Systems and methods for creating and sharing protected content

ABSTRACT

Systems and methods for creating and sharing protected content between individuals is disclosed. In one embodiment, a method for creating and sharing protected content between individuals may include (1) receiving foundation content; (2) receiving a selection of cover content; (3) receiving a selection of one or more unlock actions; (4) receiving a selection of one or more recipients for the protected content; (5) at least one computer processor creating a layered data file comprising the foundation content fully obscured by the cover content; (6) providing the one or more recipients access to the layered data file; (7) receiving an unlock action by the one or more recipients; (8) verifying, by the at least one computer processor, the unlock action; and (9) displaying to the one or more recipients the foundation content from the layered data file.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention generally relates to systems and methods forcreating and sharing protected content between individuals.

2. Description of the Related Art

With mobile technology and social media now ubiquitous, the demand forsharing content between individuals has never been greater. Many times,there is a desire to protect content shared between individuals.

SUMMARY OF THE INVENTION

Embodiments disclosed herein relate to the creation, distribution, andthird party access of protected content. For example, in one embodiment,a mobile application executed by an electronic device may takefoundation content and may overlay cover content thereby fully hiding orobscuring the foundation content. The foundation content may then beaccessed by a third party performing a designated unlock action.

In one embodiment, after the foundation and cover content have beenselected, the mobile application may create the layered data file withthe foundation content fully obscured by the cover content. The mobileapplication may then grant a third party recipient access to the layereddata file. The mobile application may then accept and verify third partyunlock actions. Once an unlock action has been verified, the mobileapplication may then grant a third party recipient access to thefoundation content.

Systems and methods for creating and sharing protected content betweenindividuals is disclosed. In one embodiment, a method for creating andsharing protected content between individuals may include receivingfoundation content; receiving a selection of cover content; receiving aselection of one or more unlock actions; receiving a selection of one ormore recipients for the protected content; at least one computerprocessor may create a layered data file that may comprise thefoundation content fully obscured by the cover content; providing theone or more recipients access to the layered data file; receiving one ormore unlock action by the one or more recipients; verifying, by the atleast one computer processor, the unlock action; and displaying to theone or more recipients the foundation content from the layered datafile.

In one embodiment, the foundation content may be one or more of animage, a video, a word processing file, a spreadsheet, or other type ofdata file.

In one embodiment, the cover content may be one or more of an image, avideo, a word processing file, a spreadsheet, or other type of datafile.

In one embodiment, the method may further include receiving a selectionof a transition style between the cover content and foundation content.

In one embodiment, the unlock action may include the receipt of fingergestures on an electronic device screen.

In one embodiment, the unlock action may include entering a code.

In one embodiment, the unlock action may include receiving an actionsuggested by the cover content.

In one embodiment, the method may further include a selection of atransition style from the cover content to the foundation content.

In one embodiment, the transition style may be an animation.

In one embodiment, the method may further include receiving a selectionof one or more restrictions on viewing the foundation content.

In one embodiment, the restrictions may include a limit on the number oftime the foundation content may be viewed by any of the one or morerecipients.

In one embodiment, the restrictions may include a limit on the amount oftime the layered data file is available for access by any of the one ormore recipients.

In one embodiment, the restrictions may include a limit on the totalamount of time the foundation content may be viewed by any of the one ormore recipients.

In one embodiment, the restrictions may include a limit on the number ofincorrect unlock actions performed by a recipient.

In one embodiment, the restrictions may bear an inverse relationshipwith the number of incorrect unlock actions performed by a recipient.

In one embodiment, the performed unlock action may be verified bycomparing the performed unlock actions against the one or more selectedunlock actions.

In one embodiment, the method may further include receiving arecipient's personal unlock action.

In one embodiment, verifying the performed unlock action may consist ofverifying correct entry of the personal unlock action,

In one embodiment, receiving one or more performed unlock action by therecipient may include both the selected unlock actions and the personalunlock action.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the present invention, the objectsand advantages thereof, reference is now made to the followingdescriptions taken in connection with the accompanying drawings inwhich:

FIG. 1 depicts a system for creating, distributing, and granting accessto protected content according to one embodiment; and

FIG. 2 depicts a method for creating, distributing, and granting accessto protected content according to one embodiment.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

Several embodiments of the present invention and their advantages may beunderstood by referring to FIGS. 1-2.

