Securing image data detected by an electronic device

ABSTRACT

A method and device for securing image data detected by an electronic device is provided. The electronic may include a camera. In one aspect, a method includes: capturing image data using the camera; based on the captured image data, detecting a security marker displayed by a display device, the security marker being periodically displayed to be undetectable by a human eye that is viewing the display device; and in response to determining that the security marker is detected by the electronic device, applying a security policy to the image data captured by the electronic device.

The present disclosure relates generally to electronic devices havingcameras and, more particularly, to methods and devices for securingimage data detected by an electronic device.

BACKGROUND

Electronic devices having cameras are convenient to carry and arecapable of capturing images of objects and environments. As long as auser may operate the electronic device, the user may capture images ofobjects and the surrounding environment. Electronic devices havingcameras are often equipped with at least one image sensor. Theelectronic device may capture image data by detecting light incident onan image sensor and converting the detected light into electricalsignals.

The use of electronic devices in confidential environments may pose asecurity risk. Confidential environments can include engineeringlaboratories having laboratory equipment displaying confidentialinformation or office environments having computer screens displayingprivate or non-public information. Some computer systems operating inconfidential environments may allow administrators in charge of dataprotection to disable features to prevent leakage of information ordata. For example, copy and paste functions or screenshot functions maybe disabled on computer systems. Further, data sharing mechanisms may bedisabled or restricted. Administrators in charge of data protection maynot be able to control data leakage caused when users of electronichaving cameras purport to capture images of display devices showingconfidential or private data.

BRIEF DESCRIPTION OF THE DRAWINGS

Reference will now be made, by way of example, to the accompanyingdrawings which show example embodiments of the present application, andin which:

FIG. 1 is a schematic illustration of an electronic device capturingimage data in accordance with example embodiments of the presentdisclosure;

FIG. 2 is a block diagram illustrating an example electronic device inaccordance with example embodiments of the present disclosure;

FIG. 3 is an illustration of a sequence diagram for providing mediacontent and a security marker by a display device in accordance withexample embodiments of the present disclosure;

FIGS. 4A, 4B, and 4C are illustrations of captured images based onfields of view as viewed by an electronic device in accordance withexample embodiments of the present disclosure;

FIG. 5 is a flowchart illustrating an example method of securing imagedata detected by an electronic device;

FIG. 6 is a flowchart illustrating an example method of applying asecurity policy to image data;

FIG. 7 is a flowchart illustrating an example method of securing imagedata detected by an electronic device;

FIG. 8 is a flowchart illustrating an example method of applying asecurity policy to image data;

FIG. 9 is a flowchart illustrating an example method of applying asecurity policy to image data;

FIG. 10 is a flowchart illustrating an example method of altering acaptured image;

FIG. 11 is a flowchart illustrating an example method of altering acaptured image; and

FIG. 12 is a flowchart illustrating an example method of authenticatingan electronic device for capturing image data.

Like reference numerals are used in the drawings to denote like elementsand features.

DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS

In one example aspect, the present disclosure describes a method ofsecuring image data detected by an electronic device. The methodincludes capturing image data using the electronic device. Based on thecaptured image data, the method includes detecting a security markerdisplayed by a display device. The security marker may be periodicallydisplayed to be undetectable by a human eye that is viewing the displaydevice. In response to determining that the security marker is detectedby the electronic device, the method also includes applying a securitypolicy to the image data captured by the electronic device.

In another aspect, an electronic device is described. The electronicdevice includes a camera and a memory device. The electronic device alsoincludes a processor coupled to the camera and the memory device. Theprocessor may be configured to capture image data using the camera.Based on the captured image data, the processor may be configured todetect a security marker displayed by a display device. The securitymarker may be periodically displayed to be undetectable by a human eyethat is viewing the display device. In response to determining that thesecurity marker is detected by the electronic device, the processor maybe configured to apply a security policy to the image data captured bythe camera.

In yet a further aspect, a non-transitory computer-readable storagemedium comprising processor-executable instructions is described. Theinstructions, when executed by a processor of the electronic device,cause the processor of the electronic device to capture image data usingthe electronic device. Based on the captured image data, theinstructions cause the processor to detect a security marker displayedby a display device. The security marker may be periodically displayedto be undetectable by a human eye that is viewing the display device. Inresponse to determining that the security marker is detected by theelectronic device, the instructions cause the processor to apply asecurity policy to the image data captured by the electronic device.

In yet a further aspect, the present disclosure describes non-transitorycomputer-readable media storing computer-executable program instructionswhich, when executed, configure a processor to perform the describedmethods.

Other aspects and features of the present application will be understoodby those of ordinary skill in the art from a review of the followingdescription of examples in conjunction with the accompanying figures.

In the present application, the term “and/or” is intended to cover allpossible combination and sub-combinations of the listed elements,including any one of the listed elements alone, any sub-combination orall of the elements, and without necessarily excluding additionalelements.

In the present application, the term “a processor” is intended toinclude both a single processor and also a plurality of processorscoupled to one another which distribute operations among the processors.

Reference is now made to FIG. 1, which is a schematic illustration of anelectronic device 110 capturing image data. An environment 100 isillustrated where an electronic device 110 is being operated by a user102. The electronic device 110 may be any suitable electronic devicethat may be held and operated by the user 102 in order to interact withthe environment 100.

In some embodiments, the electronic device 110 may include a camera 112that is capable of capturing image data, such as images, in the form ofstill photo and/or motion data. The electronic device 110 may be used toobserve the environment 100 within a field of view 114. The field ofview 114 may be a scene that is observed from the perspective of theelectronic device 110 through the camera 112. The electronic device 110may generate image data in the form of electronic signals produced by animage sensor (not shown) associated with the camera 112. In someembodiments, the camera may have a lens for focusing a scene or objectbeing photographed onto the image sensor.

In some embodiments, the electronic device 110 may be used to observethe environment within a field of view 114. The field of view 114 mayinclude one or more display devices 120. That is, the electronic device110 may observe content displayed on the display device 120 that iswithin the field of view 114.

Although the electronic device 110 is illustrated as being operatedadjacent a viewing surface of a display device 120, in some embodiments,the electronic device 110 may be operated in any other position relativeto the viewing surface of the display device 120. For example, theelectronic device 110 may be operated such that the field of view 114 ofthe camera 112 originates from an off-center position relative theviewing surface of the display device 120.

In some embodiments, the electronic device 110 may alter the breadth ofthe field of view 114. In some embodiments, the electronic device 110may be positioned at various distances from the display device 120. Forexample, a user 102 may operate the electronic device 110 and mayphysically position the electronic device 110 to be nearer or fartheraway from the display device 120. When the display device 120 is withinthe field of view 114, the displayed contents of the display device 120may occupy a portion of a captured image. In some embodiments, when theelectronic device 110 is nearer to the display device 120, the contentsof the display device 120 may occupy a larger portion of the capturedimage. When the electronic device 110 is further away from the displaydevice 120, the contents of the display device 120 may occupy a smallerportion of the captured image.

In some embodiments, the electronic device 110 may alter the breadth ofthe field of view 114 by adjusting a camera lens position. A camera lensmay focus a scene or object onto an image sensor of a camera 112. Forexample, the electronic device 110 may adjust a camera lens position toprovide optical zoom. Accordingly, the display contents of the displaydevice 120 may occupy a larger portion of the captured image.Alternatively, the electronic device 110 may also adjust a camera lensposition to provide a wider field of view. Correspondingly, the displaycontents of the display device 120 may occupy a smaller portion of thecaptured image.

In some embodiments, the electronic device 110 may be a mobilecommunication device and the electronic device 110 may be portable andeasily moved from one physical location to a different physicallocation. In some embodiments, the electronic device 110 may beconfigured to be positioned in a fixed location and may be configured toalter a field of view 114 by adjusting a camera lens position.

In some embodiments, the electronic device 110 may be a multi-modecommunication device configured for data and/or voice communication,such as a smartphone. In some embodiments, the electronic device 110 maybe a wearable computer, such as a virtual reality apparatus enabling auser 102 to interact with the environment 100, wearable camera lenses,or similar type devices. In some embodiments, the electronic device 110may be a tablet computer, a personal digital assistant (PDA), or anyother computer system that may be operable by a user. The electronicdevice 110 may take other forms apart from those specifically listedabove.

In some embodiments, the display device 120 may show a series of imagesat a high frequency. For example, the display device 120 may be a liquidcrystal display (LCD), light-emitting diode (LED) display, a cathode-raytube (CRT) display, organic light-emitting diode (OLED) display, or anyother display technology capable of showing a series of images to a user102. In some embodiments, the display device 120 may display a series ofimages at a fixed frequency or a variable frequency. In someembodiments, the frequency at which a series of images is displayed maybe referred to as a refresh rate of the display device 120.

In some embodiments, the display device 120 may be a television. Forexample, a television may receive signals being broadcast by atelevision network provider and may process the received signals anddisplay the signals on a television screen. In some embodiments, thedisplay device 120 may be a computer monitor or a computer laptopscreen. In some embodiments, the display device 120 may be a displayscreen of another electronic device 110.

