System and method for enhanced display-screen security and privacy

ABSTRACT

A security method that includes assigning a sensitivity value for a communication with a sensitivity determining module including at least one hardware processor. Following assignment of the sensitivity value to the communication, the communication is formatted for display. When sensitivity value exceeds a security threshold, the communication is parsed into a sequence of fragments. The communication is transmitted as the sequence of fragments when said sensitivity value exceeds the security threshold.

BACKGROUND

Technical Field

The present disclosure relates to security and privacy, and more in someembodiments to providing secure methods and systems for transmittingmessages.

Description of the Related Art

As computer screens are becoming larger, brighter and sharper, they aregenerally easier to read from a greater distance and wider angles. Whilethe trend of bigger, better, brighter, and sharper screens offers agreat benefit to the user, it also presents a drawback: the content ofthe screen may be more visible to prying eyes in the vicinity of theuser. The proliferation of portable computers, tablet computers, as wellas laptops and smart phones with larger screen—and their usage at publicplaces, compromise privacy. For example, more and more corporate usersuse their portable computers for work of potentially sensitivenature—ordinarily conducted behind closed doors in an office—at publicplaces such as coffee shops and airplanes, where their screens could beread by dozens of people at any given time.

SUMMARY

In some embodiments, the present disclosure provides a security system.The security system may include a memory, a hardware processor coupledto the memory, and a sensitivity determining module. The sensitivitydetermining module including instructions on said memory executable bythe hardware processor for assigning a sensitivity value to acommunication. The system may further include a parsing module includinginstructions on the module for execution by the hardware processor forparsing the communications into a sequence of fragments when the valueof sensitivity assigned to the communication by thesensitivity-determining module exceeds a threshold sensitivity value,and indicates a sensitive message. The system may further include atransmission module for transmitting the communication of the sensitivemessage as the sequence of fragments.

In another aspect, the present disclosure provides a security method.The security method may include assigning a sensitivity value for acommunication with a sensitivity-determining module including at leastone hardware processor. Following assignment of the sensitivity valuefor the communication, the communication is formatted for display. Insome embodiments, when the sensitivity value exceeds a thresholdsensitivity value, the communication is parsed into a sequence offragments. The communication may then be transmitted as the sequence offragments when said sensitivity value exceeds the threshold sensitivityvalue.

In yet another aspect of the present disclosure, a computer programproduct is provided. The computer program product may include anon-transitory computer readable storage medium having computer readableprogram code embodied therein for performing a security method fortransmitting a communication. The security method executed by thecomputer program product may include assigning a sensitivity value for acommunication with a sensitivity determining module including at leastone hardware processor. Following assignment of the sensitivity valuefor the communication, the communication is formatted for display. Insome embodiments, when the sensitivity value exceeds a thresholdsensitivity value, the communication is parsed into a sequence offragments. The communication may then be transmitted as the sequence offragments when said sensitivity value exceeds the threshold sensitivitylevel.

These and other features and advantages will become apparent from thefollowing detailed description of illustrative embodiments thereof,which is to be read in connection with the accompanying drawings.

BRIEF DESCRIPTION OF DRAWINGS

The disclosure will provide details in the following description ofpreferred embodiments with reference to the following figures wherein:

FIG. 1 depicts a cloud computing node according to an embodiment of thepresent disclosure.

FIG. 2 depicts a cloud computing environment according to an embodimentof the present disclosure.

FIG. 3 depicts abstraction model layers according to an embodiment ofthe present disclosure.

FIG. 4 is a block/flow diagram illustrating one embodiment of a securitymethod, in accordance with the present disclosure.

FIG. 5 is a block diagram of a security system that assigns asensitivity value to communications, wherein when the sensitivity valuethe communication is parsed into a sequence of fragments to betransmitted to the party that the communication is intended for, inaccordance with one embodiment of the present disclosure

FIG. 6 is a pictorial view of an electronic display screen depicting acommunication as authored from the sender of the communication withoutparsing, in accordance with one embodiment of the present disclosure.

FIGS. 7A-7D are pictorial views depicting the first paragraph of thecommunication depicted in FIG. 6 being parsed into individual sentencesand depicted on an electronic display screen one parsed sentence on thescreen at a time in a sequence consistent with the sequence of sentencesdepicted in the communication depicted in FIG. 6, in accordance with thepresent disclosure.

FIGS. 8A-8G are pictorial views depicting the first sentence of thefirst paragraph of the communication depicted in FIG. 6 being parsedinto individual words and depicted on an electronic display screen oneparsed word on the screen at a time in a sequence consistent with thesequence of words depicted in the communication depicted in FIG. 6, inaccordance with the present disclosure.

FIG. 9 is a pictorial view of a heads up display of a motor vehicleincluding a rapid serial visualization display (RSVP) box, in accordancewith one embodiment of the present disclosure.

DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS

Detailed embodiments of the claimed structures and methods are disclosedherein; however, it is to be understood that the disclosed embodimentsare merely illustrative of the claimed structures and methods that maybe embodied in various forms. In addition, each of the examples given inconnection with the various embodiments are intended to be illustrative,and not restrictive. Further, the figures are not necessarily to scale,some features may be exaggerated to show details of particularcomponents. Therefore, specific structural and functional detailsdisclosed herein are not to be interpreted as limiting, but merely as arepresentative basis for teaching one skilled in the art to variouslyemploy the methods and structures of the present disclosure.

As will be appreciated by one skilled in the art, aspects of the presentdisclosure may be embodied as a system, method or computer programproduct. Accordingly, aspects of the present disclosure may take theform of an entirely hardware embodiment, an entirely software embodiment(including firmware, resident software, micro-code, etc.) or anembodiment combining software and hardware aspects that may allgenerally be referred to herein as a “circuit”, “module” or “system.”Furthermore, aspects of the present disclosure may take the form of acomputer program product embodied in one or more computer readablemedium(s) having computer readable program code embodied thereon.

Any combination of one or more computer readable medium(s) may beutilized. The computer readable medium may be a computer readable signalmedium or a computer readable storage medium. A computer readablestorage medium may be, for example, but not limited to, an electronic,magnetic, optical, electromagnetic, infrared, or semiconductor system,apparatus, or device, or any suitable combination of the foregoing. Morespecific examples (a non-exhaustive list) of the computer readablestorage medium would include the following: an electrical connectionhaving one or more wires, a portable computer diskette, a hard disk, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), an optical fiber,a portable compact disc read-only memory (CD-ROM), an optical storagedevice, a magnetic storage device, or any suitable combination of theforegoing. In the context of this document, a computer readable storagemedium may be any tangible medium that can contain, or store a programfor use by or in connection with an instruction execution system,apparatus, or device.

A computer readable signal medium may include a propagated data signalwith computer readable program code embodied therein, for example, inbaseband or as part of a carrier wave. Such a propagated signal may takeany of a variety of forms, including, but not limited to,electro-magnetic, optical, or any suitable combination thereof. Acomputer readable signal medium may be any computer readable medium thatis not a computer readable storage medium and that can communicate,propagate, or transport a program for use by or in connection with aninstruction execution system, apparatus, or device.