Referring to FIG. 1, a block diagram of a system for creating,distributing, and granting access to protected content is disclosed.System 100 may include electronic devices 105 and 110, network(s) 160,and back end 170. Electronic devices may include any suitable device,including smartphones, tablet computers, notebook computers, netbookcomputers, e-reading devices, etc. Examples include Apple's iPhone andiPad, Samsung's Galaxy, etc.

In one embodiment, electronic device 110 may include processor 115,memory 120, and an operating system 125 executed by processor 115.Electronic device may further include input/output (“I/O”) 135 which mayinclude wireless communication capability, touch/keypad inputs, voiceinput, etc. In one embodiment, an input device, such as camera 135, maybe provided.

One or more computer program or application 140 may be stored in memory120 and may be executed by processor 115. In one embodiment, application140 may include an application capable of creating layered data filesfrom content provided by a user of electronic device 110. In oneembodiment, application 140 may also be capable of hosting those layereddata files for access by third party recipients.

Electronic device 110 may communicate with external sites (e.g.,websites), other devices, etc. using network(s) 160. Network(s) 160 maybe any suitable communication network or combination of communicationnetworks, including wired, WiFi, cellular, Bluetooth, NFC, etc.

In one embodiment, server 170 may be provided. In one embodiment, theserver 170 may store, further process, etc. layered data files.

Referring to FIG. 2, a method for creating, distributing, and grantingaccess to protected content is described.

In step 205, a user may launch and execute a program or application on adevice, such as a cover/foundation application.

In step 210, the user may select foundation content. The foundationcontent may be an image, video, word processing file, audio file,spreadsheet, or any other type of data file that a user may want tohide, obscure, or otherwise protect. In one embodiment, the foundationcontent may comprise more than one data file, and the more than one datafile may comprise more than one data file type. In another embodimentwhere the foundation content may be an image or video, the image orvideo may be taken using the electronic device's camera.

In step 215, cover content used to obscure the foundation content may beselected. The cover content may be a video, word processing file,spreadsheet, audio file, or any other type of data. In one embodiment,the cover data type may be the same as the foundation data type (e.g.,both the cover data and the foundation data are images). In anotherembodiment, the cover data type and the foundation data type may bedifferent (e.g., the cover data type is an image, while the foundationdata type is a spreadsheet).

In one embodiment, the user may select the cover content. In anotherembodiment, the application may select the cover content. The covercontent selected by the application may be randomly chosen, or may bechosen and correlated to the selected unlock action (e.g., if the unlockaction consists of performing a finger drawing gesture on the touchscreen, such as drawing a circle, the cover content may be an image of acircle). In still another embodiment, the application may select thecover content that it determines to best hide, obscure, or protect thefoundation content. In another embodiment, the foundation content andcover content may comprise a single layer. The foundation content may behidden within the cover content.

In one embodiment, the cover content may come from third parties such asadvertisers, news providers, television networks, etc. This covercontent may include embedded content. For example, an advertisement forflights to Paris could be embedded in a cover photo or video of theEiffel Tower. The third party content may be related or unrelated to thefoundation content.

In one embodiment, the cover content may be selected by the user andrelevant advertising or third party content, such as news orentertainment photos or video, may be matched by the application andembedded. For example, a sports news provider could provide embeddedbasketball score of a specific game hidden in cover content consistingof photo or video highlights of the same game.

In one embodiment, the application may accept inputs including but notlimited to image recognition or user-supplied hashtags to match torelevant third party content. The third party content may be covercontent or embedded content within the cover content.

In one embodiment, a user may select from third party content to serveas the cover content. For example, a user could send a highlights videoof a specific baseball game to a recipient.

In one embodiment, a user may pay to deactivate advertisements or pay toactivate the ability to send third party content (such as gamehighlights and scores). In one embodiment the user may pay via in-apppurchases or other online payment system. In step 220, a user may selecta transition style between the cover and foundation content. Examples oftransition styles may include instantaneous deletion of the cover imageor a cinematic transition such as a page turn animation, a pixelateddissolve of the cover content, a curtain raising, or the like. In oneembodiment, a user may select a default transition style be used. Inanother embodiment, a user may select a random setting whereby themobile application randomly selects from a set of transition styles. Inanother embodiment, the application may allow for a user to create hisor her own custom transition. The transition styles may incorporatemusic or sound effects in connection with the reveal of the foundationcontent.