In some embodiments, the electronic device 110 may include acommunication subsystem 218 (illustrated in FIG. 2). The communicationsubsystem 218 may include a receiver, a transmitter and associatedcomponents, such as one or more antenna elements, local oscillators, anda processing module such as a digital signal processor. The electronicdevice 110 may communicate via a network 130 with one or more devices,such as a server system 140. In some embodiments, the network 130 may bea wireless network. In some embodiments, the network 130 may be a wirednetwork. In some embodiments, the network 130 may include both wirelessand wired network portions.

In some embodiments, the server system 140 may be a computer system foradministering a network of electronic devices 110. For example, theserver system 140 may be a centralized system for administrators orother agents in charge of data protection to send and receivecommunication to and from electronic devices 110. For example, theserver system 140 may be used to monitor the operation of electronicdevices 110. In some embodiments, the server system 140 may sendsoftware updates to the network of electronic devices 110. In someembodiments, the server system 140 may receive messages from electronicdevices 110 relating to the operating state of the electronic devices110. As will be described herein, in some embodiments, the server system140 may receive messages from an electronic device 110 when anelectronic device has captured an image of confidential data. Anadministrator operating the server system 140 may subsequently apply asecurity policy in response to receiving a message indicating that theelectronic device 110 has captured an image of confidential data.

Reference is now made to FIG. 2, which is a block diagram illustratingan example electronic device 110. The electronic device includes acontroller including at least one processor 202 (such as amicroprocessor) which controls the overall operation of the electronicdevice 110. The processor 202 may be communicatively coupled to thedevice subsystems such as one or more output interfaces (such as adisplay 208, a flash 206, and/or a speaker (not shown)), one or moreinput interfaces (such as a camera 112, control buttons (not shown), atouch-sensitive overlay (not shown) associated with a touchscreendisplay, and/or other input interfaces), and memory (such as flashmemory 210, random access memory (RAM) 212, read only memory (ROM) 214,a secure chip 216, etc.).

In some embodiments, the display 208 may function as a viewfinder. Forexample, when a camera 112 of the electronic device 110 is active, thedisplay 208 may provide a preview of a field of view 114 as seen fromthe perspective of the camera 112. In some embodiments, the display 208may be used to provide a user 102 with a preview of captured images orimages that have been stored in any of the memory devices.

The electronic device 110 may include a camera 112 capable of capturingimage data, such as images, in the form of still photo and/or motiondata. The image data may be generated in the form of an electronicsignal which is produced by an image sensor associated with the camera112. For example, in some embodiments, the image sensor associated withthe camera 112 may be a complementary metal-oxide-semiconductor (CMOS)sensor. In other embodiments, the image sensor associated with thecamera 112 may be a charge-coupled device (CCD) sensor. In someembodiments, an adjustable camera lens may focus a scene or object ontothe image sensor to capture imaged content.

In some embodiments, the frame rate of an image sensor is a measure ofhow many times a full pixel array can be read in a given period of time.In some examples, the given period of time may be one second. Forexample, image sensors may have a frame rate of 24 to 30 frames persecond.

In some embodiments, the image sensor associated with the camera 112 maybe unable to capture a full image or retrieve image data from the fullpixel array of the image sensor at one exact point in time. Accordingly,in some embodiments, an image sensor may progressively scan a scene(e.g., top to bottom or side to side) to retrieve a captured image. Forexample, the image sensors may capture image data including multipleimage frames and generate a full image based on the multiple imageframes. That is, each of the multiple image frames may contain a portionof the full image and the processor 202 may generate a full image basedon the multiple image frames. In some embodiments, the image sensorassociated with the camera 112 may capture a full image or retrieveimage data from the full pixel array of the image sensor at one exactpoint in time.

The electronic device 110 may store data 230 in an erasable persistentmemory, which in one example is the flash memory 210. In someembodiments, the data 230 includes image data generated by the camera112.

The processor 202 may operate under stored program control and executesprocessor-executable instructions 220 stored in memory such aspersistent memory, for example, in the flash memory 210. Theprocessor-executable instructions 220 or parts thereof may betemporarily loaded into volatile memory such as the RAM 212. The RAM 212may be used for storing runtime data variables and other types of dataor information. Although specific functions are described for varioustypes of memory, this is merely one example. It will be appreciated thata different assignment of functions to types of memory could also beused.

The processor 202 may be communicatively coupled to the camera 112 toallow the processor 202 to receive electronic signals representing imagedata from the camera 112. The processor 202 may also be communicativelycoupled to the flash 206 to allow the processor 202 to control the flash206.

In some embodiments, the processor-executable instructions 220 mayinclude one or more camera applications 222 or software modules whichare configured to control the camera 112 and the flash 206. The cameraapplication 222 may, for example, be configured to provide a viewfinderon the display 208 by displaying, in real time or near real time, imagesdefined in the electronic signals received from the camera 112. Thecamera application 222 may be configured to store the images or videosto memory, for example the flash memory 210. The images or image framesmay be stored in various formats including JPEG, RAW, bitmap image file(BMP), etc. The camera application 222 may be configured to receive datafrom one or more image sensors of the camera 112.

The camera application 222 may, in various embodiments, determine and/orcontrol any one or more of a number of camera related features, optionsor settings including, for example, the flash 206, a digital zoomfeature (which may crop an image to a centered area with the same aspectratio as the original), an image stabilization feature, a shutter speed,a camera lens aperture, a focal length, high dynamic range settings suchas a long exposure time and a short exposure time, a white balancesetting and other camera configuration settings. In some embodiments,the focal length may be adjusted by lens movement. Lens movementcontributes to focusing a scene or object onto an image sensor. At leastsome of the features may be automatically determined by the cameraapplication 222. That is, at least some of the above mentioned settingsmay be determined without direct user input setting such settings.

While the example discussed above includes a processor 202 coupled witha camera application 222 which collectively act as an image signalprocessor to provide image related functions, in some other embodiments(not shown), another processor, such as a dedicated image signalprocessor, may provide some or all of these functions. That is, an imagesignal processor may be configured to perform the functions of thecamera application 222 or a portion thereof.

For example, the camera 112 may be a digital camera provided in anintegrated circuit (IC) having a memory such as Electrically ErasableProgrammable Read-Only Memory (EEPROM) or flash memory,analog-to-digital (A/D) converter and a controller such as a suitablyprogrammed microprocessor or Field Programmable Gate Array (FPGA). TheIC may provide an industry standard interface such as a SerialPeripheral Interface (SPI) or Inter-Integrated Circuit (I2C) interfacefor connecting to a printed circuit board (PCB) of the electronic device110. The controller provided on the IC may be configured to perform someor all of the features of the methods described herein.

While the camera application 222 has been illustrated as a stand-aloneapplication, in at least some embodiments, the functions of the cameraapplication 222 may be provided by a plurality of software modules.

In some embodiments, functions of the camera 112 may be provided byapplications separate from or in addition to the camera application 222.For example, a security marker detection application 224 may, in variousembodiments, detect security markers displayed by a display device 120.That is, the processor 202 may be coupled with a security markerdetection application 224 which may collectively act as an image signalprocessor to perform some or all of the features of the methodsdescribed herein.

Further, while the memory stores processor-executable instructions 220has been illustrated using a block that is separate from the processor202, in practice, the memory storing the processor-executableinstructions 220 may be provided on-board the processor 202. That is,the processor 202 may include internal memory and theprocessor-executable instructions 220 may be provided on the internalmemory.

In some embodiments, the electronic device 110 may include a secure chip216. The secure chip 216 may be a memory chip that may not be written toby standard processor-executable instructions 220. That is, the securememory chip may include information that is unique to the electronicdevice 110 and that may have been written to the secure chip 216 at thetime that the electronic device 110 was manufactured and/or assembled.For example, the secure chip 216 may store information forauthenticating the electronic device 110. In another example, the securechip 216 may store unique identifying information about the electronicdevice 110.

In some embodiments, the electronic device 110 may include acommunication subsystem 218. For example, the communication subsystem218 may be a wireless subsystem or a wired subsystem for communicatingwith a network 130.

The particular design of the communication subsystem 218 depends on thenetwork 130 in which the electronic device 110 is intended to operate.In some embodiments, the network 130 may include one or more of aWireless Wide Area Network (WWAN) and/or a Wireless Local Area Network(WLAN) and/or other suitable network arrangements. In some embodiments,the electronic device 201 is configured to communicate over both theWWAN and WLAN, and to roam between these networks. The electronic device110 may send and receive communication signals over the network 130 viathe communication subsystem 218 after network registration or activationprocedures have been completed.

In some embodiments, the communication subsystem 218 may include areceiver, a transmitter and associated components, such as one or moreantenna elements, local oscillators, and a processing module such as adigital signal processor. The antenna elements may be embedded orinternal to the electronic device and a single antenna may be shared byboth receiver and transmitter. The particular design of thecommunication subsystem 218 may depend on the network 130 to which theelectronic device 110 is intended to operate with.