Program code embodied on a computer readable medium may be transmittedusing any appropriate medium, including but not limited to wireless,wireline, optical fiber cable, RF, etc., or any suitable combination ofthe foregoing. Computer program code for carrying out operations foraspects of the present invention may be written in any combination ofone or more programming languages, including an object orientedprogramming language such as Java, Smalltalk, C++ or the like andconventional procedural programming languages, such as the “C”programming language or similar programming languages. The program codemay execute entirely on the user's computer, partly on the user'scomputer, as a stand-alone software package, partly on the user'scomputer and partly on a remote computer or entirely on the remotecomputer or server. In the latter scenario, the remote computer may beconnected to the user's computer through any type of network, includinga local area network (LAN) or a wide area network (WAN), or theconnection may be made to an external computer (for example, through theInternet using an Internet Service Provider).

Aspects of the present disclosure are described below with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems) and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer program instructions. These computer program instructions maybe provided to a processor of a general purpose computer, specialpurpose computer, or other programmable data processing apparatus toproduce a machine, such that the instructions, which execute via theprocessor of the computer or other programmable data processingapparatus, create means for implementing the functions/acts specified inthe flowchart and/or block diagram block or blocks.

These computer program instructions may also be stored in a computerreadable medium that can direct a computer, other programmable dataprocessing apparatus, or other devices to function in a particularmanner, such that the instructions stored in the computer readablemedium produce an article of manufacture including instructions whichimplement the function/act specified in the flowchart and/or blockdiagram block or blocks. The computer program instructions may also beloaded onto a computer, other programmable data processing apparatus, orother devices to cause a series of operational steps to be performed onthe computer, other programmable apparatus or other devices to produce acomputer implemented process such that the instructions which execute onthe computer or other programmable apparatus provide processes forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods and computer program products according to variousembodiments of the present disclosure. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof code, which comprises one or more executable instructions forimplementing the specified logical function(s). It should also be notedthat, in some alternative implementations, the functions noted in theblocks may occur out of the order noted in the figures. For example, twoblocks shown in succession may, in fact, be executed substantiallyconcurrently, or the blocks may sometimes be executed in the reverseorder, depending upon the functionality involved. It will also be notedthat each block of the block diagrams and/or flowchart illustration, andcombinations of blocks in the block diagrams and/or flowchartillustration, can be implemented by special purpose hardware-basedsystems that perform the specified functions or acts, or combinations ofspecial purpose hardware and computer instructions.

Reference in the specification to “one embodiment” or “an embodiment” ofthe present principles, as well as other variations thereof, means thata particular feature, structure, characteristic, and so forth describedin connection with the embodiment is included in at least one embodimentof the present principles. Thus, the appearances of the phrase “in oneembodiment” or “in an embodiment”, as well any other variations,appearing in various places throughout the specification are notnecessarily all referring to the same embodiment.

It is understood that although this disclosure includes a detaileddescription on cloud computing, implementation of the teachings recitedherein are not limited to a cloud computing environment. Rather,embodiments of the present disclosure are capable of being implementedin conjunction with any other type of computing environment now known orlater developed.

Cloud computing is a model of service delivery for enabling convenient,on-demand network access to a shared pool of configurable computingresources (e.g. networks, network bandwidth, servers, processing,memory, storage, applications, virtual machines, and services) that canbe rapidly provisioned and released with minimal management effort orinteraction with a provider of the service. This cloud model may includeat least five characteristics, at least three service models, and atleast four deployment models.

Characteristics are as follows:

On-demand self-service: a cloud consumer can unilaterally provisioncomputing capabilities, such as server time and network storage, asneeded automatically without requiring human interaction with theservice's provider.

Broad network access: capabilities are available over a network andaccessed through standard mechanisms that promote use by heterogeneousthin or thick client platforms (e.g., mobile phones, laptops, and PDAs).

Resource pooling: the provider's computing resources are pooled to servemultiple consumers using a multi-tenant model, with different physicaland virtual resources dynamically assigned and reassigned according todemand. There is a sense of location independence in that the consumergenerally has no control or knowledge over the exact location of theprovided resources but may be able to specify location at a higher levelof abstraction (e.g., country, state, or datacenter).

Rapid elasticity: capabilities can be rapidly and elasticallyprovisioned, in some cases automatically, to quickly scale out andrapidly released to quickly scale in. To the consumer, the capabilitiesavailable for provisioning often appear to be unlimited and can bepurchased in any quantity at any time.

Measured service: cloud systems automatically control and optimizeresource use by leveraging a metering capability at some level ofabstraction appropriate to the type of service (e.g., storage,processing, bandwidth, and active user accounts). Resource usage can bemonitored, controlled, and reported providing transparency for both theprovider and consumer of the utilized service.

Service Models are as follows:

Software as a Service (SaaS): the capability provided to the consumer isto use the provider's applications running on a cloud infrastructure.The applications are accessible from various client devices through athin client interface such as a web browser (e.g., web-based e-mail).The consumer does not manage or control the underlying cloudinfrastructure including network, servers, operating systems, storage,or even individual application capabilities, with the possible exceptionof limited user-specific application configuration settings.

Platform as a Service (PaaS): the capability provided to the consumer isto deploy onto the cloud infrastructure consumer-created or acquiredapplications created using programming languages and tools supported bythe provider. The consumer does not manage or control the underlyingcloud infrastructure including networks, servers, operating systems, orstorage, but has control over the deployed applications and possiblyapplication hosting environment configurations.

Infrastructure as a Service (IaaS): the capability provided to theconsumer is to provision processing, storage, networks, and otherfundamental computing resources where the consumer is able to deploy andrun arbitrary software, which can include operating systems andapplications. The consumer does not manage or control the underlyingcloud infrastructure but has control over operating systems, storage,deployed applications, and possibly limited control of select networkingcomponents (e.g., host firewalls).

Deployment Models are as follows:

Private cloud: the cloud infrastructure is operated solely for anorganization. It may be managed by the organization or a third party andmay exist on-premises or off-premises.

Community cloud: the cloud infrastructure is shared by severalorganizations and supports a specific community that has shared concerns(e.g., mission, security requirements, policy, and complianceconsiderations). It may be managed by the organizations or a third partyand may exist on-premises or off-premises.

Public cloud: the cloud infrastructure is made available to the generalpublic or a large industry group and is owned by an organization sellingcloud services.

Hybrid cloud: the cloud infrastructure is a composition of two or moreclouds (private, community, or public) that remain unique entities butare bound together by standardized or proprietary technology thatenables data and application portability (e.g., cloud bursting forload-balancing between clouds).

A cloud computing environment is service oriented with a focus onstatelessness, low coupling, modularity, and semantic interoperability.At the heart of cloud computing is an infrastructure comprising anetwork of interconnected nodes.