In step 225, a user may select a required unlock action. The unlockaction may consist of a performing one or more drawing gesture on thetouch screen, such as drawing a shape, letter, or number. The unlockaction may consist of performing one or more finger gesture on aspecific area of the screen. The unlock action may consist of performingone or more touch screen input gesture, such as a tap, double tap,swipe, two-finger tap or swipe, pinch open/close, three-fingertap/double tap/swipe, four finger tap/double tap/swipe/pinch open orclose. The unlock action may consist of entering in one or more emojicharacters as a passcode. For example, selecting some specific number ofemojis from a list in the correct sequence, such as 3 “eggplant” emojis,or 1 smiley face, 1 French horn, and 1 party hat. The unlock action mayconsist of entering a multi-digit passcode. The unlock action mayconsist of typing in one or more missing word(s) or phrase(s) from amusic lyric, film quote, famous quote, “inside joke” among friends, orthe like. The unlock action may consist of typing an answer to aquestion or clue selected by the content sender. The question or clueand answer may be in the form of text, emojis, images, video, audio, orany combination.

In another embodiment, the unlock action may consist of typing ananswer, in the form of text, emojis, images, video, audio, or anycombination thereof, based on a prompt in a video, photo, audio, music,or film clip that is part of the cover content. The unlock action mayconsist of performing an action based on a clue found in the covercontent. The unlock action may consist of utilizing one or moredevice-specific technologies such as biometric identifiers, includingfingerprint, eye print, or voice print. The unlock action may consist ofa secondary software application that may provide an unlock key, wherethe unlock key may be any of the above mentioned unlock actions.

In one embodiment, a user may select one or more unlock actions. When auser selects more than one unlock action, the unlock actions may consistof any combination of the above unlock actions. When a user selects morethan one unlock action, the user may require some number of the selectedunlock actions be successfully performed by a recipient. For example, ifa user selects three unlock actions, the user may require a recipient toperform 1, 2, or 3 of the selected unlock actions. In one embodiment, auser may select more than one unlock action, but choose only one correctunlock action from the selected unlock actions.

Any suitable unlock action, or combination of unlock actions, may beused as is necessary and/or desired.

In one embodiment, a user may select a content sensitivity level rangingfrom low to high sensitivity. The chosen content sensitivity level maydictate which unlock actions may be available for use with thefoundation content. Less secure unlock actions may not be available whenhigher sensitivity levels are selected. As sensitivity levels increase,the number of required unlock actions may increase as well.

In one embodiment, a user may allow the application to select one ormore unlock actions. The application may also be able to select unlockactions for a given content sensitivity level.

In one embodiment, an unlock action may reveal a clue for entry of asubsequent unlock action. The revealed clue may be embedded in the covercontent.

In step 230, a user may select restrictions for the foundation/coverlayered data file. Restrictions may include limitations on the number ofincorrect attempted unlock actions. For example, after a user definednumber of incorrect unlock actions, the recipient may lose access to thelayered data file. Notification may be sent through the mobileapplication to the user that access has been revoked.

Restrictions may also include durational limitations on how long arecipient is granted access to a layered data file. A user may select adeadline for the recipient to access the layered data file, and unlockand view the foundation content. For example, a user may restrictrecipient access to one week after granting access, a specified date,after the occurrence of a specific event, etc.

Restrictions may also include durational limitations on how long thefoundation content may be viewed. For example, a user may restrictfoundation content to 30 seconds of viewing, 1 hour of viewing, etc.This durational limitation may be on a per view basis, or on a totaltime viewed basis.

Restrictions may also include limitations on the number of timesfoundational content may be viewed. For example, a user may restrict alayered data file such that the foundation content be viewed no morethan 1 time, 2 times, 3 times, etc.

Restrictions may also include directly relating the unlock action to thenumber of times foundational content may be viewed. For example, thenumber of emoji characters required to be entered to unlock an emojipasscode may represent the maximum number of times foundational contentmay be viewed (e.g., if an unlock code consisting of 3 emoji isrequired, then only 3 views of the foundation content may be permitted,or 3 seconds, minutes, hours, days, etc., of access to the layered datafile may be permitted).