The electronic device 110 may communicate with any one of a plurality offixed transceiver base stations of a network 130 within its geographiccoverage area. Signals received by an antenna through the network 130may be input to a receiver, which may perform receiver functions assignal amplification, frequency down conversion, filtering, channelselection, etc., as well as analog-to-digital (A/D) conversion. A/Dconversion of a received signal allows more complex communicationfunctions such as demodulation and decoding to be performed in a digitalsignal processor. In a similar manner, signals to be transmitted areprocessed, including modulation and encoding, for example, by a digitalsignal processor. Digital signal processed signals may be input to atransmitter for digital-to-analog (D/A) conversion, frequency upconversion, filtering, amplification, and transmission to the network130 via an antenna. A digital signal processor may not only processcommunication signals, but may also provide for receiver and transmittercontrol. For example, the gains applied to communication signals in areceiver and a transmitter may be adaptively controlled throughautomatic gain control algorithms implemented in a digital signalprocessor.

The electronic device 110 may include other components apart from thoseillustrated in FIG. 2. By way of example, the electronic device 110 mayinclude or is connectable to a power source such as a battery. Thebattery may be one or more rechargeable batteries that may be charged,for example, through charging circuitry coupled to a battery interface.The battery may provide electrical power to at least some of theelectrical circuitry in the electronic device, and the battery interfacemay provide a mechanical and electrical connection for the battery. Thebattery interface is coupled to a regulator which provides power V+ tothe circuitry of the electronic device 110.

Reference is now made to FIG. 3, which is an illustration of a sequencediagram 300 for providing media content and a security marker by adisplay device 120. For example, FIG. 3 illustrates an example of astream of media content frames 310 that may be overlaid with securitymarker frames 320. Each media content frame in the stream of mediacontent frames 310 may be provided or displayed by the display device120 at a first frequency. For example, the first frequency may be arefresh rate of the display device 120. Further, the security markerframes 320 may be provided or displayed by the display device 120 at asecond frequency. In some embodiments, the first frequency may begreater than the second frequency such that a select number of mediacontent frames 310 may be overlaid with security marker frames 320. Insome embodiments, the security marker frames 320 may be embedded orincorporated into the media content frames 310 themselves.

As described above, the frequency at which the security marker frames320 are provided may be less than the frequency at which the mediacontent frames 310 are provided such that the periodically displayedsecurity marker frames 320 are undetectable by a human eye viewing thedisplay device 120. That is, the security marker frames 320 may beinterleaved into media content frames 310 being displayed by the displaydevice 120 at a refresh rate frequency, such as the first frequency.

In some embodiments, while the security marker frames 320 may beinterleaved into media content frames 310 such that the security markerframes 320 may be undetectable by an unaided human eye viewing thedisplay device 120, the security marker frames 320 may be detectable byan image sensor associated with a camera 112 of the electronic device110. In some embodiments, periodically displayed security marker frames320 may be used to provide security related information according tomethods and devices described herein.

Based on the media content frames 310 and the security marker frames320, a display device 120 may be able to convey information to anelectronic device 110 through a mechanism that is undetectable orimperceptible to an unaided human eye. That is, a user 102 may not beable to detect information being conveyed by the security marker frames320 without the use of the electronic device 110.

Reference is now made to FIGS. 4A, 4B, and 4C, which illustrate examplecaptured images 450 associated with a field of view 114 as seen by anelectronic device 110. For example, the captured image 450 may be basedon image data detected by an image sensor of a camera 112.

In some embodiments, a display device 120 may have a display surface 410a, 410 b, 410 c, 410 d. For ease of explanation, the display surface 410a, 410 b, 410 c, 410 d may generally be described as the display surface410.

As illustrated in FIGS. 4A, 4B, and 4C, in some embodiments, the displaysurface 410 of a display device 120 may be within a portion of a fieldof view 114. That is, the user 102 may operate the electronic device 110at various distances from the display device 120. Based on the distancebetween the electronic device 110 and the display device 120, thedisplay surface 410 may occupy greater or lesser portions of the fieldof view 114. For example, when the electronic device 110 is nearer tothe display device 120, the contents of the display device 120 mayoccupy a larger portion of the captured image 450. When the electronicdevice 110 is further away from the display device 120, the contents ofthe display device 120 may occupy a smaller portion of the capturedimage 450.

Referring now to FIG. 4A, an example captured image 450 is shown whencontents displayed on a display surface 410 a occupies a substantialportion of the field of view 114. That is, the electronic device 110 maybe positioned sufficiently near the display device 120 such that thedisplay surface 410 a occupies substantially the entire field of view114. When the field of view 114 is occupied by the display surface 410a, the captured image 450 may include the content being displayed on thedisplay surface 410 a.

In some embodiments, the display surface 410 may occupy a less than fullportion of the captured image 450. Referring to FIG. 4B, an examplecaptured image 450 is shown when the display surface 410 b occupies aless than full portion of the field of view 114. For example, comparedto FIG. 4A, in FIG. 4B, the electronic device 110 may be positionedfurther away from the display device 120 such that the field of view 114may include the display surface 410 b and a background scene 460.

In another example, the electronic device 110 may be configured toadjust focal length settings by re-positioning a lens of a camera 112.Adjusting the focal length setting of the camera 112 may alter the fieldof view 114 such that the field of view 114 may include the displaysurface 410 b and the background scene 460. For ease of illustration,the background scene 460 is illustrated as a plain background.

In some embodiments, content from two or more display surfaces 410 mayoccupy portions of the captured image 450. Referring to FIG. 4C, anexample captured image 450 is shown when two distinct display devices120 may occupy the field of view 114 of an electronic device 110. Forexample, similar to the environment of FIG. 4B, the electronic device110 may be positioned away from the display devices 120 such that thefield of view 114 may include a display surface 410 c from a firstdisplay device 120, a display surface 410 d from a second display device120, and a background scene 460. When the display surfaces 410 c, 410 dand the background scene 460 occupy the field of view 114, the capturedimage 450 may consist of contents displayed on the display surfaces 410c, 410 d and also content of the background scene 460.

As illustrated in FIGS. 4A, 4B, and 4C, a captured image 450 may includeone or more security markers 415 a to 415 m. For ease of exposition, thesecurity markers 415 a to 415 m may generally be described as securitymarkers 415. As described with reference to FIG. 3, the one or moresecurity markers 415 may be periodically provided by security markerframes 320.

In some embodiments, security markers 415 may be a distinct shapediscernible from contents being displayed by a display device 120. Forexample, security markers 415 could be circular or rectangular in shape.In some embodiments, security markers 415 may be a distinct shape with acolour distinguishable from contents being displayed by a display device120. In some embodiments, security markers 415 may be patterns, such asquick response (QR) codes. A pattern may be a coded pattern, such as atwo-dimensional barcode, that contains information about contents beingdisplayed by a display device 120.

In some embodiments, one or more security markers 415 may not beassociated with any boundary or may not be associated with any group ofsecurity markers 415. For example, one or more security markers 415 maysimply be displayed by a display device 120 to provide an indicationthat the display device 120 may be displaying content associated with asecurity marker 415. An electronic device 110 may detect the securitymarker 415 and may perform some action or function in response todetecting the displayed security marker 415. Accordingly, the one ormore security markers 415 may not need to be associated with defining asecurity boundary.

In some embodiments, two or more security markers 415 may be displayedby a display device 120. As will be apparent, in some embodiments, twoor more security markers 415 may be associated with a group of securitymarkers 415 for defining a security boundary.

In some embodiments, security markers 415 may be located at peripheraledges or corners of a display surface 410. As will be described, wheretwo or more security markers 415 are associated with image data capturedby an electronic device 110, the electronic device 110 may determine asecurity boundary based on the location of the two or more securitymarkers 415. For example, referring to FIG. 4A, four security markers415 are illustrated. The four security markers 415 is associated with acorner of the display surface 410 a. In some embodiments, the electronicdevice 110 may determine a security boundary by joining the securitymarkers 415 with lines. For example, in FIG. 4A, the electronic device110 may determine that the display surface 410 a is within a determinedsecurity boundary defined by the security markers 415 a, 415 b, 415 c,415 d, illustrated with hashed lines.

In some embodiments, the electronic device 110 may determine that asecurity boundary circumscribes a portion of a display surface 410 thatis less than the entire display surface 410. For example, referring toFIG. 4C, the captured image 450 includes contents from a first displaysurface 410 c and a second display surface 410 d. The contents from thedisplay surface 410 d may be associated with security markers 415 j, 415k, 4151, 415 m. As illustrated in FIG. 4C, the security markers 415 j,415 k, 4151, 415 m may not be located at corners of the display surface410 d. The electronic device 110 may determine a security boundary byjoining the security markers 415 j, 415 k, 4151, 415 m with lines.Accordingly, the electronic device 110 may determine that a portion ofthe display surface 410 d is within the determined security boundarydefined by the security markers 415 j, 415 k, 4151, 415 m. Although theexamples describe security boundaries that are substantially rectangularin shape, security markers 415 may define security boundaries that arecircular in shape, triangular in shape, or any other polygon shape.