Referring now to FIG. 1, a schematic of an example of a cloud computingnode is shown. Cloud computing node 600 is only one example of asuitable cloud computing node, and is not intended to suggest anylimitation as to the scope of use or functionality of embodiments of thepresent disclosure described herein. Regardless, cloud computing node600 is capable of being implemented and/or performing any of thefunctionality set forth hereinabove.

In cloud computing node 600 there is a computer system/server 122, whichis operational with numerous other general purpose or special purposecomputing system environments or configurations. Examples of well-knowncomputing systems, environments, and/or configurations that may besuitable for use with computer system/server 122 include, but are notlimited to, personal computer systems, server computer systems, thinclients, thick clients, hand-held or laptop devices, multiprocessorsystems, microprocessor-based systems, set top boxes, programmableconsumer electronics, network PCs, minicomputer systems, mainframecomputer systems, and distributed cloud computing environments thatinclude any of the above systems or devices, and the like.

Computer system/server 122 may be described in the general context ofcomputer system-executable instructions, such as program modules, beingexecuted by a computer system. Generally, program modules may includeroutines, programs, objects, components, logic, data structures, and soon that perform particular tasks or implement particular abstract datatypes. Computer system/server 122 may be practiced in distributed cloudcomputing environments where tasks are performed by remote processingdevices that are linked through a communications network. In adistributed cloud computing environment, program modules may be locatedin both local and remote computer system storage media including memorystorage devices.

As shown in FIG. 1, computer system/server 122 in cloud computing node600 is shown in the form of a general-purpose computing device. Thecomponents of computer system/server 122 may include, but are notlimited to, one or more processors or processing units 116, a systemmemory 128, and a bus 180 that couples various system componentsincluding system memory 128 to processor 116.

Bus 118 represents one or more of any of several types of busstructures, including a memory bus or memory controller, a peripheralbus, an accelerated graphics port, and a processor or local bus usingany of a variety of bus architectures. By way of example, and notlimitation, such architectures include Industry Standard Architecture(ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA)bus, Video Electronics Standards Association (VESA) local bus, andPeripheral Component Interconnects (PCI) bus.

Computer system/server 122 typically includes a variety of computersystem readable media. Such media may be any available media that isaccessible by computer system/server 122, and it includes both volatileand non-volatile media, removable and non-removable media.

System memory 128 can include computer system readable media in the formof volatile memory, such as random access memory (RAM) 130 and/or cachememory 132. Computer system/server 122 may further include otherremovable/non-removable, volatile/non-volatile computer system storagemedia. By way of example only, storage system 134 can be provided forreading from and writing to a non-removable, non-volatile magnetic media(not shown and typically called a “hard drive”). Although not shown, amagnetic disk drive for reading from and writing to a removable,non-volatile magnetic disk (e.g., a “floppy disk”), and an optical diskdrive for reading from or writing to a removable, non-volatile opticaldisk such as a CD-ROM, DVD-ROM or other optical media can be provided.In such instances, each can be connected to bus 118 by one or more datamedia interfaces. As will be further depicted and described below,memory 128 may include at least one program product having a set (e.g.,at least one) of program modules that are configured to carry out thefunctions of embodiments of the methods, systems and computer programproducts disclosure herein.

Program/utility 140, having a set (at least one) of program modules 142,may be stored in memory 128 by way of example, and not limitation, aswell as an operating system, one or more application programs, otherprogram modules, and program data. Each of the operating system, one ormore application programs, other program modules, and program data orsome combination thereof, may include an implementation of a networkingenvironment. Program modules 142 generally carry out the functionsand/or methodologies of embodiments of the invention as describedherein. For example, the program modules 142 may carry out the functionsand/or methodologies of the sensitivity determining module 10 fordetermining the sensitivity of a communication, parsing module 15 forparsing communications, and transmission module 20 for transmittingcommunications, which are described below with reference to FIGS. 4 and5.

Computer system/server 122 may also communicate with one or moreexternal devices 140 such as a keyboard, a pointing device, a display240, etc.; one or more devices that enable a user to interact withcomputer system/server 122; and/or any devices (e.g., network card,modem, etc.) that enable computer system/server 122 to communicate withone or more other computing devices. Such communication can occur viaInput/Output (I/O) interfaces 220. Still yet, computer system/server 122can communicate with one or more networks such as a local area network(LAN), a general wide area network (WAN), and/or a public network (e.g.,the Internet) via network adapter 200. As depicted, network adapter 200communicates with the other components of computer system/server 122 viabus 180. It should be understood that although not shown, other hardwareand/or software components could be used in conjunction with computersystem/server 122. Examples, include, but are not limited to: microcode,device drivers, redundant processing units, external disk drive arrays,RAID systems, tape drives, and data archival storage systems, etc.

Referring now to FIG. 2, illustrative cloud computing environment 50 isdepicted. As shown, cloud computing environment 50 comprises one or morecloud computing nodes 100 with which local computing devices used bycloud consumers, such as, for example, personal digital assistant (PDA)or cellular telephone 54A, desktop computer 54B, laptop computer 54C,and/or automobile computer system 54N may communicate. These devices mayprovide the displays 300 for sending and transmitting the communicationsin the security systems, methods and computer program products that aredescribed below with reference to FIGS. 4-9.

Referring to FIG. 2, the nodes 100 may communicate with one another.They may be grouped (not shown) physically or virtually, in one or morenetworks, such as Private, Community, Public, or Hybrid clouds asdescribed hereinabove, or a combination thereof. This allows cloudcomputing environment 50 to offer infrastructure, platforms and/orsoftware as services for which a cloud consumer does not need tomaintain resources on a local computing device. It is understood thatthe types of computing devices 54A-N shown in FIG. 2 are intended to beillustrative only and that computing nodes 100 and cloud computingenvironment 50 can communicate with any type of computerized device overany type of network and/or network addressable connection (e.g., using aweb browser).

Referring now to FIG. 3, a set of functional abstraction layers providedby cloud computing environment 50 (FIG. 2) is shown. It should beunderstood in advance that the components, layers, and functions shownin FIG. 3 are intended to be illustrative only and embodiments of thesystems, methods and computer program are not limited thereto. Asdepicted, the following layers and corresponding functions are provided:

Hardware and software layer 60 includes hardware and softwarecomponents. Examples of hardware components include: mainframes 61; RISC(Reduced Instruction Set Computer) architecture based servers 62;servers 63; blade servers 64; storage devices 65; and networks andnetworking components 66. In some embodiments, software componentsinclude network application server software 67 and database software 68.

Virtualization layer 70 provides an abstraction layer from which thefollowing examples of virtual entities may be provided: virtual servers71; virtual storage 72; virtual networks 73, including virtual privatenetworks; virtual applications and operating systems 74; and virtualclients 75.