In one embodiment, a time based restriction may bear an inverserelationship with the number of incorrect attempted unlock actions suchthat as the number of incorrect attempted unlock actions increases, thetime available to access the foundation content decreases.

In one embodiment, a numerical view based restriction may bear aninverse relationship with the number of incorrect attempted unlockactions such that as the number of incorrect attempted unlock actionsincreases, the time available to access the foundation contentdecreases.

Restrictions may also include a user selection as to whether thefoundation content may be downloaded by a recipient upon entry of acorrect unlock action.

In one embodiment, a user may select any or all of the aboverestrictions to be implemented after a defined number of incorrectunlock actions.

In step 235, a user may select a recipient for a layered data file. Auser may select a recipient from a list of registered mobile applicationusers. A user may select a recipient from an address book maintainedwithin the electronic device application. A user may select a recipientfrom a friends list maintained within the electronic device application.A user may select a recipient by entering identifying data for therecipient, such as name, email address, mobile phone number, or socialmedia account identifier.

In one embodiment, more than one method of identifying a recipient maybe used.

In one embodiment, more than one recipient may be selected.

In step 240, the application may prepare a layered data file. Thelayered data file may consist of the foundation content, cover content,transition style data, unlock action data, restriction data, andrecipient information. The application may host the layered data file.

In step 245, the application may send notice of the layered data file tothe intended recipient. The type of notice sent by the application to arecipient may correlate to the type information provided by the user.For example, if a user selected a recipient name from a registeredmobile application user list, the notice may consist of a pushnotification to the recipient's device, or a message within the mobileapplication that may be viewed when the recipient opens his or herapplication. Indication of a pending message may appear in conjunctionwith the application icon on the recipient's device. If a user providesa mobile phone number, notice may consist of a text (SMS) message sentto that number. A text message may consist of pertinent informationincluding a link to the layered data file within the application, a linkto download the mobile application, or a link to access the layered datafile on a web-based version of the application. If the user provided asocial media account, notice may consist of a message sent to the socialmedia account. Such a message may consist of pertinent informationincluding a link to the layered data file within the mobile application,a link to download the application, or a link to access the layered datafile on a web-based version of the application.

In another embodiment, the layered data file may reside in the cloud andmay not be sent to the recipient.

In step 250, the layered data file may be hosted by the application, andaccess to the layered data file may be granted to the recipient. Arecipient may only be able to access the layered data file by installingthe application on his or her device, or by registering for an accountand accessing a web-based version of the mobile application. The layereddata file may not be physically sent to the recipient.

In step 255, the recipient may access and view the layered data file.Upon accessing the layered data file, a recipient may view the covercontent. A recipient may also view any restrictions placed on thelayered data file by the user. A recipient may also view any unlockaction clues provided in conjunction with the layered data file. Forexample, the cover content may be an image of something round, such as awheel or a wreath. This image may provide a clue that the unlock actionrequires a recipient to draw a circle on the device screen, or trace thecircle on the device screen. Also for example, the mobile applicationmay overlay a clue onto the cover content, such as a picture of a circleor emoji. If the cover content is a video or contains a sound file, arecipient may watch or listen to the cover content for any unlock actionclue.

In one embodiment, the mobile application may convey information, to arecipient, within the cover content. For example, if a user has selectedmultiple unlock actions, the cover content may include an image of alock for each unlock action required. Thus if three unlock actions wererequired, the cover content may include three images of locks.

In step 260, the recipient may enter one or more unlock action. In oneembodiment, a registered recipient may set their own personal unlockaction that may be tied to their mobile application account, foradditional security. The recipient's personal unlock action may overrideany unlock actions set by sender.

In one embodiment, a recipient with a personal unlock action mustperform both the personal unlock action and the user defined unlockaction. In one embodiment, the user may set which unlock action must beperformed first. In another embodiment, the recipient may set whichunlock action must be performed first. In yet another embodiment, themobile application is set to accept the unlock actions in any order.

In one embodiment, a recipient may add or change his or her personalunlock action. This addition or change to the personal unlock action mayapply to all previously received cover/foundation sets.

In one embodiment, the application may prompt a recipient for an unlockaction. In another embodiment, a recipient may affirmatively indicatethat an unlock action is to be entered. For example, a recipient mayclick a button within the application that states, “perform unlockaction.” In yet another embodiment, any interaction with the layereddata file by a recipient are treated as unlock actions by theapplication.