In some embodiments, the electronic device 110 may determine a securityboundary based on one security marker 415, such as a coded pattern. Forexample, referring to FIG. 4B, the electronic device 110 may determine asecurity boundary based on one security marker 415 e. When one securitymarker is associated with the contents of the display surface 410 b, theelectronic device 110 may be unable to determine a security boundary byjoining multiple security markers 415 with lines. In some embodiments,the security marker 415 e may be a coded pattern. The electronic device110 may decode the coded pattern and, based on information from thecoded pattern, may determine a security boundary associated withcontents of the display surface 410 b. In some embodiments, the codedpattern may provide information defining characteristics of the securityboundary.

For example, based on information from the coded pattern, the electronicdevice 110 may determine that a security boundary 430 has a square shapeand is located in the center of the display surface 410 b. That is,information from the coded pattern may provide a detailed specificationfor the security boundary 430.

In another example, contents of a display surface 410 may be associatedwith two security markers 415. In some embodiments, the electronicdevice 110 may join the two security markers 415 with a line andextrapolate the line so as to divide the display surface 410 into twoportions. That is, an identified security boundary may be a boundarydividing the display surface 410 into two distinct portions.

As previously described, content of a field of view 114 of an electronicdevice 110 may depend on the distance between the electronic device 110and a display device 120 and/or may depend on the focal length settingof the camera 112 associated with the electronic device 110. When theelectronic device 110 is setup so that the content of a display surface410 occupies the entire field of view 114 (see e.g., FIG. 4A), theelectronic device 110 may capture image data and generate a capturedimage 450 having the content of the display surface 410 occupying thearea of the captured image 450. When the electronic device 110 is setupso that the content of the display surface 410 occupies a portion of afield of view 114 (see e.g., FIGS. 4B and 4C), the electronic device 110may capture image data and generate a captured image 450 having thecontent of the one or more display surface 410 and a background scene460.

In some embodiments, when a security marker 415 is a coded pattern, anelectronic device 110 may determine one or more boundaries associatedwith image data based on the decoded security marker 415. In someembodiments, information decoded from the security marker 415 mayinclude absolute information relating to a boundary. For example,referring to FIG. 4B, information decoded from the security marker 415 emay specify that a boundary associated with captured image datarepresenting contents of a display surface 410 b is a square. The squaremay have dimensions of 10 centimeters by 10 centimeters and the squaremay be centrally located in the middle of the display surface 410 b.

When the electronic device 110 is setup so that the content of thedisplay surface 410 occupies less than the entire field of view 114, theelectronic device 110 may not be able to accurately place a definedsecurity boundary in a generated captured image 450. That is, becausethe captured image 450 includes content from a display surface 410 and abackground scene 460, the absolute information, such as a squaredimension of 10 centimeters by 10 centimeters, may not providesufficiently definite information to an electronic device 110 forplacing a boundary in a generated captured image 450. Accordingly, insome embodiments, the electronic device 110 may need to determine aboundary in a captured image 450 based on a combination of decodedinformation from a security marker 415 and physical dimensions of adisplayed security marker 415. As will be apparent, the electronicdevice 110 may utilize the physical dimensions of the displayed securitymarker 415 as a baseline for accurately placing a defined boundary in agenerated captured image 450.

In an example, referring to FIG. 4B, a display device 120 may display asecurity marker 415 on a display surface 410 b. The security marker 415e may be provided with security marker frames 320 that are periodicallyoverlaid with media content frames 310. In some embodiments, thesecurity marker 415 e may be a coded pattern and the electronic device110 may decode the coded pattern. The decoded information may specifythat the security marker 415 e may be a square shape and is displayed onthe display surface 410 b such that the security marker 415 e appears onthe display surface 410 b of a display device 120 as a 5 centimeter by 5centimeter square. Although display devices 120 may have differentspecifications and capabilities, a display device 120 may be able todisplay a security marker 415 e, such as a coded pattern, on a displaysurface 410 with a known physical dimension. For example, when a displaydevice 120 provides security markers 415 in security marker frames 320,the display device 120 may calculate the pixel requirements needed toachieve the actual physical dimensions and may subsequently display thesecurity marker 415 e on the display surface 410 b. Accordingly,although a 5 centimeter by 5 centimeter square displayed on a 30 inchdisplay monitor may occupy less percentage of the entire display surface410 than the entire display surface 410 of a 23 inch display monitor, adisplay device 120 may provide security markers 415 with specifiedphysical dimensions to security marker frames 320 by calculating pixeloutput requirements.

Referring to FIG. 4B, based on decoding the security marker 415 e, theelectronic device 110 may determine that a boundary associated withcontent of the display surface 410 b may be located in the center of thedisplay surface 410 b having a square dimension of 10 centimeters by 10centimeters. Knowing that the displayed security marker 415 e is beingdisplayed with a square physical dimension of 5 centimeters by 5centimeters, the electronic device 110 may determine that a physicaldimension of 10 centimeters is double the length of a side of thedisplayed security marker 415 e. Accordingly, the electronic device 110may use the displayed security marker 415 e as a baseline for placing aboundary 430 in a captured image 450. Irrespective of what percentagethe content of the display surface 410 b occupies in the captured image450, the electronic device 110 may use the known characteristic of thesecurity marker 415 e as a guide to place a boundary in a captured image450.

For example, the security marker 415 e may indicate that a square-shapedboundary 430 is to be placed at the center of the display surface 410 band that the square shaped boundary 430 has a 10 centimeter by 10centimeter dimension. To generate and place the boundary 430 in thecaptured image 450, the electronic device 110 may need to determine thecenter of the display surface 410 b and place a boundary having physicaldimensions (e.g., 10 centimeters by 10 centimeters) that are double thephysical dimensions of the security marker 415 e (e.g., 5 centimeters by5 centimeters).

In some embodiments, the coded pattern may include information about thedisplay device 120, such as the display dimensions of the display device120, the resolution capabilities of the display device 120, or therefresh rate capabilities of the display device 120. In someembodiments, the coded pattern may include information about thelocation of the one or more security markers being displayed on thedisplay device 120. In some embodiments, the coded pattern may includeinformation about the location of an identified security boundary on thedisplay device 120. That is, the coded pattern may include informationabout the location of an identified boundary associated with image datacaptured by the electronic device 110.

In some examples, a select portion of the display surface 410 may occupythe entire field of view 114 of the electronic device 110. For example,the user 102 may position the electronic device 110 to be relativelynear a display device 120 such that the field of view 114 may onlycapture a select portion of the contents of the display surface 410.Referring again to FIG. 4B as an example, if the electronic device 110is located near the display surface 410 b such that the field of view114 is occupied by contents of the lower right corner of the displaysurface 410 b, although a security marker 415 e may be viewable from adisplay surface 410 b, a camera 112 of the electronic device 110 may notdetect the security marker 415 e. That is, the security marker 415 e maynot be within the field of view 114 of the camera 112.

Accordingly, in some embodiments, security marker frames 320 may includea plurality of boundary presence markers scattered across each securitymarker frame 320. That is, in addition to a security marker 415 e,security presence markers may be displayed at repeated intervals acrossthe security marker frames 320. Each security presence marker may, forexample, be a small circle that may be spaced 100 pixels from anadjacent security presence marker. Accordingly, even though the securitymarker 415 e may not be within a field of view 114 of a camera 112, aprocessor 202 may determine that image data being captured is associatedwith a security marker 415 e, that the security marker 415 e may not bewithin the field of view 114, and that a security policy may need to beapplied.

As apparent from the examples with reference to FIGS. 3, 4A, 4B, and 4C,security marker frames 320 may include one or more security markers 415.A display device 120 may interleave or overlay one or more securitymarker frames 320 with media content frames 310 for display on a displaysurface 410. The frequency at which the security marker frames 320 areprovided may be less than the frequency at which the media contentframes 310 are provided. Accordingly, the security marker frames 320 maybe undetectable by a human eye viewing the display device 120. Thesecurity marker frames 320, however, may be detectable by a camera of anelectronic device 110. Accordingly, a display device 120 may be able toconvey information to an electronic device 110 through a mechanism thatis undetectable or imperceptible to an unaided human eye.

An electronic device 110 may capture image data using a camera 112associated with the electronic device. The electronic device 110 maygenerate a captured image 450 based on the image data. The capturedimage 450 may present content displayed on one or more display surfaces410 and one or more background scenes 460 within a field of view 114 ofthe camera 112. The electronic device 110 may also determine a securityboundary associated with the image data captured by a camera 112 of theelectronic device 110 and associate the security boundary with a portionof the image data for generating the captured image 450. The securityboundary may be based on the one or more security markers 415 providedin security marker frames 320, where the security marker frames 320 areinterleaved or overlaid with media content frames 310.

Reference is now made to FIG. 5, which is a flowchart illustrating anexample method 500 of securing image data detected by an electronicdevice 110. The method 500 may be performed by an electronic device 110of the type described above with reference to FIGS. 1 and 2 or avariation of such electronic devices. For example, in at least someembodiments, processor-executable instructions 220, such as a securitymarker detection application 224, may configure a processor 202 of theelectronic device 110 to perform the method 500.