In one example, management layer 80 may provide the functions describedbelow. Resource provisioning 81 provides dynamic procurement ofcomputing resources and other resources that are utilized to performtasks within the cloud computing environment. Metering and Pricing 82provide cost tracking as resources are utilized within the cloudcomputing environment, and billing or invoicing for consumption of theseresources. In one example, these resources may comprise applicationsoftware licenses. Security provides identity verification for cloudconsumers and tasks, as well as protection for data and other resources.User portal 83 provides access to the cloud computing environment forconsumers and system administrators. Service level management 84provides cloud computing resource allocation and management such thatrequired service levels are met. Service Level Agreement (SLA) planningand fulfillment 85 provide pre-arrangement for, and procurement of,cloud computing resources for which a future requirement is anticipatedin accordance with an SLA.

Workloads layer 90 provides examples of functionality for which thecloud computing environment may be utilized. Examples of workloads andfunctions which may be provided from this layer include: mapping andnavigation 91; software development and lifecycle management 92; virtualclassroom education delivery 93; data analytics processing 94;transaction processing 95; and secure communication processing 96. Thesecure communication processing 96 provided by workload layer 90 mayinclude functions and/or methodologies of the sensitivity determiningmodule 10 for determining the sensitivity of a communication, parsingmodule 15 for parsing communications, and transmission module 20 fortransmitting communications, which are described below with reference toFIGS. 4 and 5.

Referring to FIGS. 1-9, the methods, systems and computer programproducts disclosed herein provide enhanced display-screen security andprivacy. Preventing ‘screen captures’ of sensitive material displayed ona screen, such as a computer screen, smartphone or other deviceincluding a screen, by unintended recipients of the sensitive subjectmatter is a big area of interest. In particular, the methods, systemsand computer program products of the present disclosure include asensitivity determining module 10 for determining the sensitivity of acommunication, e.g., text and images, which are to be transmitted in amessage to be viewed to the intended party to a communication exchange.For example, the sensitivity determining module 10 may designate asensitivity value for highly sensitive material or may designate asensitivity value for low sensitive material depending on the content ofthe text and images which are to be transmitted in the communication.The sensitivity value of the communication may be judges relative to athreshold sensitivity level. Based on the level of sensitivity assignedto the text and images by the sensitivity determining module 10, aparsing module for parsing sensitive communications 15 may section thetext and images, wherein each parsed portion of the sensitive text andimages when viewed individually does not transmit the sensitive subjectmatter to the viewer. But, when the parsed portions of the sensitivetext and images when viewed in the appropriate parse sequence insubstantially their entirety communicates the sensitive subject matterto the party receiving the sensitive communication.

The system may further include a transmission module 20 for transmittingthe communication. The transmission module 20 transmits thecommunication without parsing to a second party when the parsing module15 does not parse the communication. The transmission module 20transmits the communication as the sequence of fragments to the secondparty when the parsing module for parsing has parsed the communication.As will be described in further detail below, transmission of thecommunication as the sequence of fragments parsed by the parsing modulefor the communication may be by a rapid serial visualization (RSV)presentation, e.g., Spritz presentation.

In this manner, the methods, systems, and computer products that aredisclosed herein transmit communications in a way that makes it moredifficult for an unintended recipient to casually view and comprehendthe sensitive subject matter, e.g., sensitive text, from the displayscreen of an electronic device, e.g., desktop, laptop, smart phone,tablet, etc. For example, information that is sensitive may beconsidered confidential information and/or information that isproprietary in nature. Loss, misuse, modification, or unauthorizedaccess to sensitive information can adversely affect the privacy orwelfare of an individual, trade secrets of a business or even thesecurity, internal and foreign affairs of a nation depending on thelevel of sensitivity and nature of the information. The conceptsdisclosed herein may also be useful to reduce copyright violations andto reduce the easy capture and posting of confidential information.

In some embodiments, the methods, systems and computer program productsare applicable to any type of information that may be consideredsensitive by the party transmitting of the communication. Sensitivematerial may include any marketing strategies, plans, financialinformation, or projections, operations, sales estimates, business plansand performance results relating to the past, present or future businessactivities of such party, its affiliates, subsidiaries and affiliatedcompanies; (ii) plans for products or services, and customer or supplierlists; (iii) any scientific or technical information, invention, design,process, procedure, formula, improvement, technology or method; (iv) anyconcepts, reports, data, know-how, works-in-progress, designs,development tools, specifications, computer software, source code,object code, flow charts, databases, inventions, information and tradesecrets; and any information that indicated as being sensitive by theparty transmitting the information in a communication.

Referring to FIGS. 4 and 5, in some embodiments, the security methodbegins at step 101 with assigning a sensitivity value for acommunication using the sensitivity determining module 10. FIG. 4depicts a flow diagram depicting one embodiment of the security methoddisclosed herein. It is noted that the methods of the present disclosureare not limited to only the steps depicted in FIG. 4, as any number ofpreliminary steps and steps following the final steps depicted in FIG. 4may also be included in the methods disclosed herein. Further, a numberof intermediary steps may be practiced between each of the stepsdepicted in FIG. 4. FIG. 5 is a block diagram of a security system thatassigns a sensitivity value to communications, wherein when thesensitivity value the communication is parsed into a sequence offragments to be transmitted to the party that the communication isintended for.

The communication analyzed by the sensitivity determining module 10 maybe text and images transmitted by one of electronic mail (email), realtime electronic chats (e.g., instant messenger (AOL instantmessenger/MSN instant messenger/blackberry messenger (BBM), and texts(e.g., texts sent and receive using cell phones/smart phones). Thesensitivity value assigned to the communication being analyzed by thesensitivity determining module 10 may be based on text analysis of thecommunication, tags attached to the communication, and an indicationsupplied by the sender of the communication that it contains sensitiveinformation, e.g., confidential and/or proprietary information. Althoughthe majority of the examples described herein refer to communicationsincluding text and images, the communications that are analyzed by thesensitivity determining module 10 may also be audio communications.

In some embodiments, text analysis as applied by the sensitivitydetermining module 10 to determine whether the communication includessensitive material, e.g., confidential and/or proprietary information,involves information retrieval, lexical analysis to study word frequencydistributions, pattern recognition, tagging/annotation, informationextraction, data mining techniques including link and associationanalysis, visualization, and predictive analytics. For example, textanalysis of a communication by the sensitivity determining module 10 mayinclude searching for keywords, determining frequency of keywords, andsequences of keywords, in which the presence of the keywords canidentify whether the communication is highly sensitive. In someembodiments, the sensitivity determining module determines thesensitivity of a communication by analyzing the presence of tags in thecommunication. A tag can be a keyword, e.g., non-hierarchical keyword,or term assigned to a piece of information. For example, and emailcommunication can be tagged as being confidential or proprietary, whichwould indicate that the document is highly sensitive. Tags can be a formof metadata that can help describe the sensitivity of communication.Tags are generally chosen by the communications creator/author. Forexample, the users can tag different areas of text that are moresensitive or not. In the given context, type of content, URL, and thedevice where content of the communication to be analyzed is rendered,etc., may all be forms of information that can be tagged into acommunication. Depending on the message provided by the tag, thecommunication can be sensitive or not sensitive.

