to 704. If the display on a screen of themobile device includes a dialog box to receive confidential data,operations of the flowchart 700 continue at 708.

The electromagnetic radiation source is activated (708). In someembodiments, the mobile application or the operating system can activatethe electromagnetic radiation source. For example, the mobileapplication or the operating system can transmit a control signal orinstruction to the electromagnetic radiation source to activate to emitelectromagnetic radiation. Operations for activation of theelectromagnetic radiation source can be similar to the operations forperforming these operations as described above for the flowchart 600depicted in FIG. 6.

After activation of the electromagnetic radiation source, adetermination is made of whether the display on a screen of the mobiledevice includes a dialog box to receive confidential data and whether alocation of the mobile device is still in a public place (710). Asdescribed above, the mobile application can make these determinations.If the display on a screen of the mobile device includes a dialog box toreceive confidential data and a location of the mobile device is still apublic place, operations of the flowchart 700 remain at 710. If thedisplay on a screen of the mobile device does not include a dialog boxto receive confidential data or a location of the mobile device is nolonger a public place, operations of the flowchart 700 continue at 712.

The electromagnetic radiation source is deactivated (712). In someembodiments, the mobile application or the operating system candeactivate the electromagnetic radiation source. For example, the mobileapplication or the operating system can transmit a control signal orinstruction to the electromagnetic radiation source to deactivate tostop emission of electromagnetic radiation. Operations of the flowchart700 then return to 704 to whether a location of the mobile device is ina public place such that an external camera can visually captureconfidential data being displayed on the screen of the mobile device.Operations of the flowchart 700 can continue as long as the mobiledevice is powered-on. Alternatively, the user can deactivate thisfunctionality, thereby aborting operations of the flowchart 700.

FIG. 8 is now described. FIG. 8 depicts a flowchart for protection ofconfidential data to be input on an interface being displayed on amobile device when a screen focus includes an interface element toreceive the confidential data, according to some embodiments. Operationsof the flowchart 800 start at block 802.

A display is presented on a screen of a mobile device having anelectromagnetic radiation source (802). With reference to FIGS. 1-3, amobile application executing on the mobile device 102 can present adisplay on the screen 106.

A determination is made of whether a location of the mobile device is ina public place such that an external camera can visually captureconfidential data being displayed on the screen of the mobile device(804). In some embodiments, the mobile application that is presentingthe confidential data or the operating system can make thisdetermination. Operations for making this determination can be similarto the operations for making this determination as described above forthe flowchart 600 depicted in FIG. 6. If the location of the mobiledevice is not in a public place such that an external camera canvisually capture confidential data being displayed on the screen of themobile device, operations of the flowchart 800 remain at 804, where thisdetermination is again made. If the location of the mobile device is ina public place such that an external camera can visually captureconfidential data being displayed on the screen of the mobile device,operations of the flowchart 800 continue at 806.

A determination is made of whether the screen focus of the display on ascreen of the mobile device includes a dialog box to receiveconfidential data (806). In some embodiments, the mobile applicationthat is presenting the confidential data can make this determination. Asdescribed above, a screen focus of a display is that part of the displaythat is active to receive input from a user of the mobile device. Thus,the mobile application can determine whether a dialog box that isconfigured to receive confidential data is in the screen focus of thedisplay. As described above, each dialog box can be assigned anattribute that defines the data to be input into the dialog box asconfidential or non-confidential. In some embodiments (instead of themobile application), the operating system can provide an option toindicate that a dialog box is confidential or non-confidential. Inresponse to the screen focus changing to include a dialog box that isdefined as confidential, the operating system can activate theelectromagnetic radiation source (described below). If the screen focusof the display on a screen of the mobile device does not include adialog box to receive confidential data, operations of the flowchart 800return to 804. If the screen focus of the display on a screen of themobile device does include a dialog box to receive confidential data,operations of the flowchart 800 continue at 808.

The electromagnetic radiation source is activated (808). In someembodiments, the mobile application or the operating system can activatethe electromagnetic radiation source. For example, the mobileapplication or the operating system can transmit a control signal orinstruction to the electromagnetic radiation source to activate to emitelectromagnetic radiation. Operations for activation of theelectromagnetic radiation source can be similar to the operations forperforming these operations as described above for the flowchart 800depicted in FIG. 8.