At 510, the method includes capturing image data using the electronicdevice 110. For example, the processor 202 may capture image data usinga camera 112 of the electronic device 110. The camera 112 may be capableof capturing image data, such as images, in the form of still photoand/or motion data. The image data may be generated in the form of anelectronic signal which is produced by an image sensor associated withthe camera 112.

At 530, based on the captured image data, the processor 202 may detect asecurity marker 415 displayed by a display device 120. The securitymarker may be periodically displayed to be undetectable by a human eyethat is viewing the display device 120.

In some embodiments, the electronic device 110 may include a databasefor storing a list of security markers 415 and a list of characteristicsassociated with each security marker 415 in the list of security markers415. When the processor 202 captures image data using the camera 112 ofthe electronic device 110, based on the captured image data, theprocessor 202 may identify shapes or objects. The processor 202 maycompare the identified shapes or objects to security markers 415contained in the list of security markers 415. For example, whendetecting a security marker 415, the processor 202 may utilize patternrecognition methods for identifying security markers 415 being displayedby a display device 120.

In some embodiments, the processor 202 may capture image data using acamera 112 of the electronic device 110 and may generate a capturedimage 450 by merging image data representing media content frames 310and image data representing security marker frames 320. That is, thecaptured image 450 may include image data associated with contents beingdisplayed on a display screen 410, a background scene 460, and securitymarkers 415. To detect a security marker 415, the processor 202 mayanalyze the captured image 450 and identify predetermined features thatmay be defined in a database or memory device of the electronic device110.

In some embodiments, the processor 202 may capture a plurality of imageframes. The media content frames 310 or image frames may be displayed bya display device 120 at a first frequency. The security marker frames320 may be displayed by the display device 120 at a second frequency.The first frequency may be greater than the second frequency. Forexample, referring again to FIG. 3, the display device 120 may providesecurity marker frames 320 at a second frequency and the display device120 may provide media content frames 310 at a first frequency. Relativeto the media content frames 310, the security marker frames 320 may beprovided periodically. When an unaided eye of a user 102 views thedisplay device 120, the user 102 may not perceive the security markerframes 320. That is, the media content frames 310 may be provided at ahigher frequency relative to the frequency of the provided securitymarker frames 320 such that the periodically interleaved security markerframes 320 are not noticed by the user 102.

A user 102 may operate the electronic device 110 within a line of sightof a display surface 410 of a display device 120. The electronic device110 may capture image data associated with media content frames 310 andsecurity marker frames 320. Accordingly, the processor 202 may detectone or more security markers 415 displayed by the display device 120when an unaided human eye may not be able to detect the one or moresecurity markers 415 displayed by the display device 120.

At 550, in response to determining that a security marker 415 isdetected by the electronic device 110, the method includes applying asecurity policy to image data captured by the electronic device 110. Forexample, the processor 202 may apply a security policy to image datacaptured by the electronic device 110 when one or more security markers415 are detected by the processor 202.

As described, in some embodiments, the processor-executable instructions220 may include one or more camera applications 222. In someembodiments, the one or more camera applications 222 may be third-partyapplications developed for download and for use on the electronic device110. For example, a third-party camera application may be an imageediting application installed on the electronic device 110. Theelectronic device 110 may provide a trigger mechanism, such as a userselectable button, for initiating capture of image data by anapplication on the electronic device 110. For example, the image editingapplication may be granted access to image data once a trigger mechanismis activated by a user of the electronic device. That is, the imageediting application may be granted access to image data for furtherprocessing or transmission to other systems. In some embodiments, thetrigger mechanism may be a depressible shutter button. In someembodiments, the trigger mechanism may be a virtual icon button providedon a viewfinder or display 208 of the electronic device 110.

In some embodiments, the camera application 222 may be a photo captureapplication provided on the electronic device 110. The photo captureapplication may, for example, be configured to provide a viewfinder onthe display 208 by displaying, in real time or near real time, imagesdefined in the electronic signals received from the camera 112. Thephoto capture application may be configured to store the images orvideos to memory, for example to the flash memory 210. The photo captureapplication may be configured to receive data from one or more imagesensors of the camera 112.

Reference is now made to FIG. 6, which is a flowchart illustrating anexample method 600 of applying a security policy to image data. Themethod 600 may be performed by an electronic device 110 of the typedescribed above with reference to FIGS. 1 and 2 or a variation of suchelectronic devices. For example, in at least some embodiments,processor-executable instructions 220, such as a security markerdetection application 224, may configure a processor 202 of theelectronic device 110 to perform the method 600.

The method 600 at 610 and 630 may correspond to and may be similar tothose of method 500 at 510 and 530, respectively. That is, the processor202 may capture image data using a camera 112 of the electronic device110, at 610, and detect a security marker 415 displayed by a displaydevice 120, at 630.

At 652, in response to determining that the security marker is detectedby the electronic device, the processor 202 may apply a security policyto image data captured by the electronic device 110. In particular, theprocessor 202 may disable a trigger mechanism for capturing the imagedata by an application on the electronic device 110. For example, theprocessor 202 may disable a trigger mechanism associated with the cameraapplication 222. That is, the processor 202 may not allow the cameraapplication 222 to store images or videos to memory. Similarly, theprocessor 202 may not allow the camera application 222 to access imagedata.

In some embodiments, although the camera application 222 may beconfigured to provide a viewfinder on the display 208 for displaying, inreal time or near real time, images defined by electronic signalsreceived from the camera 112, if a trigger mechanism associated with thecamera application 222 may be disabled, capturing image data associatedwith a security marker 415 may be averted.

In another example, the processor 202 may disable a trigger mechanismfor accessing image data by applications other than the cameraapplication 222 of an electronic device. For example,processor-executable instructions 220 may include one or more socialmedia applications for sharing data or multimedia photos. When a socialmedia application is launched, the social media application may beconfigured to display on a viewfinder, in real time or near real time,images defined in electronic signals received from the camera 112. Ifthe processor 202 detects one or more security markers 415, theprocessor 202 may disable a trigger mechanism associated with the socialmedia application. That is, the processor 202 may not allow the socialmedia application to capture images or videos for transmission orsharing with the associated social media network. Accordingly, at 652,the processor 202 secures image data detected by the electronic device110. Where image data is associated with a security marker 415, theprocessor 202 may not allow the detected image data to be accessed,captured, or shared.

Reference is now made to FIG. 7, which is a flowchart illustrating anexample method 700 of securing image data detected by an electronicdevice 110. The method 700 may be performed by an electronic device 110of the type described above with reference to FIGS. 1 and 2 or avariation of such electronic devices. For example, in at least someembodiments, processor-executable instructions 220, such as a securitymarker detection application 224, may configure a processor 202 of theelectronic device 101 to perform the method 700.

The method 700 at 710 and 730 may correspond to and may be similar tothose of method 500 at 510 and 530, respectively. That is, the processor202 may capture image data using a camera 112 of the electronic device110, at 710, and detect a security marker 415 displayed by a displaydevice 120, at 730.

At 720, based on the captured image data, the processor 202 may generatea captured image 450. For example, a captured image 450 may be based onimage data detected by an image sensor of a camera 112. That is, thecaptured image 450 may be associated with a field of view 114 as seen bythe electronic device 110.

At 725, the processor 202 may store the captured image 450 in arestricted temporary storage. In some embodiments, the restrictedtemporary storage may be any one of or a combination of flash memory210, RAM 212, or the secure chip 216. In some embodiments, the capturedimage 450 may be stored in a restricted temporary storage to allow theelectronic device 110 to provide a preview image in a viewfinder. Insome embodiments, the captured image 450 may be stored in a restrictedtemporary storage for the purpose of buffering captured images 450 untila later time when a processor 202 determines that the user 102 of theelectronic device 110 or the electronic device 110 is authorized toaccess the captured image data or the generated captured image. That is,if image data is associated with a security marker 415, the processor202 may not allow processor-executable instructions 220 to access ormanipulate the image data or a generated captured image 450.

As described above, at 730, the processor may detect a security marker415 displayed by a display device 120.

At 754, the processor 202 may apply a security policy to the capturedimage data. Applying the security policy to the captured image data mayinclude the processor 202 removing the captured image 450 from therestricted temporary storage.

In some embodiments, if at 754, the processor 202 determines that thecaptured image data and/or the generated captured image 450 isassociated with a detected security marker 415 displayed by a displaydevice 120, the processor 202 may remove the generated captured image450 from the restricted temporary storage such that the image dataand/or the generated captured image 450 may be secured. For example,removing captured image data and/or a generated captured image 450 froma restricted temporary storage may ensure that the contents beingdisplayed on the display device 120 may not be permanently saved orredistributed to unauthorized parties.

In some embodiments, the processor 202 may capture image data using acamera 112. The processor 202 may process the captured image data astemporary data and may use the temporary data for providing a preview ona viewfinder. For example, the processor 202 may capture image data andprovide a preview on a viewfinder in real time. The temporary data maynot be permanently stored in any component of the electronic device 110.For example, the captured image data may be processed in real-time toprovide a preview and be over-written by successively captured imagedata.

