Systems and methods for secure display of data on computing devices

ABSTRACT

Disclosed herein are display techniques that will allow sensitive data displayed on a computer screen to only be viewed by authorized users and will render computer screen unreadable to unauthorized users. One or more display techniques are capable of automatically scrambling and unscrambling display screen of the computing device in which only an intended viewer is able to view data on the display screen using deciphering glasses.

TECHNICAL FIELD

This application relates generally to secure electronic displaytechniques. More specifically, this application relates to systems andmethods for limiting electronic display of data to authorized users.

BACKGROUND

Most businesses and enterprise organizations are apprehensive aboutprotection and secure display of their sensitive data. In order toprotect and secure their sensitive data, various organizations typicallyhave a “cleanroom,” which is essentially a working room within theorganization that is protected such that only authorized users areallowed to enter the cleanroom to access electronic devices and serverswithin the cleanroom. For instance, when the authorized user enters thecleanroom, the authorized person immediately connects to a network, andis able to access sensitive data and perform computing functions on thevarious electronic devices and the servers within the cleanroom. On theother hand, there are frequent circumstances when some users may want toaccess sensitive data when the cleanroom is not readily available. Forinstance, a user may be working remotely and may access the sensitivedata on his/her personal or work-issued computing device. Such viewingof sensitive data in public usually raises security implicationsregarding unauthorized viewing of the sensitive data by others.Moreover, tracking the release of the sensitive data to suchunauthorized viewers can be difficult since the unauthorized viewers donot get direct access to the sensitive data through any electronicdevice, and thus do not leave a digital fingerprint from which theunauthorized viewers could later be identified.

SUMMARY

For the aforementioned reasons, there is a need for a method and systemfor preventing the unauthorized users from viewing and accessingsensitive data. Disclosed herein are systems and methods capable ofaddressing the above-described shortcomings and may provide any numberof additional or alternative benefits and advantages corresponding toscrambling techniques that will allow sensitive data displayed on acomputer screen to only be viewed by authorized users and will renderthe computer screen unreadable to unauthorized users. For instance, thesystems and the methods are capable of automatically scrambling andunscrambling display screen of the computing device in which only anintended viewer is able to view data on the display screen usingdeciphering glasses.

Systems, methods, and computer program products for security of contenton a display screen of a computing device in which only an authenticateduser is able to view the content on the display screen may automaticallyscramble and unscramble the screen depending on authentication resultsof the user looking at the screen. For instance, the computing devicemay utilize facial recognition or head movement detection techniques toauthenticate the user looking at the screen, and upon the execution ofthe facial recognition or the head movement detection techniques, whenit is determined that the authenticated user is no longer looking at thescreen of the computing device, the screen becomes scrambled or locked.

Systems, methods, and computer program products for security of contenton a display screen of a computing device in which a first user is ableto view the content on the display screen may automatically scramble andunscramble the screen depending on authentication results of the firstuser looking at the screen. For instance, the computing device mayutilize facial recognition or head movement detection apparatus toauthenticate the first user looking at the screen, and upon theimplementation of the facial recognition or the head movement detectionapparatus, when a second user's face is detected by the computingdevice, the screen becomes scrambled or locked, even if the first useris authenticated (e.g., the second user looking over the shoulder of theauthenticated first user).

Systems, methods, and computer program products disclosed hereinautomatically scrambles and unscrambles data on a display screen of acomputing device in which an authenticated user is able to view the dataon the display screen using deciphering glasses upon electro-biometricidentification and verification of user's identity by bioelectric signalprocessing and analysis. A biometric pulse signature generationtechnique is executed to produce a biometric signature of theauthenticated user that identifies the user by forming a representationof a pulse pattern of the authenticated user when the decipheringglasses are on the authenticated user. The computing device may performthe bioelectric signal processing and analysis to compare a biometricsignature of an individual wanting to view the screen with the biometricsignature of the authenticated user to determine whether the individualis the authenticated user, and the data becomes unscrambled when theindividual is the authenticated user to allow the individual to view thedata on the screen using the deciphering glasses.