In some embodiments, social networks can be further used through activelearning to improve the evaluation of sensitivity and computation of thesensitivity level of the communication by the sensitivity determiningmodule 10. The proposal may be to use the social network analysis by thesystem to allow the system to interact with one or more users as a pointof contact into a deeper social network where more accurate informationmay lie.

In some embodiments, the decision that a communication is sensitive maybe trigged by the actions of an unintended viewer to intercept thecommunication, e.g., by attempting to take a screen capture. Sensorsincorporated into the device for receiving the communication may detectthe presence of the unintended viewer attempting to intercept thecommunication, which in turn can send a signal to the sensitivitydetermining module 10 to designate the communication as being sensitive.

Still referring to FIGS. 4 and 5, the sensitivity determining module 10may assign a sensitive level to the communication that is beinganalyzed, and then compare the sensitivity level to a thresholdsensitivity level at step 102 of the process flow depicted in FIG. 5.For example, the sensitivity determining module may assign a level of Aor level B to text or images or audio that are not considered to besensitive, while the sensitivity determining module may assign a levelof C to text or images or audio that are considered to be sensitive. Thedetermination of level C value of sensitivity may be based on whetherthe communication includes terms, i.e., keywords, that have beendesignated as indicative of confidential and/or proprietary information,or whether the author of the communication has tagged the communicationas being confidential and/or proprietary.

Following assignment of the sensitivity value for the communication, thecommunication is formatted for display. Formatting of the communicationfor display can be the function of the parsing module for parsing thesensitive communication 15. At step 103 of the process flow depicted inFIG. 5, formatting of the communication for the display may begin with adecision of whether the sensitivity value assigned by the sensitivitydetermining module 10 exceeds the threshold sensitivity level.

Depending upon whether the sensitivity value exceeds the thresholdsensitivity value, the parsing module for parsing the sensitivecommunication 15 will parse the communication. As used herein, the term“parse” as used to describe the formatting of the communication includessectioning the communication into portions. For example, a textualmessage that has a sensitivity level greater than the thresholdsensitivity level may be parsed into individual words of thatcommunication, which are to be communicated to the intended receiver intheir sequence as provided by the sequence of words in thecommunication. In some embodiments, it is not required that thecommunication be parsed into single words in a textual communication,e.g., the communication may be parsed into groups of words that are lessthan a full sentence, full sentences and/or paragraphs from thecommunication. For example, when the communication is being parsed intogroup may range from 2 words to 5 words. This is one example of words ina parsed group from a full communication that has been identified ashaving a sensitivity level exceeding the threshold sensitivity level. Inother example, the number of words in a parsed group may be equal to 2,3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19 and 20, orany range for the number of words in a group with a lower limit andupper limit provided by the above examples. Similar to the embodimentsin which the communication is parsed into single words, in theembodiments in which the communication is parsed into groups of wordsthat are less than a full sentence, full sentences and/or paragraphsfrom the communication, the parsed portions of the communication may becommunicated to the intended receiver in their sequence as provided bythe sequence in the communication.

In the embodiments, in which the communication includes an image, theimage may be sectioned into portions by the parsing module for parsingthe sensitive communication 15. For example, the image may be sectionedinto parsed portions according to a grid. In some examples, at the timeof display, each of the parsed portions may then be displayed to theintended receiver in a sequence consistent with the grid, e.g., eachparsed portion of the image can be displayed individually from left toright on the screen, or up and down on the screen.

In some other embodiments, in which the communication includes audio,the parsing module for parsing the sensitive communication 15 may firstconvert the audio communication into a textual communication. Followingconversion to the textual communication, the textual communication maybe parsed into sections for display. Similar to the embodiments in whichtext communication are parsed, in the embodiments in which the audiocommunication is converted into text, the text may be parsed into parsedportions which can comprise of a single word, multiple words in lessthan a sentence, sentences, and paragraphs. The parsed portions of thetext may be communicated to the intended receiver in their sequence, asprovided by the original sequence in the audio communication.

In yet some other embodiments, a text communication may be convertedfrom text to audio. The audio may then be communicated to the intendedreceiver without the text display for the message. In the embodiments inwhich the text communication is converted to audio, security may beprovided by listening to the audio using headphones, as opposed tovisually viewing text.

In yet another embodiment, the text communication may be parsed so thatthe order of the letters in each word of the communication are changedexcept for the first and last letter of each word.

The degree of parsing may be dependent upon the degree of sensitivity ofthe communication. For example, as noted above, the sensitivitydetermining module 10 may designate varying degrees of sensitivity thatwould requiring parsing or conversion of the communication from one formof medium, e.g., text, to another form of medium, e.g., audio. Forexample, in the embodiments in which a sensitivity level of A or B doesnot require that the communication be parsed, and a sensitivity level ofC does require that the communication be parsed, other sensitivitylevels may indicate a greater degree of parsing, e.g., sensitivitylevels D, E, F, and G. For example, a sensitivity level of C may requirethat a textual message be parsed into paragraphs; a sensitivity level ofD may require that a textual message be parsed into sentences; asensitivity level of E may require that a textual message be parsed intothree word terms; a sensitivity level of F may require that a textualmessage be parsed into single words; and a sensitivity level of G mayrequire that the textual message be converted to audio for listening bythe intended user with headphones.

In the examples, in which the message is parsed into single words, thehigher the sensitivity level, the faster the sequence of words that arebeing depicted on an electronic display screen for viewing by theintended recipient, e.g., the sequence of words may be displayed at arate of 200 words per minute to 1000 words per minute dependent upon thesensitivity of the communication.

Referring back to FIG. 4, in some embodiments, when the sensitivityvalue exceeds the threshold sensitivity level, the communication isparsed into a sequence of fragments at step 104. In some embodiments,when the sensitivity value does not exceed the security threshold thecommunication is not parsed by the parsing module 15 at step 105.

Referring to FIGS. 4 and 5, the communication may then be transmitted tothe intended party for receiving the communication by the transmissionmodule for transmitting the communication 20. Referring to FIG. 4, whenthe communication has not been parsed, i.e., when the sensitivity of thecommunication does not exceed the sensitivity threshold, thetransmission module 20 transmits the communication in its originalformat at step 107. For example, when the communication is notsensitive, and if the communication is in the form of a textual email,the email is transmitted by the transmission module 20 to the displayscreen 300 of the intended party for receiving the communication,wherein the communication is not parsed so that the entirety of themessage is simultaneously displayed on the display screen 300 at thesame time, as depicted in FIG. 6.