In one embodiment, the mobile application may allow for a recipient toquery a sender for clues to unlock the foundation content. For example,such a query could take the form of text messages (SMS), text or videochat, text or video messages, photos/videos from recipient to sender,etc.

In step 265, the one or more unlock action 260 may be compared againstthe user selected unlock action 225. If recipient entered unlock action260 matches the user selected unlock action 225, the application maytrigger the transition between the cover content and foundation content220. If recipient entered unlock action 260 does not match the userselected unlock action 225, the mobile application may alert therecipient that an incorrect unlock action was entered.

In one embodiment, a recipient may temporarily lose access to a layereddata file if a threshold number of incorrect unlock actions are exceededwithin a specified time frame. For example, if a recipient performs fourincorrect unlock actions within 1 minute, the application may revokerecipient access to the layered data file for five minutes.

In one embodiment, upon performance of an incorrect unlock action, themobile application may track the impact on any user selected restrictionand update the recipient accordingly. For example, if a user hasrestricted the layered data file so that 5 total views of the foundationcontent are possible, with that number decreasing by 1 for eachincorrect unlock action performed by a recipient, then upon performanceof an incorrect unlock action, the mobile application may alert therecipient that the total number of foundation content views has beenreduced from 8 to 7.

If a recipient has exceeded the number of unlock action attemptsprovided by a user, the mobile application may permanently revoke therecipient's access to the layered data file. In one embodiment, if arecipient's access has been revoked, notice may be sent to the user. Inanother embodiment, if a recipient's access has been revoked, therecipient may view an animation indicating that access has been revoked.For example, a recipient may see the cover content dissolving, melting,swirling as if going down a drain, or any other animation that wouldindicate loss of access to the layered data file.

In one embodiment, the application may provide graphical feedback basedon performance of unlock actions. For example, if the cover contentincludes an image of a lock, performance of a correct unlock action mayresult in the image changing to a lock in the unlocked position.Conversely, if an incorrect unlock action is performed, the lock imagemay change from a baseline color to red, or may shake and remain locked.

In another embodiment, tactile feedback may be incorporated withinunlock action attempts. For example, performance of an incorrect unlockaction may result in the device vibrating in a specified manner, whileperformance of a correct unlock action may result in the electronicdevice vibrating in a different and distinct manner.

In another embodiment, the recipient's device may alert the recipientwho has performed a correct unlock action. For example, if the covercontent includes an image of a lock, performance of a correct unlockaction may result in the image changing to a lock in the unlockedposition.

In step 270, upon performance of a correct unlock action, a recipientmay view the foundation content. If the user has set the restrictions toallow, a recipient may now download the foundation content onto his orher electronic device.

The mobile application may track the number of views or duration ofviewing to compare against any user set restrictions.

In one embodiment, the electronic device may periodically notify arecipient of the remaining views or time to view the foundation content.

In one embodiment, the foundation content may be graphically manipulatedin a manner that signals to a recipient that access to the foundationcontent is decreasing relative to any user selected restrictions. Forexample, if a layered data file is restricted such that the foundationcontent may be viewed a maximum of 7 times, after the third viewing, thefoundation content may appear to visually dissolve in the lower rightcorner with a solid black color representing the “dissolved” portion ofthe image. After the fifth viewing, more than half the foundationcontent may be dissolved and no longer viewable, and so on. Also forexample, visual degradation may involve decreased opacity, or theappearance of “glitch” or scan-line effects mimicking aged video, orincreased blur or color or other image or video effects, or a change incolor or color desaturation (from color to black/white), or a change inbrightness or contrast, or appearance of texture patterns that mimictoxic waste or organic decomposition. Visual degradation of thefoundation content may occur abruptly, gradually, in halting steps (likea stop motion animation), or smoothly.

Any suitable way of visually degrading content may be used as isnecessary and/or desired.

In one embodiment, the device may remember or store a recipient'sperformance of the correct unlock action and may subsequently allow therecipient direct access to the foundation content without re-entry ofthe unlock action.

In one embodiment, the device may require re-entry of the unlock actionupon subsequent attempts by a recipient, to view the foundation content.