After activation of the electromagnetic radiation source, adetermination is made of whether the screen focus of the display on ascreen of the mobile device still includes a dialog box to receiveconfidential data and whether a location of the mobile device is stillin a public place (810). As described above, the mobile applicationand/or the operating system can make these determinations. If the screenfocus of the display on a screen of the mobile device still includes adialog box to receive confidential data and a location of the mobiledevice is still a public place, operations of the flowchart 700 remainat 810. If the screen focus of the display on a screen of the mobiledevice does not include a dialog box to receive confidential data or alocation of the mobile device is no longer a public place, operations ofthe flowchart 800 continue at 812.

The electromagnetic radiation source is deactivated (812). In someembodiments, the mobile application or the operating system candeactivate the electromagnetic radiation source. For example, the mobileapplication or the operating system can transmit a control signal orinstruction to the electromagnetic radiation source to deactivate tostop emission of electromagnetic radiation. Operations of the flowchart800 then return to 804 to whether a location of the mobile device is ina public place such that an external camera can visually captureconfidential data being displayed on the screen of the mobile device.Operations of the flowchart 800 can continue as long as the mobiledevice is powered-on. Alternatively, the user can deactivate thisfunctionality, thereby aborting operations of the flowchart 800.

While described in separate flowcharts, operations depicted in FIGS. 6-8can be practiced together in different combinations. For example,operations from all of FIGS. 6-8 can be combined. In this example, ifconfidential data is displayed or if the display includes a dialog boxto receive confidential data or if a screen focus includes the dialogbox to receive the confidential data, the electromagnetic radiationsource can be activated. In another example, operations from FIGS. 6-7can be combined. In this example, if confidential data is displayed orif the display includes a dialog box to receive confidential data, theelectromagnetic radiation source can be activated. In another example,operations from FIGS. 6 and 8 can be combined. In this example, ifconfidential data is displayed or if a screen focus includes the dialogbox to receive the confidential data, the electromagnetic radiationsource can be activated. In another example, operations from FIGS. 7-8can be combined. In this example, if the display includes a dialog boxto receive confidential data or if a screen focus includes the dialogbox to receive the confidential data, the electromagnetic radiationsource can be activated.

Variations

The flowcharts are provided to aid in understanding the illustrationsand are not to be used to limit scope of the claims. The flowchartsdepict example operations that can vary within the scope of the claims.Additional operations may be performed; fewer operations may beperformed; the operations may be performed in parallel; and theoperations may be performed in a different order. It will be understoodthat each block of the flowchart illustrations and/or block diagrams,and combinations of blocks in the flowchart illustrations and/or blockdiagrams, can be implemented by program code. The program code may beprovided to a processor of a general purpose computer, special purposecomputer, or other programmable machine or apparatus.

As will be appreciated, aspects of the disclosure may be embodied as asystem, method or program code/instructions stored in one or moremachine-readable media. Accordingly, aspects may take the form ofhardware, software (including firmware, resident software, micro-code,etc.), or a combination of software and hardware aspects that may allgenerally be referred to herein as a “circuit,” “module” or “system.”The functionality presented as individual modules/units in the exampleillustrations can be organized differently in accordance with any one ofplatform (operating system and/or hardware), application ecosystem,interfaces, programmer preferences, programming language, administratorpreferences, etc.

Any combination of one or more machine readable medium(s) may beutilized. The machine readable medium may be a machine readable signalmedium or a machine readable storage medium. A machine readable storagemedium may be, for example, but not limited to, a system, apparatus, ordevice, that employs any one of or combination of electronic, magnetic,optical, electromagnetic, infrared, or semiconductor technology to storeprogram code. More specific examples (a non-exhaustive list) of themachine readable storage medium would include the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a portable compact disc read-only memory (CD-ROM), anoptical storage device, a magnetic storage device, or any suitablecombination of the foregoing. In the context of this document, a machinereadable storage medium may be any tangible medium that can contain, orstore a program for use by or in connection with an instructionexecution system, apparatus, or device. A machine readable storagemedium is not a machine readable signal medium.

A machine readable signal medium may include a propagated data signalwith machine readable program code embodied therein, for example, inbaseband or as part of a carrier wave. Such a propagated signal may takeany of a variety of forms, including, but not limited to,electro-magnetic, optical, or any suitable combination thereof. Amachine readable signal medium may be any machine readable medium thatis not a machine readable storage medium and that can communicate,propagate, or transport a program for use by or in connection with aninstruction execution system, apparatus, or device.

Program code embodied on a machine readable medium may be transmittedusing any appropriate medium, including but not limited to wireless,wireline, optical fiber cable, RF, etc., or any suitable combination ofthe foregoing.