Systems, methods, and computer program products disclosed hereinautomatically scrambles and unscrambles data on a graphical userinterface (GUI) of a computing device in which an authenticated user isable to view the unscrambled data on the display screen usingdeciphering glasses. The display of the data on the GUI is automaticallymoved from a first display screen (showing unscrambled data) to a seconddisplay screen (showing scrambled data) on the GUI and vice-versadepending on a distance between the GUI and authenticated user wearingthe deciphering glasses. For instance, a first display screen ispresented on the GUI showing the unscrambled data when the GUI is inviewable Bluetooth range of a user authorized to view the data. A seconddisplay screen is presented on the GUI showing the scrambled data whenthe GUI is not in the Bluetooth viewable range of the user authorized toview the data.

Systems, methods, and computer program products disclosed hereinautomatically scrambles and unscrambles data on a display screen of acomputing device in which only an authenticated user is able to view theunscrambled data on the display screen using deciphering glasses. Thecomputing device may generate instructions to scramble the data on thescreen by changing a focus, which may be different for eachauthentication session between the computing device and the user(wearing the deciphering glasses). The screen depicts a border of whatshould have a different focus so that the user can maintain focus anddepth perception when not looking at the screen. The deciphering glassesare further configured to focus on the screen based on parameters duringa particular authentication session.

In some embodiments, a system may include a system database, a usercomputing device, and a wearable device. The system database is hostedon one or more servers comprising a non-transitory machine readablestorage medium. The system database is configured to store a record ofcredentials associated with one or more users and one or more wearabledevices. The user computing device may include a screen configured todisplay an image comprising encrypted data that corresponds todisplaying a plurality of segments of the image in a rearranged ordersuch that the display of the encrypted data in the image is unreadable ahuman. The wearable device may include one or more lenses. The wearabledevice further comprises a processor configured to: wirelessly connectwith the user computing device, wherein the user computing deviceconnects to the wearable device, in response to the user computingdevice determining that a set of purported credentials associated withthe wearable device received from the wearable device matches a set ofcredentials authenticating the wearable device that are stored in thesystem database; and display decrypted data on the one or more lenses ofthe wearable device such that the plurality of segments of the image arearranged to make the encrypted data in the image displayed on the one ormore lenses readable to a user of the wearable device.

In some embodiments, a method may include displaying, by a usercomputing device, on a screen, an image comprising encrypted data thatcorresponds to a plurality of segments of the image that are rearrangedsuch that the encrypted data in the image is unreadable to a human. Themethod may further include receiving, by the user computing device, arequest for a wireless connection from to a wearable device comprisingone or more lenses. The method may further include connecting, by theuser computing device, to the wearable device, in response to the usercomputing device determining that a set of purported credentialsassociated with the wearable device received from the wearable devicematches a set of credentials authenticating the wearable device that arestored in the system database. The method may further includetransmitting, by the user computing device, decrypted data for displayon the one or more lenses such that the plurality of segments of theimage are arranged to make the encrypted data in the image displayed onthe one or more lenses readable to a the human.

In some embodiments, a method may include displaying, by a usercomputing device, on a screen, an image comprising encrypted data thatcorresponds to a rearrangement of a plurality of segments representingthe image based on an encryption method such that the encrypted data inthe image is unreadable to a human. The method may further includecapturing, by the user computing device, via one or more imaging sensorsassociated with the user computing device, a real-time facial image of auser adjacent to the user computing device. The method may furtherinclude tracking, by the user computing device, eye position of the userbased on information retrieved from the real-time facial image of theuser. The method may further include determining, by the user computingdevice, whether the user is authorized to view the encrypted data on thescreen, in response to matching a set of purported identificationsassociated with the facial image received from the one or more imagingsensors with a set of identifications authenticating the user that isstored in a system database. The method may further include, in responseto the set of purported identifications matching with the set ofidentifications and based on current eye position relative to thescreen, decrypting, by the user computing device, the encrypted datadisplayed on the screen and displaying the plurality of segments of theimage in an original arrangement before the encryption. The method mayfurther include encrypting, by the user computing device, the decrypteddata displayed on the screen into the encrypted data that is unreadableto the human, in response to movement of the eye position relative tothe screen indicating that the user is not viewing the screen.