In another embodiment, the electronic device may continue to hide thefoundation content after a successful unlock action. The recipient maythen perform an action to reveal it each time the recipient wishes toview the foundation content. The post-successful-unlock action may bethe original unlock action (e.g., the user must continue performing theunlock action each time they wish to view) or a different action such asa touch gesture (e.g., a simple horizontal swipe or tap). The differentaction may be simpler or more complex than the original unlock action.

It should be recognized that although several embodiments have beendisclosed, these embodiments are not exclusive and aspects of oneembodiment may be applicable to other embodiments.

Hereinafter, general aspects of implementation of the systems andmethods of the invention will be described.

The system of the invention or portions of the system of the inventionmay be in the form of a “processing machine,” such as a general purposecomputer, for example. As used herein, the term “processing machine” isto be understood to include at least one processor that uses at leastone memory. The at least one memory stores a set of instructions. Theinstructions may be either permanently or temporarily stored in thememory or memories of the processing machine. The processor executes theinstructions that are stored in the memory or memories in order toprocess data. The set of instructions may include various instructionsthat perform a particular task or tasks, such as those tasks describedabove. Such a set of instructions for performing a particular task maybe characterized as a program, software program, or simply software.

In one embodiment, the processing machine may be a specializedprocessor.

As noted above, the processing machine executes the instructions thatare stored in the memory or memories to process data. This processing ofdata may be in response to commands by a user or users of the processingmachine, in response to previous processing, in response to a request byanother processing machine and/or any other input, for example.

As noted above, the processing machine used to implement the inventionmay be a general purpose computer. However, the processing machinedescribed above may also utilize any of a wide variety of othertechnologies including a special purpose computer, a computer systemincluding, for example, a microcomputer, mini-computer or mainframe, aprogrammed microprocessor, a micro-controller, a peripheral integratedcircuit element, a CSIC (Customer Specific Integrated Circuit) or ASIC(Application Specific Integrated Circuit) or other integrated circuit, alogic circuit, a digital signal processor, a programmable logic devicesuch as a FPGA, PLD, PLA or PAL, or any other device or arrangement ofdevices that is capable of implementing the steps of the processes ofthe invention.

The processing machine used to implement the invention may utilize asuitable operating system. Thus, embodiments of the invention mayinclude a processing machine running the iOS operating system, the OS Xoperating system, the Android operating system, the Microsoft Windows™10 operating system, the Microsoft Windows™ 8 operating system,Microsoft Windows™ 7 operating system, the Microsoft Windows™ Vista™operating system, the Microsoft Windows™ XP™ operating system, theMicrosoft Windows™ NT™ operating system, the Windows™ 2000 operatingsystem, the Unix operating system, the Linux operating system, the Xenixoperating system, the IBM AIX™ operating system, the Hewlett-Packard UX™operating system, the Novell Netware™ operating system, the SunMicrosystems Solaris™ operating system, the OS/2™ operating system, theBeOS™ operating system, the Macintosh operating system, the Apacheoperating system, an OpenStep™ operating system or another operatingsystem or platform.

It is appreciated that in order to practice the method of the inventionas described above, it is not necessary that the processors and/or thememories of the processing machine be physically located in the samegeographical place. That is, each of the processors and the memoriesused by the processing machine may be located in geographically distinctlocations and connected so as to communicate in any suitable manner.Additionally, it is appreciated that each of the processor and/or thememory may be composed of different physical pieces of equipment.Accordingly, it is not necessary that the processor be one single pieceof equipment in one location and that the memory be another single pieceof equipment in another location. That is, it is contemplated that theprocessor may be two pieces of equipment in two different physicallocations. The two distinct pieces of equipment may be connected in anysuitable manner. Additionally, the memory may include two or moreportions of memory in two or more physical locations.

To explain further, processing, as described above, is performed byvarious components and various memories. However, it is appreciated thatthe processing performed by two distinct components as described abovemay, in accordance with a further embodiment of the invention, beperformed by a single component. Further, the processing performed byone distinct component as described above may be performed by twodistinct components. In a similar manner, the memory storage performedby two distinct memory portions as described above may, in accordancewith a further embodiment of the invention, be performed by a singlememory portion. Further, the memory storage performed by one distinctmemory portion as described above may be performed by two memoryportions.