In some embodiments, if the processor 202 does detect a security marker415 on a display device 120, the processor 202 may disallow storage ofthe temporary data. In some embodiments, if the processor 202 does notdetect a security marker 415 on a display device 120, the processor 202may allow storage of the temporary data on a memory device of theelectronic device 110. For example, if the processor 202 does not detecta security marker 415 on a display device 120, the processor 202 mayallow a camera application 222 or any other processor-executableinstructions 220 to save the temporary data on a memory device.

Referring again to FIG. 1, in some embodiments, the environment 100 mayinclude a network 130 and a server system 140. The electronic device 110may send and receive communication signals over a network 130. In someembodiments, the electronic device 110 may transmit messages to a serversystem 140 over the network 130 and may receive messages from a serversystem 140 over the network 130. In some embodiments, the server system140 may act as an administration system for electronic devices 110. Forexample, a company may issue electronic devices 110, such as mobiletelephones, to employees. The company may administer security protocolsfor the issued electronic devices 110. Accordingly, as described withreference to FIG. 8, in some embodiments, the electronic device 110 maybe configured to transmit a message to a third-party, such as a serversystem 140, when a processor 202 of the electronic device 110 detects asecurity marker 415 associated with captured image data and/or acaptured image 450.

Reference is now made to FIG. 8, which is a flowchart illustrating anexample method 800 of applying a security policy to image data. Themethod 800 may be performed by an electronic device 110 of the typedescribed above with reference to FIGS. 1 and 2 or a variation of suchelectronic devices. For example, in at least some embodiments,processor-executable instructions 220, such as a security markerdetection application 224, may configure a processor 202 of theelectronic device 110 to perform the method 800.

The method 800 at 810 and 830 may correspond to and may be similar tothose of method 500 at 510 and 530, respectively. That is, the processor202 may capture image data using a camera 112 of the electronic device110, at 810, and detect a security marker 415 displayed by a displaydevice 120, at 830.

At 856, the processor 202 may apply a security policy to captured imagedata. Applying a security policy to captured image data may include theprocessor 202 transmitting a message to a third-party. In someembodiments, the third-party may be a security administrator of theelectronic device 110 and the third-party may be operating the serversystem 140. In some embodiments, the message may include at least one ofidentifying information associated with the electronic device, thecaptured image data, and information associated with the captured imagedata.

In some embodiments, the transmitted message may include information toparticularly identify the electronic device 110. For example, a serialnumber or a unique identifier that may be stored in the secure chip 216of the electronic device 110 may be transmitted to the server system140. A unique identifier may provide the server system 140 withinformation to identify an electronic device 110 that may be attemptingto capture images of confidential information being displayed on adisplay device 120. The security administrator may subsequently chooseto contact the user of the electronic device 110 and to discuss securitypolicies relating to photographing confidential information with theuser of the electronic device 110.

In some embodiments, the transmitted message may include the capturedimage data and/or the captured image 450. For example, when the serversystem 140 receives the captured image data and/or the captured image450, the server system 140 may analyze the received captured image dataand determine whether the data needs to be secured. In some embodiments,a security policy may not necessarily need to be applied to every imagedata being associated with a security marker 415. Accordingly, theserver system 140 may determine whether the received captured image datathat is associated with a security marker 415 needs to be secured.

In some embodiments, if the server system 140 determines that thereceived captured image data needs to be secured, the server system 140may transmit a message to the originating electronic device 110 andrequest that the processor 202 of the electronic device 110 apply afurther security policy to the flagged image data. Accordingly, theserver system 140 may dynamically determine whether image dataassociated with a security marker 415 needs to be secured.

In some embodiments, the transmitted message may include informationassociated with the captured image data. For example, the transmittedmessage may include meta-data associated with the captured image data.For example, the transmitted message may include meta-data associatedwith the captured image data. Subsequently, the server system 140 maydetermine, based on the received meta-data, whether the image data needsto be secured. In some embodiments, if the server system 140 determines,based on the received meta-data, that the image data needs to besecured, the server system 140 may transmit a message to the originatingelectronic device 110 and require that the processor 202 of theelectronic device 110 apply a further security policy to the flaggedimage data.

Reference is now made to FIG. 9, which is a flowchart illustrating anexample method 900 of applying a security policy to image data. Themethod 900 may be performed by an electronic device 110 of the typedescribed above with reference to FIGS. 1 and 2 or a variation of suchelectronic devices. For example, in at least some embodiments,processor-executable instructions 220, such as a security markerdetection application 224, may configure a processor 202 of theelectronic device 110 to perform the method 900.

The method 900 at 910 and 930 may correspond to and may be similar tothose of method 500 at 510 and 530, respectively. That is, the processor202 may capture image data using a camera 112 of the electronic device110, at 910, and detect a security marker 415 displayed at a displaydevice 120, at 630.

At 960, based on the image data, the processor 202 may generate acaptured image 450 that is associated with the security marker 415. Forexample, a captured image 450 may be based on image data detected by animage sensor of a camera 112. That is, the captured image 450 may beassociated with a field of view 114 as seen by the electronic device110.

At 962, based on the one or more security markers 415, the processor 202may alter a captured image 450. As will be described below, in someembodiments, altering the captured image includes modifying the capturedimage to obscure an image portion. In some embodiments, the obscuredimage portion may be the entire captured image 450. For example, at 962,the processor 202 may obscure the entire captured image so that it maynot be discernible to an unaided human eye. In some embodiments, theobscured image portion may be a small portion of the captured image 450.For example, the obscured image portion may generally be a central partof the captured image 450. That is, the obscured image portion may bebased on a template requiring that half of the captured image 450 beobscured. In some embodiments, the processor 202 may reduce the numberof pixels that may be used for displaying the captured image 450, thuscausing the captured image 450 to appear blurry.

Reference is now made to FIG. 10, which is a flowchart illustrating anexample method 1000 of altering a captured image. The method 1000 may beperformed by an electronic device 110 of the type described above withreference to FIGS. 1 and 2 or a variation of such electronic devices.For example, in at least some embodiments, processor-executableinstructions 220, such as a security marker detection application 224,may configure a processor 202 of the electronic device 110 to performthe method 1000.

The method 1000 at 1010 and 1030 may correspond to and may be similar tothose of method 500 at 510 and 530, respectively. That is, the processor202 may capture image data using a camera 112 of the electronic device110, at 1010, and detect a security marker 415 displayed by a displaydevice 120, at 1030. Further, the method 1000 at 1060 may correspond toand may be similar to that of method 900 at 960. That is, at 1060, basedon the image data, the processor 202 may generate a captured image thatis associated with the security marker.

At 1064, the processor may alter the captured image 450. Altering thecaptured image 450 may include the processor 202 displaying a message ona viewfinder of the electronic device 110. The message may notify a user102 of the electronic device 110 that capturing image data isunauthorized.

In some embodiments, the processor 202 may display the message as anoverlay on captured image data or the captured image 450 being previewedon the viewfinder. In some embodiments, the processor 202 may displaythe message by integrating the message information into the image dataor the captured image 450 being previewed on the viewfinder. Forexample, if the processor 202 detects a security marker associated withcaptured image data or if the processor 202 detects a security markerassociated with a captured image 450, the processor 202 may alter thecaptured image data or the captured image 450 by including an“unauthorized image data capture” message. In some embodiments, alteringthe captured image 450 may result in associating the message as awatermark to the captured image data or the captured image 450 to alterthe appearance of the captured image 450.

In some embodiments, at 1064, the processor may not alter the generatedcaptured image 450. Instead, the processor 202 may simply display, basedon the security marker, a message on a viewfinder of the electronicdevice 101. In some embodiments, the message may include informationassociated with the captured image data. That is, in some embodiments,the processor 202 may not generate a captured image 450 from capturedimage data. Rather, on detecting a security marker 415 being displayedby a display device 120, the processor 202 may simply display a warningmessage on a viewfinder of the electronic device 110. The message mayinclude information, such as meta-data, associated with the capturedimage data. For example, the message may describe the image data and mayprovide a notification that the image data is confidential and cannot becaptured.

In some embodiments, the message may provide information to the user 102of the electronic device 110 relating to how the user 102 may beauthenticated or how the electronic device 110 may be authenticated forcapturing the image data. Accordingly, in some embodiments, at 1064,altering the captured image 450 or captured image data may includereplacing the captured image 450 or captured image data with a messagedisplayable on a viewfinder or display 208 of the electronic device 110.

In some embodiments, a captured image 450 may be altered based onidentification of a security boundary. As previously described, in someembodiments, the display device 120 may display a security marker 415 toindicate that any associated image data or captured images 450 may besubjected to a security policy. The display device 120 may display asecurity marker 415 and the security marker 415 may be a pattern that iscoded with discernible information.