Computer program code for carrying out operations for aspects of thedisclosure may be written in any combination of one or more programminglanguages, including an object oriented programming language such as theJava® programming language, C++ or the like; a dynamic programminglanguage such as Python; a scripting language such as Perl programminglanguage or PowerShell script language; and conventional proceduralprogramming languages, such as the “C” programming language or similarprogramming languages. The program code may execute entirely on astand-alone machine, may execute in a distributed manner across multiplemachines, and may execute on one machine while providing results and oraccepting input on another machine.

The program code/instructions may also be stored in a machine readablemedium that can direct a machine to function in a particular manner,such that the instructions stored in the machine readable medium producean article of manufacture including instructions which implement thefunction/act specified in the flowchart and/or block diagram block orblocks.

While the aspects of the disclosure are described with reference tovarious implementations and exploitations, it will be understood thatthese aspects are illustrative and that the scope of the claims is notlimited to them. In general, techniques for cache priming as describedherein may be implemented with facilities consistent with any hardwaresystem or hardware systems. Many variations, modifications, additions,and improvements are possible.

Plural instances may be provided for components, operations orstructures described herein as a single instance. Finally, boundariesbetween various components, operations and data stores are somewhatarbitrary, and particular operations are illustrated in the context ofspecific illustrative configurations. Other allocations of functionalityare envisioned and may fall within the scope of the disclosure. Ingeneral, structures and functionality presented as separate componentsin the example configurations may be implemented as a combined structureor component. Similarly, structures and functionality presented as asingle component may be implemented as separate components. These andother variations, modifications, additions, and improvements may fallwithin the scope of the disclosure.

What is claimed is:
 1. A method comprising: presenting a display on ascreen of a mobile device having an electromagnetic radiation source;activating the electromagnetic radiation source while confidential datais being input in an input field of the display; deactivating theelectromagnetic radiation source after completion of the confidentialdata in the input field of the display; and wherein presenting thedisplay comprises presenting the display by a mobile applicationexecuting on the mobile device and wherein the electromagnetic radiationsource is activated, by an operating system executing on the mobiledevice, in response to a screen focus of the display changing to includethe input field.
 2. The method of claim 1, wherein the electromagneticradiation source is activated in response to determining that a locationof the mobile device is such that an external imaging device canvisually capture an image of the mobile device.
 3. The method of claim1, wherein the electromagnetic radiation source is activated in responseto determining that a location of the mobile device is such that anexternal imaging device can visually capture the confidential data beinginput into the input field.
 4. The method of claim 1, wherein activatingthe electromagnetic radiation source comprises activating a front-facingelectromagnetic radiation source on the mobile device.
 5. The method ofclaim 1, wherein activating the electromagnetic radiation sourcecomprises varying an intensity of electromagnetic radiation beingemitted from the electromagnetic radiation source based, at least inpart, on an amount of ambient light around the mobile device.
 6. Themethod of claim 1, wherein the electromagnetic radiation sourcecomprises a visible light source.
 7. The method of claim 1, whereinactivating the electromagnetic radiation source causes theelectromagnetic radiation source to emit a blinking light emission.
 8. Amobile device comprising: a light source; a screen; a hardwareprocessor; and a non-transitory machine-readable medium having programcode executable to cause the mobile device to: present a display on thescreen; activate the light source while confidential data is being inputin an input field of the display; deactivate the light source aftercompletion of the confidential data in the input field of the display;and wherein the program code executable to cause the mobile device topresent the display comprises program code executable to cause themobile device to present the display by a mobile application executableon the mobile device, and wherein the program code executable to causethe mobile device to activate the light source comprises program codeexecutable to cause the mobile device to: activate, by an operatingsystem executable on the mobile device, the light source, in response toa screen focus of the display changing to include the input field. 9.The mobile device of claim 8, wherein the light source is activated inresponse to a determination that a location of the mobile device is suchthat the screen is visible to an external imaging device.
 10. The mobiledevice of claim 8, wherein the light source is activated in response toa determination that a location of the mobile device is such that anexternal imaging device can visually capture the confidential data beinginput into the input field.
 11. The mobile device of claim 8, whereinthe light source is front-facing on the mobile device.
 12. The mobiledevice of claim 8, wherein the program code executable to cause themobile device to activate the light source comprises program codeexecutable to cause the mobile device to vary an intensity of lightbeing emitted from the light source based, at least in part, on anamount of ambient light around the mobile device.
 13. The mobile deviceof claim 8, wherein the input comprises text-based input.
 14. The mobiledevice of claim 8, wherein the program code executable to cause themobile device to activate the light source causes the light source toemit a blinking light emission.