Further, various technologies may be used to provide communicationbetween the various processors and/or memories, as well as to allow theprocessors and/or the memories of the invention to communicate with anyother entity; i.e., so as to obtain further instructions or to accessand use remote memory stores, for example. Such technologies used toprovide such communication might include a network, the Internet,Intranet, Extranet, LAN, an Ethernet, wireless communication via celltower or satellite, or any client server system that providescommunication, for example. Such communications technologies may use anysuitable protocol such as TCP/IP, UDP, or OSI, for example.

As described above, a set of instructions may be used in the processingof the invention. The set of instructions may be in the form of aprogram or software. The software may be in the form of system softwareor application software, for example. The software might also be in theform of a collection of separate programs, a program module within alarger program, or a portion of a program module, for example. Thesoftware used might also include modular programming in the form ofobject oriented programming. The software tells the processing machinewhat to do with the data being processed.

Further, it is appreciated that the instructions or set of instructionsused in the implementation and operation of the invention may be in asuitable form such that the processing machine may read theinstructions. For example, the instructions that form a program may bein the form of a suitable programming language, which is converted tomachine language or object code to allow the processor or processors toread the instructions. That is, written lines of programming code orsource code, in a particular programming language, are converted tomachine language using a compiler, assembler or interpreter. The machinelanguage is binary coded machine instructions that are specific to aparticular type of processing machine, i.e., to a particular type ofcomputer, for example. The computer understands the machine language.

Any suitable programming language may be used in accordance with thevarious embodiments of the invention. Illustratively, the programminglanguage used may include assembly language, Ada, APL, Basic, C, C++,COBOL, dBase, Forth, Fortran, Java, Modula-2, Pascal, Prolog, REXX,Visual Basic, and/or JavaScript, for example. Further, it is notnecessary that a single type of instruction or single programminglanguage be utilized in conjunction with the operation of the system andmethod of the invention. Rather, any number of different programminglanguages may be utilized as is necessary and/or desirable.

Also, the instructions and/or data used in the practice of the inventionmay utilize any compression or encryption technique or algorithm, as maybe desired. An encryption module might be used to encrypt data. Further,files or other data may be decrypted using a suitable decryption module,for example.

As described above, the invention may illustratively be embodied in theform of a processing machine, including a computer or computer system,for example, that includes at least one memory. It is to be appreciatedthat the set of instructions, i.e., the software for example, thatenables the computer operating system to perform the operationsdescribed above may be contained on any of a wide variety of media ormedium, as desired. Further, the data that is processed by the set ofinstructions might also be contained on any of a wide variety of mediaor medium. That is, the particular medium, i.e., the memory in theprocessing machine, utilized to hold the set of instructions and/or thedata used in the invention may take on any of a variety of physicalforms or transmissions, for example. Illustratively, the medium may bein the form of paper, paper transparencies, a compact disk, a DVD, anintegrated circuit, a hard disk, a floppy disk, an optical disk, amagnetic tape, a RAM, a ROM, a PROM, an EPROM, a wire, a cable, a fiber,a communications channel, a satellite transmission, a memory card, a SIMcard, or other remote transmission, as well as any other medium orsource of data that may be read by the processors of the invention.

Further, the memory or memories used in the processing machine thatimplements the invention may be in any of a wide variety of forms toallow the memory to hold instructions, data, or other information, as isdesired. Thus, the memory might be in the form of a database to holddata. The database might use any desired arrangement of files such as aflat file arrangement or a relational database arrangement, for example.

In the system and method of the invention, a variety of “userinterfaces” may be utilized to allow a user to interface with theprocessing machine or machines that are used to implement the invention.As used herein, a user interface includes any hardware, software, orcombination of hardware and software used by the processing machine thatallows a user to interact with the processing machine. A user interfacemay be in the form of a dialogue screen for example. A user interfacemay also include any of a mouse, touch screen, keyboard, keypad, voicereader, voice recognizer, dialogue screen, menu box, list, checkbox,toggle switch, a pushbutton or any other device that allows a user toreceive information regarding the operation of the processing machine asit processes a set of instructions and/or provides the processingmachine with information. Accordingly, the user interface is any devicethat provides communication between a user and a processing machine. Theinformation provided by the user to the processing machine through theuser interface may be in the form of a command, a selection of data, orsome other input, for example.