In some embodiments, the decoded information may include informationrelating to the specification and capabilities of the display device 120that may be providing the media content frames 310 and the securitymarker frames 320. In some embodiments, the decoded information mayinclude a specification of the boundary that is associated with imagedata related to media content frames 310. For example, the decodedinformation may include information relating to the location of theboundary on a display surface. In some examples, the decoded informationmay specify that a boundary is located in the center of a displaysurface 410 or at a top left corner of the display surface 410. In someexamples, the display surface 410 may be associated with a coordinategrid system and the decoded information may specify the location of aboundary in terms of coordinates in the coordinate grid system.

In some embodiments, the decoded information may contain informationrelated to defined physical features of the security marker 415 asprovided on the display device 120. For example, the decoded informationmay specify that the security marker 415 e illustrated in FIG. 4B may bea square shape and may physically appear on the display surface 410 b asa 5 centimeter by 5 centimeter square. That is, the display device 120may calculate the pixel requirements of the display device 120 forproviding the actual physical dimension of the security marker 415 e onthe display surface 410 d. For example, because the pixel requirementsto display a 5 centimeter by 5 centimeter square on a 30 inch monitormay be different than the pixel requirements to display a 5 centimeterby 5 centimeter square on a 23 inch monitor, a respective display device120 may be tasked with providing the security marker 415 e in accordancewith defined physical features.

In some embodiments, the processor 202 may utilize known physicalfeatures of the security marker 415 e as a baseline for accuratelyplacing a defined boundary in a generated captured image 450.

For example, referring to FIG. 4B, a display device 120 may display asecurity marker 415 e on a display surface 410. An electronic device 110may decode the security marker 415 e and the decoded information mayspecify that the security marker 415 e may be a square shape withphysical dimensions of 5 centimeters by 5 centimeters. Further, thedecoded information may specify that a boundary associated with contentof the display surface 410 b may be located in the center of the displaysurface 410 b. Further, the boundary may be a square having a squaredimension of 10 centimeters by 10 centimeters. Knowing that thedisplayed security marker 415 e is displayed with a square physicaldimension of 5 centimeters by 5 centimeters, the electronic device 110may associate a square boundary at the center of the display surface 410d having dimensions that are double the dimensions of the securitymarker 415 e. Accordingly, the electronic device 110 may use thedisplayed security marker 415 e as a relative baseline for placing aboundary 430 in a captured image 450.

In another example, the decoded information may specify that a boundaryassociated with content of the display surface 410 b may be located inthe center of the display surface 410 b. Further, the boundary may be acircle having a radius of 5 centimeters. Knowing that the displayedsquare security marker 415 e is displayed having a side dimension of 5centimeters, the electronic device 110 may place a circular boundary atthe center of the display surface 410 b having a radius dimension thatis equal in length to a side of the square security marker 415 e.Accordingly, the electronic device 110 may use the displayed securitymarker 415 e as a relative baseline for placing a circular boundary (notshown in FIG. 4B) in a captured image 450.

In some embodiments, security marker frames 320 may provide two or moresecurity markers 415, where each of the two or more security markers 415are coded patterns. In some embodiments, the processor 202 may identifya boundary based on a combination of content circumscribed by two ormore security markers 415 and decoded information from the two or moresecurity markers 415. As an illustrative example, referring to FIG. 4C,a processor 202 may decode a pattern associated with the securitymarkers 415 j, 415 k, 4151, 415 m provided on the display surface 410 d.The decoded information from the security markers 415 j, 415 k, 4151,415 m may indicate that a star-shaped boundary (not shown) may be placedwithin the area circumscribed by the location of the security markers415 j, 415 k, 4151, 415 m.

Reference is now made to FIG. 11, which is a flowchart illustrating anexample method 1100 of altering a captured image. The method 1100 may beperformed by an electronic device 110 of the type described above withreference to FIGS. 1 and 2 or a variation of such electronic devices.For example, in at least some embodiments, processor-executableinstructions 220, such as a security marker detection application 224,may configure a processor 202 of the electronic device to perform themethod 1100.

The method 1100 at 1110 and 1130 may correspond to and may be similar tothose of method 500 at 510 and 530, respectively. That is, the processor202 may capture image data using a camera 112 of the electronic device110, at 1110, and detect a security marker 415 displayed by a displaydevice 120, at 1130. Further, the method 1100 at 1160 may correspond toand may be similar to that of method 900 at 960. That is, at 1160, basedon the image data, the processor 202 may generate a captured image 450that is associated with the security marker.

At 1166, the processor 202 may alter the captured image 450. Alteringthe captured image 450 may include the processor 202 modifying thecaptured image to obscure an image portion circumscribed by a securityboundary defined by the security marker. Referring again to FIGS. 4A,4B, and 4C, the processor 202 may determine that a security boundarycircumscribes at least a portion of a display surface 410 that is withina field of view 114. In some embodiments, based on determining asecurity boundary defined by one or more security markers 415, theprocessor 202 may modify a portion of the captured image 450 that iscircumscribed by the determined security boundary. In some embodiments,the processor 202 may modify the image data circumscribed by thesecurity boundary such that the portion of the captured image 450circumscribed by the security boundary is no longer discernible to anunaided human eye. For example, the portion of the captured image 450circumscribed by the security boundary may be blurred out or obscuredwith an overlaid pattern.

In some embodiments, the processor 202 may modify the image datacircumscribed by the security boundary such that the portion of thecaptured image 450 circumscribed by the security boundary may beinformation that is discernible to a human eye but is image data that isunrelated to the originally captured image data. That is, the processor202 may modify the captured image 450 such that confidential informationcircumscribed by a security boundary is replaced with unrelated orunusable information.

Reference is now made to FIG. 12, which is a flowchart illustrating anexample method 1200 of authenticating an electronic device 110 forcapturing image data. The method 1200 may be performed by an electronicdevice 110 of the type described above with reference to FIGS. 1 and 2or a variation of such electronic devices. For example, in at least someembodiments, processor-executable instructions 220, such as a securitymarker detection application 224, may configure a processor 202 of theelectronic device 110 to perform the method 1200.

The method 1200 at 1210 and 1230 may correspond to and may be similar tothose of method 500 at 510 and 530, respectively. That is, the processor202 may capture image data using a camera 112 of the electronic device110, at 1210, and detect a security marker 415 displayed by a displaydevice 120, at 1230.

At 1270, based on secure data stored at the electronic device 110, theprocessor 202 may authenticate the electronic device 110 to determinewhether the electronic device 110 has permissions to capture image dataassociated with the security marker 415. In some embodiments, the securedata may be stored at a secure chip 216. For example, the secure datamay include a serial number for the electronic device 110 or may includeany other type of unique code to identify the particular electronicdevice 110. In some embodiments, the secure data may be stored on anexternal memory device, such as a user token key, for identifying theuser of the electronic device 110. The user may insert the user tokenkey into an input interface for authentication. In some embodiments, thesecure data may include a password. The electronic device 110 mayprovide an input prompt for requesting a user password and the userpassword may be used to authenticate the electronic device 110.

If the processor 202 determines that the electronic device 110 does nothave permissions to capture image data associated with the securitymarker 415, at 1272, the processor 202 may apply a security policy toimage data captured by the electronic device 110. That is, in responseto unsuccessfully authenticating the electronic device 110, theprocessor 202 may apply a security policy to image data captured by theelectronic device 110. The processor 202 may apply a security policy tothe image data by performing some or all of the features of the methodsdescribed herein. For example, the processor 202 may discard the imagedata that has been captured by the electronic device 110. If thecaptured image data was stored in a restricted temporary storage, theprocessor 202 may remove the captured image from the restrictedtemporary storage. In another example, the processor 202 may disable atrigger mechanism for disallowing an application on the electronicdevice from capturing or retrieving image data.

If the processor 202 determines that the electronic device 110 haspermissions to capture image data associated with the security marker415, at 1274, the processor 202 may store the captured image data in amemory of the electronic device 110. That is, in response tosuccessfully authenticating the electronic device 110, the processor 202may store the captured image data in a memory of the electronic device110.

As apparent from the foregoing examples, in some embodiments, to protectconfidential information or images being displayed on display devices120 in, for example, an engineering laboratory, media content frames 310displayed on display devices 120 may also include periodically displayedsecurity marker frames 320. To prevent employees from capturing imagedata of content displayed on display devices 120 in the confidentialenvironment, the electronic devices 110 issued to employees may beconfigured to detect a security marker displayed on display devices 120and, in response to determining that the security marker is detected bythe electronic device, the electronic devices 110 may be configured toapply a security policy to image data captured by the electronic device110.

In some embodiments, an administrator user for the server system 140 mayoversee the issuance of electronic devices 110 to employees. Forexample, the electronic devices 110 could be smartphone devices ortablet devices having one or more cameras 112. The administrator userfor the server system 140 may devise a list of issued electronic devices110 that may be permitted to capture image data associated with asecurity marker 415. For example, the administrator user may setupelectronic devices 110 issued to management level executives (e.g., achief technology officer) with the ability to capture image datadisplayed on display devices 120 that may be associated with one or moresecurity marker 415 and image data displayed on display devices 120 thatmay not be associated with one or more security markers 415.Accordingly, electronic devices 110 may generally be setup to apply asecurity policy to captured image data when the captured image data isassociated with one or more security marker 415. However, in some cases,specific electronic devices 110 issued to specific users may be setup togenerally allow the camera 112 to capture image data irrespective ofwhether the image data is associated with a security marker 415.