In some embodiments, a method may include displaying, by a user computerdevice, on a screen, an image comprising encrypted data that isunreadable to a human, wherein the encrypted data corresponds to aplurality of segments of the image that are configured such that theencrypted data in the image is unreadable to the human. The method mayfurther include sensing, by the user computing device, via one or moresensors associated with the user computing device, at least a portion ofa face of a user adjacent to the user computing device. The method mayfurther include determining, by the user computing device, whether theuser is authorized to view the encrypted data on the screen, in responseto matching a set of purported identifications associated with the atleast the portion of the face received from the one or more sensors witha set of identifications authenticating the user that is stored in asystem database. The method may further include, in response to the setof purported identifications matching with the set of identifications,decrypting, by the user computing device, the encrypted data displayedon the screen such that the plurality of segments of the image arereconfigured and decrypted data in the image is readable.

In some embodiments, a method may include displaying, by a user computerdevice, on a screen, an image comprising encrypted data that isunreadable to a human, wherein the encrypted data corresponds to aplurality of segments of the image that are configured such that theencrypted data in the image is unreadable to the human. The method mayfurther include capturing, by the user computing device, via one or moresensors associated with the user computing device, a real-time facialimage of a first user adjacent to the user computing device. The methodmay further include determining, by the user computing device, whetherthe first user is authorized to view the encrypted data on the screen,in response to matching a set of purported identifications associatedwith the facial image of the first user received from the one or moresensors with a set of identifications authenticating the first user thatis stored in a system database. The method may further include, inresponse to the set of purported identifications matching with the setof identifications, decrypting, by the user computing device, theencrypted data displayed on the screen such that the plurality ofsegments of the image are reconfigured and decrypted data in the imageis readable to the first user. The method may further include detecting,by the user computing device, via the one or more sensors, a second userin line of sight of the screen. The method may further includeconverting, by the user computing device, the decrypted data displayedon the screen into the encrypted data that is unreadable to the human,in response to detection of a presence of the second user in line ofsight of the screen.

In some embodiments, a method may include receiving, by a server, viaone or more pulse sensors, pulse waveform data collected from one ormore measurement positions of a known user while wearing a wearabledevice, wherein the one or more measurement positions comprises at leasta temple pulse position and a wrist pulse position. The method mayfurther include generating, by the server, a biometric pulse signaturecharacterizing the pulse waveform data identifying the known userwearing the wearable device, wherein the biometric pulse signatureassociated with the known user wearing the wearable device is stored ina system database comprising a non-transitory machine readable storagemedium configured to store a plurality of biometric pulse signaturesassociated with a plurality of known users. The method may furtherinclude receiving, by the server, via the one or more pulse sensors,pulse waveform data collected from the one or more measurement positionsof a new user wearing the wearable device. The method may furtherinclude authenticating, by the server, the new user, in response to theserver determining the pulse waveform data associated with the new usermatches at least one biometric pulse signature of the plurality ofbiometric pulse signatures stored in the system database. The method mayfurther include transmitting, by the server, instructions to a usercomputing device to convert scrambled data displayed on a screen of theuser computing device into unscrambled data, wherein the unscrambleddata is readable when the screen of the user computing device is viewedthrough one or more lenses of the wearable device by the new user.