Referring to FIGS. 4 and 5, when the sensitivity value set by thesensitivity determining module 10 exceeds the security threshold, andthe parsing module 15 has parsed the sensitive message into a sequenceof fragments, the transmission module 20 transmits the communication asthe sequence of fragments to the intended receiving party at step 106 ofthe method depicted in FIG. 4. The fragments are depicted on theelectronic display, i.e., display screen 300, in accordance with theparsing provided by the parsing module 14 and the sensitivitydetermining module 10.

In one embodiment, when the parsing module 15 parses the communicationinto separate paragraphs, the transmission module 20 may display eachparagraph individually on the display screen 300 in sequence. The timethat each paragraph may be present on the display screen prior tosequencing to the following paragraph may be dependent upon thesensitivity value set by the sensitivity determining module 10.

FIGS. 7A-8G depicts examples of parsed sensitive communications beingtransmitted by the transmission module 20 to the display screen 300 ofthe intended receiver of the communication. The display screen 300 maybe the screen of a terminal, desktop computer, laptop computer, tablet,phone, or combination thereof. The aforementioned examples of displayscreens 300 are intended to be illustrative, and are not intended tolimit the present disclosure. For example, any device for receiving acommunication including a display screen is suitable for use with thesystems, methods and computer program products that are disclosedherein.

FIGS. 7A-7D depict another embodiment of the present disclosure, inwhich the parsing module 15 have parsed the sensitive communication intoseparate sentences. More specifically, FIGS. 7A-7D depict transmissionof the first paragraph of the communication depicted in FIG. 6.

FIG. 7A depicts transmission of the first sentence of the firstparagraph depicted in FIG. 6 on the display screen 300 of the intendedreceiver for the communication. In this example, the first sentence ofthe communication is the only portion of the communication that isdepicted at the time the first sentence of the communication istransmitted. FIG. 7B depicts transmission of the second sentence of thefirst paragraph depicted in FIG. 6 on the display screen 300 of theintended receiver for the communication. During the transmission of thesecond sentence of the first paragraph, the first sentence of the firstparagraph of the first paragraph has been removed from the displayscreen 300. In this example, the second sentence of the communication isthe only portion of the communication that is depicted at the time thesecond sentence of the communication is transmitted. FIG. 7C depictstransmission of the third sentence of the first paragraph depicted inFIG. 6 on the display screen 300 of the intended receiver for thecommunication. During the transmission of the third sentence of thefirst paragraph, the second sentence of the first paragraph of the firstparagraph has been removed from the display screen 300, and the thirdsentence of the communication is the only portion of the communicationthat is depicted at the time the third sentence of the communication istransmitted by the transmission module 20. FIG. 7D depicts transmissionof the fourth sentence of the first paragraph depicted in FIG. 6 on thedisplay screen 300 of the intended receiver for the communication.During the transmission of the fourth sentence of the first paragraph,the third sentence of the first paragraph of the first paragraph hasbeen removed from the display screen 300, and the fourth sentence of thecommunication is the only portion of the communication that is depictedat the time the fourth sentence of the communication is transmitted bythe transmission module 20.

FIGS. 7A-7D depict only the transmission of the first paragraph of thecommunication. In some embodiments, the transmission of thecommunication may continue with the transmission of the secondparagraph, wherein the second paragraph has been parsed into sentences,and each parse sentence may be transmitted by the transmission module 30individually on the display screen 300 of the intended receiver for thecommunication, similar to the above describe mode of transmission of theparsed sentences for the first paragraph of the communication.

The speed of display and sequencing of the parsed sentences may bedependent upon the sensitivity level set by the sensitivity determiningmodule 20. For example, the sentences may be transmitted at a rate of 10sentences per minute to 30 sentences per minute.

FIGS. 8A-8G depict another embodiment of the present disclosure, inwhich the parsing module 15 have parsed the sensitive communication intoseparate words. More specifically, FIGS. 8A-8G depict transmission ofthe first sentence of the communication depicted in FIG. 6, wherein thefirst sentence has been parsed into individual words.

FIG. 8A depicts transmission of the first word of the first sentencedepicted in FIG. 6 on the display screen 300 of the intended receiverfor the communication. In this example, the first word of thecommunication is the only portion of the communication that is depictedat the time the first word of the communication is transmitted. FIG. 8Bdepicts transmission of the second word of the first sentence depictedin FIG. 6 on the display screen 300 of the intended receiver for thecommunication. During the transmission of the second word of the firstsentence, the first word of the first sentence of the communication hasbeen removed from the display screen 300. In this example, the secondword of the communication is the only portion of the communication thatis depicted at the time the second word of the communication istransmitted. FIG. 8C depicts transmission of the third word of the firstsentence depicted in FIG. 6 on the display screen 300 of the intendedreceiver for the communication. During the transmission of the thirdword of the first sentence, the second word of the first sentence of thefirst paragraph has been removed from the display screen 300, and thethird word of the communication is the only portion of the communicationthat is depicted at the time the third word of the communication istransmitted by the transmission module 20. FIG. 8D depicts transmissionof the fourth word of the first sentence depicted in FIG. 6 on thedisplay screen 300 of the intended receiver for the communication.During the transmission of the fourth word of the first sentence, thethird word of the first sentence of the first sentence has been removedfrom the display screen 300, and the fourth word of the communication isthe only portion of the communication that is being transmitted to thedisplay screen. FIG. 8G depicts transmission of the final word of thefirst sentence depicted in FIG. 6.

FIGS. 8A-8G depict only the transmission of the first sentence of thecommunication. In some embodiments, the transmission of thecommunication may continue with the transmission of the remainder ofsentences in the first paragraph, as well as sentences in the secondparagraph, wherein each of the sentences have been parsed into words.Each parsed word may be transmitted by the transmission module 30individually on the display screen 300 of the intended receiver for thecommunication.

The speed of display and sequencing of the parsed words may be dependentupon the sensitivity level set by the sensitivity determining module 20.For example, the parsed words may be displayed at a rate of 100 wordsper minute to 1000 words per minute. In one examples, the parsed wordsmay be displayed at a rate of 200 to 700 words per minute.

In other embodiments, when the communication is a sensitive image thathas been parsed, the transmission module 20 may display each of theparsed sections of the image in the sensitive communication in asequence consistent with the grid by which the image was sectioned,i.e., parsed. For example, each parsed portion of the image can bedisplayed individually from left to right on the display screen, or upand down on the display screen, in accordance with the mode oftransmission set by the transmission module 20. In the embodiments, inwhich the sensitive image has been converted to text, the text may bedisplayed to the intended receiver in a manner similar to the way thetext has been described as being described above.

In yet further embodiments, the sensitivity level of the communicationset by the sensitivity determining module 10 may be so high that thetext is converted to audio. In this example, the transmission module 20does not transmit text to the display screen 300 of the intendedreceiver of the communication. Instead, the transmission moduletransmits the communication as audio, which is to be received by theintended receiver through a pair of headphones. In some examples, thetransmission module 20 may also send a textual message to be displayedon the display 300 indicating to the intended receiver that thecommunication is sensitive, and has been converted to audio to belistened to through a set of earphones to avoid that unintended partiescan have the opportunity to listen in to the communication.