In some embodiments, the electronic device 110 may authenticate user ofthe electronic device 110 or the electronic device 110 on asession-by-session or case-by-case basis. For example, upon detectingthat captured image data may be associated with one or more securitymarkers 415, the electronic device 110 display a message on a viewfinderor display 208 of the electronic device 110 requesting a password orsecure data be inputted for authentication. Thereafter, the electronicdevice 110 may be authenticated to capture image data for a limitedperiod of time, for a limited quantity of image data, or for a durationof time until the electronic device 110 may be placed in a locked stateor may be powered off.

Although in FIG. 12, at 1270, the processor 202 may authenticate theelectronic device 110 after detecting a security marker 415 beingdisplayed by a display device 120, in some embodiments, the processor202 may authenticate the electronic device 110 before detecting asecurity marker 415 (e.g., at 1230) such that the electronic device 110is pre-authorized to capture image data associated with one or moresecurity markers 415.

In some embodiments, in response to determining that a security marker415 is detected by an electronic device 110, such method 500 at 550, theprocessor 202 may perform a combination of actions when applying asecurity policy to image data captured by the electronic device 110. Forexample, when applying a security policy to image data, a processor 202may concurrently transmit a message to a third-party, such as a securityadministrator, and alter image data or obscure a captured image 450.

In some examples, an electronic device 110 may be issued to a user 102on the condition that the electronic device 110 may not be used forcapturing images within an engineering lab. However, if the user 102attempts to capture images within an engineering lab, an electronicdevice 110 may be configured to recognize the use of a camera 112, todetect security markers 415 displayed on one or more display devices,and to enforce rules relating to capturing images within an engineeringlab. In some embodiments, in response to determining that a securitymarker 415 is detected by an electronic device 110, the processor 202may automatically prevent the user 102 from continuing to operate theelectronic device 110. That is, the electronic device 110 mayautomatically power down or enter a locked state. In some embodiments,in response to determining that a security marker 415 is detected by anelectronic device 110, the processor 202 may automatically delete datafrom memory devices of the electronic device 110.

In some embodiments, in response to determining that a security marker415 is detected by an electronic device, the processor 202 may disablethe electronic device 110 and may display a message on a viewfinder ofthe electronic device 110 prompting the user 102 to speak with anadministrator to re-enable the electronic device 110. By prompting theuser 102 to speak with an administrator, the administrator may be ableto investigate whether use of the electronic device 110 by the userposes any security threat to confidential or non-public information.

While the present disclosure is primarily described in terms of methods,a person of ordinary skill in the art will understand that the presentdisclosure is also directed to various apparatus such as a handheldelectronic device including components for performing at least some ofthe aspects and features of the described methods, be it by way ofhardware components, software or any combination of the two, or in anyother manner. Moreover, an article of manufacture for use with theapparatus, such as a pre-recorded storage device or other similarcomputer readable storage medium including program instructions recordedthereon (which may, for example, cause a processor to perform one ormore of the methods described herein), or a computer data signalcarrying computer readable program instructions may direct an apparatusto facilitate the practice of the described methods. It is understoodthat such apparatus, articles of manufacture, and computer data signalsalso come within the scope of the present disclosure.

The term “computer readable storage medium” as used herein means anymedium which can store instructions for use by or execution by acomputer or other computing device including, but not limited to, aportable computer diskette, a hard disk drive (HDD), a random accessmemory (RAM), a read-only memory (ROM), an erasableprogrammable-read-only memory (EPROM) or flash memory, an optical discsuch as a Compact Disc (CD), Digital Versatile/Video Disc (DVD) orBlu-Ray™ Disc, and a solid state storage device (e.g., NAND flash orsynchronous dynamic RAM (SDRAM)).

The embodiments of the present disclosure described above are intendedto be examples only. Those of skill in the art may effect alterations,modifications and variations to the particular embodiments withoutdeparting from the intended scope of the present disclosure. Inparticular, features from one or more of the above-described embodimentsmay be selected to create alternate embodiments comprised of asub-combination of features which may not be explicitly described above.In addition, features from one or more of the above-describedembodiments may be selected and combined to create alternate embodimentscomprised of a combination of features which may not be explicitlydescribed above. Features suitable for such combinations andsub-combinations would be readily apparent to persons skilled in the artupon review of the present disclosure as a whole. The subject matterdescribed herein and in the recited claims intends to cover and embraceall suitable changes in technology.

The invention claimed is:
 1. A method of securing an image displayed onan external display device and detected by an electronic device, themethod comprising: generating image data associated with the detectedimage using the electronic device; detecting, by the electronic device,a security marker displayed by the external display device, the securitymarker being periodically displayed to be undetectable by a human eyethat is viewing the display device; in response to detecting thesecurity marker, modifying the image data to obscure an image portioncircumscribed by a security boundary defined by the detected securitymarker; and generating a captured image including the obscured imageportion for securing the detected image.
 2. The method of claim 1,wherein the image displayed on the external display device includes aplurality of image frames, wherein the image frames are displayed by thedisplay device at a first frequency, and wherein the security marker isdisplayed by the display device at a second frequency, and wherein thefirst frequency is greater than the second frequency.
 3. The method ofclaim 1, further comprising: displaying a message on a viewfinder of theelectronic device, the message notifying a user of the electronic devicethat capturing image data is unauthorized.
 4. The method of claim 1,further comprising: displaying, based on the security marker, a messageon a viewfinder of the electronic device, the message includinginformation associated with the generated image data.
 5. An electronicdevice comprising: a camera; a memory device; and a processor coupled tothe camera and the memory device, the processor being configured to:generate image data associated with an image displayed on an externaldisplay device and detected using the camera; detect, using the camera,a security marker displayed by the external display device, the securitymarker being periodically displayed to be undetectable by a human eyethat is viewing the display device; in response to detecting thesecurity marker, modify the image data to obscure an image portioncircumscribed by a security boundary defined by the detected securitymarker; and generate a captured image including the obscured imageportion for securing the detected image.
 6. The electronic device ofclaim 5, wherein the image displayed on the external display deviceincludes a plurality of image frames, wherein the image frames aredisplayed by the display device at a first frequency, and wherein thesecurity marker is displayed by the display device at a secondfrequency, and wherein the first frequency is greater than the secondfrequency.
 7. The electronic device of claim 5, wherein the processor isfurther configured to: display a message on a viewfinder of theelectronic device, the message notifying a user of the electronic devicethat capturing image data is unauthorized.
 8. A non-transitorycomputer-readable storage medium comprising processor-executableinstructions which, when executed by a processor of an electronicdevice, causes the electronic device to: generate image data associatedwith an image displayed on an external display device and detected usingthe electronic device; detect, by the electronic device, a securitymarker displayed by the external display device, the security markerbeing periodically displayed to be undetectable by a human eye that isviewing the display device; in response to detecting the securitymarker, modify the image data to obscure an image portion circumscribedby a security boundary defined by the detected security marker; andgenerate a captured image including the obscured image portion forsecuring the detected image.
 9. The electronic device of claim 5,wherein the processor is further configured to: display, based on thesecurity marker, a message on a viewfinder of the electronic device, themessage including information associated with the generated image data.10. The method of claim 1, wherein the detected security marker includesthree or more security markers for defining a security boundary.
 11. Themethod of claim 10, further comprising: generating the security boundarybased on joining each of the three or more security markers with anadjacent security marker in the three or more security markers; andidentifying an interior image portion circumscribed by the generatedsecurity boundary as the image portion to obscure.
 12. The method ofclaim 1, wherein the security marker includes a coded pattern encodedwith specifications defining the security boundary.
 13. The method ofclaim 12, wherein the coded pattern encoded with specifications definingthe security boundary includes a location and dimensions of the securityboundary associated with the detected image.
 14. The electronic deviceof claim 5, wherein the detected security marker includes three or moresecurity markers for defining a security boundary.
 15. The electronicdevice of claim 14, wherein the processor is further configured to:generate the security boundary based on joining each of the three ormore security markers with an adjacent security marker in the three ormore security markers; and identify an interior image portioncircumscribed by the generated security boundary as the image portion toobscure.
 16. The electronic device of claim 5, wherein the securitymarker includes a coded pattern encoded with specifications defining thesecurity boundary.
 17. The electronic device of claim 16, wherein thecoded pattern encoded with specifications defining the security boundaryincludes a location and dimensions of the security boundary associatedwith the detected image.
 18. The method of claim 1, wherein modifyingthe image data includes replacing the image portion circumscribed by thesecurity boundary with unrelated data.
 19. The electronic device ofclaim 5, wherein the processor being configured to modify the image dataincludes the processor being configured to replace the image portioncircumscribed by the security boundary with unrelated data.