In some embodiments, a system may include a system database hosted onone or more servers comprising a non-transitory machine readable storagemedium, the system database configured to store a plurality of biometricpulse signatures associated with a plurality of known users; one or morepulse sensors is configured to collect pulse waveform data from one ormore measurement positions of a known user wearing a wearable device,wherein the one or more measurement positions comprises at least atemple pulse position; and a server. The server is configured to receivethe pulse waveform data of the known user from the one or more pulsesensors; generate a biometric pulse signature characterizing the pulsewaveform data identifying the known user wearing the wearable device,wherein the biometric pulse signature associated with the known userwearing the wearable device is stored in the system database; receivefrom the one or more pulse sensors, pulse waveform data collected fromthe one or more measurement positions of a new user wearing the wearabledevice; authenticate the new user, in response to determining that thepulse waveform data associated with the new user matches at least onebiometric pulse signature of the plurality of biometric pulse signaturesstored in the system database; and transmit instructions to a usercomputing device to convert scrambled data displayed on a screen of theuser computing device into unscrambled data, wherein the unscrambleddata is readable when the screen of the user computing device is viewedthrough one or more lenses of the wearable device by the new user.

In some embodiments, a method may include receiving, by a server, viaone or more pulse sensors, pulse waveform data collected from one ormore measurement positions of a user while wearing a wearable device,wherein the one or more measurement positions comprises at least atemple pulse position. The method may further include generating, by theserver, a biometric pulse signature characterizing the pulse waveformdata identifying the user wearing the wearable device. The method mayfurther include authenticating, by the server, the user, in response tothe server determining the biometric pulse signature associated with theuser matches at least one biometric pulse signature of a known userstored in a system database comprising a non-transitory machine readablestorage medium configured to store a plurality of biometric pulsesignatures associated with a plurality of known users. The method mayfurther include, in response to authentication of the user, displaying,by the server, on a screen of a user computing device, data, wherein thedata is readable when the screen of the user computing device is viewedthrough one or more lenses of the wearable device by the user. Themethod may further include detecting, by the server, via one or moremotion sensors, a movement of at least the user or the wearable devicerelative to the user computing device. The method may further include,in response to detection of movement of the user beyond a pre-definedrange, displaying, by the server, scrambled screen on the user computingdevice such that the data on the scrambled screen is not readable forthe user.

In some embodiments, a system may include a system database hosted onone or more servers comprising a non-transitory machine readable storagemedium. The system database is configured to store a record ofcredentials associated with one or more users and one or more wearabledevices. The system may further include a user computing devicecomprising a screen configured to display an image comprising scrambleddata that is unreadable to a human, wherein the scrambled datacorresponds to arrangement of one or more fonts in text data of theimage such that the text data become unreadable to the human. The systemmay further include a wearable device comprising one or more lenses,wherein the wearable device further comprises a processor configured to:wirelessly connect with the user computing device to generate a session,wherein the user computing device connects to the wearable device, inresponse to the user computing device determining that a set ofpurported credentials associated with the wearable device received fromthe wearable device matches a set of credentials authenticating thewearable device that are stored in the system database; adjust a focusvalue of the one or more lenses to synchronize with respect toreadability of the screen, based on one or more attributes associatedwith the session, wherein the processor is configured to adjust thefocus value of the one or more lenses for each new session based on oneor more attributes associated with each new session; and displayunscrambled data on the screen such that the one or more fonts in theimage are readable when the screen of the user computing device isviewed through the one or more lenses with adjusted focus value.

In some embodiments, a method may include displaying, by a server, on ascreen of a user computing device one or more pages, wherein each pagecomprising scrambled data that is unreadable to a human, and wherein thescrambled data corresponds to arrangement of one or more fonts in textdata on each page that are configured such that the text data isunreadable to the human. The method may further include receiving, bythe server, a request for a wireless connection from a wearable devicecomprising one or more lenses with the user computing device. The methodmay further include connecting, by the server, the user computing deviceto the wearable device to generate a session, in response to the serverdetermining that a set of purported credentials associated with thewearable device received from the wearable device matches a set ofcredentials authenticating the wearable device that are stored in thesystem database. The method may further include adjusting, by theserver, a focus value of the one or more lenses to synchronize withrespect to readability of each page of the screen, based on one or moreattributes associated with each page, wherein the server is configuredto adjust the focus value of the one or more lenses for each new pagebased on one or more attributes associated with each new page. Themethod may further include displaying, by the server, unscrambled dataon each page of the screen such that the text data in each page isreadable when each page of the screen is viewed through the one or morelenses with adjusted focus value depending on the one or more attributesof corresponding page.