In some examples, the sensitivity determining module 10, the parsingmodule 15, and the transmission module 20 provide for an automaticconversion of ‘sensitive information’ in a communication to a rapidserial visualization (RSV) presentation, which may also be referred toas a Spritz reading presentation. The rapid serial visualization (RSV)reader is a simple, small box that streams text at the reader, one wordat a time. In this manner, it is much more difficult to capture theinformation, although it is fairly easy for a recipient to read suchinformation. Spritz that is available from Spritz Inc. is only oneexample of a rapid serial visualization (RSV) presentation, and thepresent disclosure is not limited to only this example. There have beenmany rapid serial visualization (RSV) presentation schemes developed,such as those executable on Android and Apple platforms, which may beavailable under the titles A Faster Reader, Balto Speed Reading,RapidRead, SpeedBookReader, Speed Reader Spritzer, Speed Reacing,Speedy-Speed Reading; Spree, and Velocity. Any rapid serialvisualization (RSV) presentation is suitable for use with the presentdisclosure, and may typically include Optimal Recognition Point and/orOptimal Viewing Position (OVP) schemes to aid the viewer in recognizingthe meaning of the messages being transmitted.

In particular, in one example, the a system and methods disclosed hereinprovide a display screen 300; a computation of the sensitivity withconfidence level (sensitivity level), e.g., sensitivity determiningmodule 10; a method for converting the communication to a Spritzpresentation, e.g., parsing module 15; and based on the sensitivityvalue assigned by the sensitivity determining module 5, a method fortriggering and displaying text (textual representation of images) withthe rapid serial visualization (RSV) presentation. This method andsystem can make it more difficult for someone to casually capturesensitive text from a display screen, and to print, view, anddisseminate such information. This may also be useful to reducecopyright violations and to reduce the easy capture and posting ofconfidential information.

In some examples, the rapid serial visualization (RSV) containing methodmay begin with determining that transmitted content is “sensitive”content, e.g., with sensitivity level C or greater, as described above.For example, email, chat, or instant messages may be determined to besensitive based on tagging by the sender, or on an automateddetermination. If the sensitivity level is greater than a thresholdsensitivity level, e.g., the sensitivity level of the communication isdetermined to be a level C or greater, the communication is converted toa rapid serial visualization (RSV) presentation format, e.g., by theparsing module 15, and the system automatically triggers, e.g., with thetransmission module 20, the rapid serial visualization (RSV)transmission on the display 300. For example, the rapid serialvisualization (RSV)/spritz system may flash words to the intendedreceiver in quick succession so that the intended receiver of thecommunication does not have to move their eyes around on a screen tocomprehend the message. A rapid serial visualization (RSV) presentationis similar to the sequence of words described above with reference toFIGS. 8A-8G. This type of presentation can make is more arduous for anunintended receiver of the communication to capture the communication ina convenient way and transmit to additional third parties that are notintended receivers of the communication. When sensitivity level is lessthan a threshold sensitivity level, e.g., the sensitivity level of thecommunication is determined to be a level of A or B, i.e., less thanlevel C, the rapid serial visualization (RSV) presentation mode may beun-triggered. Additionally, and optionally, if the sensitivity level ofthe communication to be transmitted is much greater than the thresholdsensitivity value, the text and images may be converted to audio andconveyed via headphones, earphones, etc., thus making it hard for anunintended third party recipient to capture sensitive information from ascreen.

In yet other examples, an audio communication/broadcast may bemonitored. Audio may be converted to text and analyzed for sensitivecontent by the aforementioned sensitivity determining module 10. If thesensitivity level assigned to the audio/broadcast is greater than thethreshold value, e.g., the sensitivity level is assigned to be level Cor greater, an integrate rapid serial visualization (RSV) display may beactivated to display audio to text in rapid serial visualization (RSV)format. The audio is then muted.

In accordance with some objectives of the present disclosure, thesystem, method and computer products disclosed herein provide forautomatically toggling to a rapid serial visualization (RSV)/Spritzformat of communication when sensitive (e.g. confidential, embarrassing,copyrighted content) is transmitted.

Automatically converting from a traditional reader to a Spritz/RapidSerial Visual Presentation (RSVP) reader is interesting, especially asit pertains to security and privacy. The detection of a security riskmay be triggered in interesting ways, in addition to the aforementionedapproaches such as the use of tags and text analytics. For example, thetriggering of the transition to the RSVP may be: 1) due to a userattempting to take a screen capture, or 2) due to someone reading overthe shoulder of a for-your-eyes-only recipient. Also, the system maysense the ambient viewing environment to determine that it is likelythat a second reader, i.e., unintended recipient for the communication,may be present. In other embodiments, the reason converting to RapidSerial Visual Presentation (RSVP) may be a block of text can be read bymany readers simultaneously, where each reader may be on a differentword in the text at any given moment. In some embodiments, Rapid SerialVisual Presentation (RSVP) requires that all readers be on the sameword, and so will afford the user of Rapid Serial Visual Presentation(RSVP) some inherent privacy, since another reader may not get the“gist” of the text if they start at this point.

In some embodiments, the systems described herein may apply tolocation-based services in which the user's location is used todetermine when it is likely to be useful to atomically switch amessaging modality to the Rapid Serial Visual Presentation (RSVP) forprivacy or security. The methods, systems and computer productsdescribed herein may apply to various domains in which privacy isuseful, including when discussing medical concerns. This invention isgenerally applicable to privacy, security, and communications amongpeople—and communications from machines to people.

We also note that the Rapid Serial Visual Presentation (RSVP) may beused in an audio broadcast/communication context. Consider an audiointerface within a car to a radio broadcast, satellite radio broadcast,or other broadcast, or a communication over a cellular phone broadcastinto the car. At certain times in the broadcast, the sensitivity module10 of the system, which may be incorporated into the receiver of thecommunication, detects that the broadcast has become sensitive. Adashboard display integrated in the driver's field of view then displaysRapid Serial Visual Presentation (RSVP) of the broadcast speech to text,and the audio is muted. The display 300 may be integrated into a headsup display of a motor vehicle. In addition, we disclose that Spritz/RSVPtext may be sized according to the volume of the broadcast/speech, suchthat a reader of the RSVP/Spritz may be aware of such emphasis despitethe broadcast being muted. This could be useful when a phoneconversation, radio news-story, or radio-host dialog contains contentthat may not be suitable for all family members in a car.