As discussed above, a user interface is utilized by the processingmachine that performs a set of instructions such that the processingmachine processes data for a user. The user interface is typically usedby the processing machine for interacting with a user either to conveyinformation or receive information from the user. However, it should beappreciated that in accordance with some embodiments of the system andmethod of the invention, it is not necessary that a human user actuallyinteract with a user interface used by the processing machine of theinvention. Rather, it is also contemplated that the user interface ofthe invention might interact, i.e., convey and receive information, withanother processing machine, rather than a human user. Accordingly, theother processing machine might be characterized as a user. Further, itis contemplated that a user interface utilized in the system and methodof the invention may interact partially with another processing machineor processing machines, while also interacting partially with a humanuser.

It will be readily understood by those persons skilled in the art thatthe present invention is susceptible to broad utility and application.Many embodiments and adaptations of the present invention other thanthose herein described, as well as many variations, modifications andequivalent arrangements, will be apparent from or reasonably suggestedby the present invention and foregoing description thereof, withoutdeparting from the substance or scope of the invention.

Accordingly, while the present invention has been described here indetail in relation to its exemplary embodiments, it is to be understoodthat this disclosure is only illustrative and exemplary of the presentinvention and is made to provide an enabling disclosure of theinvention. Accordingly, the foregoing disclosure is not intended to beconstrued or to limit the present invention or otherwise to exclude anyother such embodiments, adaptations, variations, modifications orequivalent arrangements.

What is claimed is:
 1. A method for creating and sharing protectedcontent between individuals, comprising: receiving foundation content ata first user electronic device; receiving a selection of cover contentat the first user electronic device; receiving a selection of one ormore unlock actions at the first user electronic device; receiving aselection of a recipient for the protected content at the first userelectronic device; at least one computer processor creating a layereddata file comprising the foundation content fully obscured by the covercontent; providing a recipient electronic device associated with therecipient the layered data file; receiving an unlock action at therecipient electronic device; verifying, by the at least one computerprocessor, the unlock action; displaying the foundation content from thelayered data file.
 2. The method of claim 1, wherein the foundationcontent is one or more of an image, a video, a word processing file, anda spreadsheet.
 3. The method of claim 1, wherein the cover content isone or more of an image, a video, a word processing file, and aspreadsheet.
 4. The method of claim 1, wherein the unlock comprises oneor more finger gestures on an electronic device screen.
 5. The method ofclaim 1, wherein the unlock action comprises the receipt of a code. 6.The method of claim 1, wherein the more unlock action comprises thereceipt of an action suggested by the cover content.
 7. The method ofclaim 1, further comprising: receiving a selection of a transition stylefrom the cover content to the foundation content.
 8. The method of claim7, wherein the transition style comprises an animation.
 9. The method ofclaim 1, further comprising: receiving a selection of a restriction forviewing the foundation content.
 10. The method of claim 9, wherein therestriction comprises a limit on the number of time the foundationcontent may be viewed by any of the one or more recipients.
 11. Themethod of claim 9, wherein the restriction comprises a limit on theamount of time the layered data file is available for access by any ofthe one or more recipients.
 12. The method of claim 9, wherein therestriction comprises a limit on the total amount of time the foundationcontent may be viewed by any of the one or more recipients.
 13. Themethod of claim 9, wherein the restriction comprises a limit on thenumber of incorrect unlock actions performed by a recipient.
 14. Themethod of claim 1, wherein the unlock action is verified by comparingthe performed unlock actions against the one or more selected unlockactions.
 15. A method for creating and sharing protected content betweenindividuals, comprising: receiving a selection of cover content at afirst user electronic device; receiving a selection of content to behidden in the cover content at the first user electronic device;receiving a selection of one or more unlock actions at the first userelectronic device; receiving a selection of a recipient for the hiddencontent at the first user electronic device; at least one first userelectronic device computer processor creating a layered data filecomprising the hidden content fully obscured within the cover content;providing a recipient electronic device associated with the recipientaccess to the layered data file; receiving an unlock action at therecipient electronic device; verifying, by a computer processor, theunlock action; displaying the hidden content from the layered data file.16. The method of claim 15, wherein the cover content is one or more ofan image, a video, a word processing file, and a spreadsheet.
 17. Themethod of claim 1, wherein the first user electronic device comprisesthe at least one computer processor that creates the layered data file.18. The method of claim 1, wherein the at least one computer processorthat verifies the unlock action is a remote server.
 19. The method ofclaim 1, wherein the recipient electronic device comprises the at leastone computer processor that verifies the unlock action.