In some embodiments, a system may include a system database hosted onone or more servers comprising a non-transitory machine readable storagemedium. The system database is configured to store a record ofcredentials associated with one or more users and one or more wearabledevices. The system may further include a user computing devicecomprising a screen configured to display one or more pages, whereineach page comprising scrambled data that is unreadable to a human, andwherein the scrambled data corresponds to a plurality of segments oftext data on each page that are configured such that the text data isunreadable to the human. The system may further include a wearabledevice comprising one or more lenses, wherein the wearable devicefurther comprises a processor configured to: wirelessly connect with theuser computing device to generate a session, wherein the user computingdevice connects to the wearable device, in response to the usercomputing device determining that a set of purported credentialsassociated with the wearable device received from the wearable devicematches a set of credentials authenticating the wearable device that arestored in the system database; adjust a focus value of the one or morelenses to synchronize with respect to readability of each page of thescreen, based on one or more attributes associated with each page,wherein the server is configured to adjust the focus value of the one ormore lenses for each new page based on one or more attributes associatedwith each new page; and display unscrambled data on each page of thescreen such that the text data in each page is readable when each pageof the screen is viewed through the one or more lenses with adjustedfocus value depending on the one or more attributes of correspondingpage.

It is to be understood that both the foregoing general description andthe following detailed description are exemplary and explanatory and areintended to provide further explanation of the invention as claimed.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings constitute a part of this specification andillustrate embodiments that, together with the specification, explainthe subject matter.

FIG. 1 illustrates components of a distributed data processing anddisplay system, according to an exemplary embodiment.

FIG. 2 illustrates a wearable device for an authorized viewing ofsensitive data, according to an exemplary embodiment.

FIG. 3A illustrates a user computing device displaying unscrambled textbased on a first position of a user, according to an exemplaryembodiment.

FIG. 3B illustrates a user computing device displaying scrambled textbased on a second position of a user, according to an exemplaryembodiment.

FIG. 3C illustrates a user computing device displaying unscrambled texton a screen, according to an exemplary embodiment.

FIG. 3D illustrates a user computing device displaying scrambled text ona screen, according to an exemplary embodiment.

FIG. 3E illustrates a user computing device displaying scrambled text ona screen, according to an exemplary embodiment.

FIG. 3F illustrates a user computing device displaying scrambled text ona screen, according to an exemplary embodiment.

FIG. 3G illustrates a user computing device displaying scrambled textand a wearable device displaying unscrambled version of scrambled textdisplayed on the user computing device, according to an exemplaryembodiment.

FIG. 3H illustrates a user computing device displaying scrambled textand a wearable device displaying unscrambled version of scrambled textdisplayed on the user computing device, according to an exemplaryembodiment.

FIG. 4 illustrates a user computing device displaying unscrambled textdue to presence of an unauthorized user, according to an exemplaryembodiment.

FIG. 5 illustrates a user computing device displaying scrambled text dueto a current location of a user, according to an exemplary embodiment.

FIG. 6 shows execution of a method showing operations of a distributeddata processing and display system, according to an exemplaryembodiment.

FIG. 7 shows execution of a method showing operations of a distributeddata processing and display system, according to an exemplaryembodiment.

FIG. 8 shows execution of a method showing operations of a distributeddata processing and display system, according to an exemplaryembodiment.

FIG. 9 shows execution of a method showing operations of a distributeddata processing and display system, according to an exemplaryembodiment.

FIG. 10 shows execution of a method showing operations of a distributeddata processing and display system, according to an exemplaryembodiment.

FIG. 11 shows execution of a method showing operations of a distributeddata processing and display system, according to an exemplaryembodiment.

FIG. 12 shows execution of a method showing operations of a distributeddata processing and display system, according to an exemplaryembodiment.