Referring to FIG. 5, a security system 500 is provided that includessensitivity determining module 10, a parsing module for parsingsensitive communications 15, and a transmission module 20 fortransmitting the communication. The sensitivity determining module 10includes at least one hardware processor for determining the sensitivityof a communication received from a first party, wherein the sensitivitydetermining module 10 assigns a sensitivity value for the communication.The parsing module 15 is for parsing sensitive communications when thevalue of sensitivity assigned to the communication by the sensitivitydetermining module 10 indicates a sensitive communication. In someembodiments, when the value of the sensitivity assigned to thecommunication by the sensitivity determining module indicates anon-sensitive message, the module for parsing the sensitivecommunication 15 does not parse the communication. When the parsingmodule 15 does not parse the communication, the transmission module 20transmits the communication without parsing to a second party. When theparsing module for parsing the sensitive communication 10 has parsed thesensitive message into said sequence of fragments, the transmissionmodule 20 transmits the communication as the sequence of fragments tothe second party.

In one embodiment, the system 500 preferably includes one or moreprocessors 918, e.g, hardware processor, and memory 916 for storingapplications, modules and other data. In one example, the one or moreprocessors 918 and memory 916 may be components of a computer, in whichthe memory may be random access memory (RAM), a program memory(preferably a writable read-only memory (ROM) such as a flash ROM) or acombination thereof. The computer may also include an input/output (I/O)controller coupled by a CPU bus. The computer may optionally include ahard drive controller, which is coupled to a hard disk and CPU bus. Harddisk may be used for storing application programs, such as someembodiments of the present disclosure, and data. Alternatively,application programs may be stored in RAM or ROM. I/O controller iscoupled by means of an I/O bus to an I/O interface. I/O interfacereceives and transmits data in analog or digital form over communicationlinks such as a serial link, local area network, wireless link, andparallel link.

The system 500 may include one or more displays 914 for viewing thefunctionality of the modules 10, 15, 20 of the system 500. The displays914 may permit a user to interact with the system 500 and its componentsand functions. This may be further facilitated by a user interface 920,which may include a mouse, joystick, or any other peripheral or controlto permit user interaction with the system 900 and/or its devices, andmay be further facilitated by a controller 915. It should be understoodthat the components and functions of the system 900 may be integratedinto one or more systems or workstations. The display 914, a keyboardand a pointing device (mouse) may also be connected to I/O bus of thecomputer. Alternatively, separate connections (separate buses) may beused for I/O interface, display, keyboard and pointing device.Programmable processing system may be preprogrammed or it may beprogrammed (and reprogrammed) by downloading a program from anothersource (e.g., a floppy disk, CD-ROM, or another computer).

The system 500 may receive input data 5 which may be employed as inputof the communication to be analyzed for sensitivity, formatted, andtransmitted by the plurality of modules 10, 15, 20 that provide thesecurity system of the present disclosure. The system 500 may produceoutput data 25, which in the formatted communication to be transmitted,e.g., parsed or non-parsed communication, to the display 300 of anintended recipient of the communication. It should be noted that whilethe above configuration is illustratively depicted, it is contemplatedthat other sorts of configurations may also be employed according to thepresent principles. Further details regarding the functionality of thesensitivity determining module 10, the parsing module for parsingsensitive communications 15, and the transmission module 20 fortransmitting the communication for have been provided above withreference to FIGS. 4-8G.

Having described some embodiments of the system, method and computerprogram product of the present disclosure, it is noted thatmodifications and variations can be made by persons skilled in the artin light of the above teachings. It is therefore to be understood thatchanges may be made in the particular embodiments disclosed which arewithin the scope of the invention as outlined by the appended claims.Having thus described aspects of the invention, with the details andparticularity required by the patent laws, what is claimed and desiredprotected by Letters Patent is set forth in the appended claims.

What is claimed is:
 1. A security system comprising: a memory; ahardware processor coupled to the memory; a sensitivity determiningmodule including instructions on said memory executed by the hardwareprocessor for assigning a sensitivity value for text in a communication,wherein when the communication includes keywords in a sequencedesignated as being sensitive the sensitivity value is greater than athreshold sensitivity level, and when the communication does not includesaid keywords designated as being sensitive, the sensitivity values isless than the threshold sensitivity level; a parsing module includinginstructions on said memory executed by the hardware processor forparsing the communication into a sequence of text fragments when thevalue of sensitivity assigned to said text in the communication by thesensitivity determining module exceeds the threshold sensitivity value,and indicates a sensitive message, or not parsing the communication whenthe value of the sensitivity assigned to said text in the communicationby the sensitivity determining module does not exceed the thresholdsensitivity value, and indicates a message that is not sensitive,wherein the parsing module for parsing sensitive communications changesthe order of letters in each word of the communication except for thefirst letter and last letter of said each word; and a transmissionmodule including instructions on said memory executed by the hardwareprocessor for transmitting the communication of the sensitive message asthe sequence of text fragments as a rapid serial visualization (RSV)presentation, or transmitting the communication without parsing when themessage is not sensitive.
 2. The system of claim 1, wherein thesensitivity determining module assigns said sensitivity value for thecommunication by using at least one of text analysis, tags, activelearning, an indication supplied by a first party sending saidcommunication, an indication supplied by a second party receiving saidcommunication, sensors detecting a unintended user attempting tointercept the communication from a screen of said second user, locationof the second party, and a combination thereof.
 3. The system of claim1, where the sensitivity value for the communication set by thesensitivity determining module dictates in said sequence of fragmentsfor the communication transmission characteristics selected from thegroup consisting of speed of presentation of each fragment in saidsequence on a display, number of words in said fragment on the displayat the same time, number of images viewable on the display at the sametime, and converting an image to fragments of textual description. 4.The system of claim 1, wherein the sensitivity determining modulereceives an input that a third party is viewing a display of a secondparty receiving said communication, wherein in response to the input,the sensitivity determining module indicates said sensitive message tothe parsing module.
 5. The system of claim 1, wherein when sensitivitydetermining module indicates said sensitive message to the parsingmodule, and said communication is comprised of text and images, saidparsing the sensitive communication parses the sensitive message fromsaid text and images into audio.
 6. The system of claim 1, wherein whensensitivity determining module indicates said sensitive message to theparsing module, and said communication is comprised of audio, saidparsing the sensitive communication parses the sensitive message fromsaid audio into text and images.
 7. A computer program productcomprising a non-transitory computer readable storage medium havingcomputer readable program code embodied therein for performing asecurity method for transmitting a communication, the security methodcomprising: assigning a sensitivity value for text in the communicationwith a sensitivity determining module, wherein when the communicationincludes keywords in a sequence designated as being sensitive thesensitivity value is greater than a threshold sensitivity level, andwhen the communication does not include said keywords designated asbeing sensitive, the sensitivity values is less than the thresholdsensitivity level; formatting said communication for display, whereinwhen sensitivity value for said text exceeds a security threshold, thecommunication is parsed into a sequence of fragments, or not parsing thecommunication when the sensitivity value dues not exceed the securitythreshold, wherein the sequence of fragments includes changing the orderof letters in each word of a communication except for a first and lastletter of the word; and transmitting the communication with parsing asthe sequence of text fragments as a rapid serial visualization (RSV)presentation when said sensitivity value exceeds the security threshold,or transmitting the communication without said parsing when thesensitivity value does not exceed the security threshold.