DETAILED DESCRIPTION

Reference will now be made to the illustrative embodiments illustratedin the drawings, and specific language will be used here to describe thesame. It will nevertheless be understood that no limitation of the scopeof the claims or this disclosure is thereby intended. Alterations andfurther modifications of the inventive features illustrated herein, andadditional applications of the principles of the subject matterillustrated herein, which would occur to one skilled in the relevant artand having possession of this disclosure, are to be considered withinthe scope of the subject matter disclosed herein.

The present disclosure is described in detail with reference toembodiments illustrated in the drawings, which form a part here. Otherembodiments may be used and/or other changes may be made withoutdeparting from the spirit or scope of the present disclosure. Theillustrative embodiments described in the detailed description are notmeant to be limiting of the subject matter presented here.

FIG. 1 shows components of a distributed data processing and displaysystem 100. The system 100 may include user devices 102, system servers104, and system databases 106. The user devices 102, the system servers104, and the system databases 106 are connected to each other through anetwork 108. The examples of the network 108 may include, but are notlimited to, private or public LAN, WLAN, MAN, WAN, and Internet. Thenetwork 108 may include both wired and wireless communications accordingto one or more standards and/or via one or more transport mediums. Thecommunication over the network 108 between the user devices 102, thesystem servers 104, and the system databases 106 may be performed inaccordance with various communication protocols such as TransmissionControl Protocol and Internet Protocol (TCP/IP), User Datagram Protocol(UDP), and IEEE communication protocols. In one example, the network 108may include wireless communications according to Bluetooth specificationsets, or another standard or proprietary wireless communicationprotocol. In another example, the network 108 may also includecommunications over a cellular network, including, e.g., a GSM (GlobalSystem for Mobile Communications), CDMA (Code Division Multiple Access),and EDGE (Enhanced Data for Global Evolution) network.

User devices 102 may be any computing and/or telecommunications devicecomprising a processor and capable of performing the various tasks andprocesses described herein, such as accessing a webserver and providinga GUI interface to a user to interact with a website and sensitive datahosted on the webserver. Non-limiting examples of the user device 102may include a user computer (e.g., desktop, laptop, server, tablet), atelephone (e.g., smartphone), or any other telecommunications orcomputing device used to interact with various web services. For ease ofexplanation, FIG. 1 shows a single computer device functioning as theuser device 102. However, it should be appreciated that some embodimentsmay comprise any number of computing devices capable of performing thevarious tasks described herein.

The user device 102 may be any computer allowing a user 110 to interactwith a system server 104 via the webserver to access sensitive data. Theuser device 102 may execute an Internet browser or a local softwarebrowser application that access the webserver in order to issue requestsor instructions to the system server 104 to access various components ofthe system 100. The user device 102 may transmit credentials from inputs(user identification and/or authorization data) of the user 110 to thewebserver, from which the webserver may authenticate the user 110. Onehaving skill in the art would appreciate that the user device 102 maycomprise any number of input devices configured to receive any number ofdata inputs (e.g., mouse, keyboard, touchscreen, stylus), includingvarious types of data inputs allowing for authentication, e.g.,username, passwords, certificates, biometrics. One having skill in theart would also appreciate that the user device 102 may be any personalcomputer (PC) comprising a processor and non-transitory machine-readablestorage medium allowing the user device 102 to perform the various tasksand processes described herein.

The user device 102 may include one or more transmitter devices(transmitters) and one or more receiver devices (receivers). Thetransmitter may transmit or broadcast signals to the receiver. Thetransmitter and the receiver may be permanently integrated into the userdevice 102, or the transmitter and the receiver may be detachablycoupled to the user device 102, which, in some cases, may result in asingle integrated product or unit. As an example, the user device 102may be placed into a protective sleeve comprising embedded transmitterand receiver that are detachably coupled to the user device 102 powersupply input. Non-limiting examples of the integrated user device 102may include laptops, tablets, among other types of the user device 102.The user device 102 may further include embedded or associated cameras,sensors 112 (such as proximity sensors, image sensors, motion sensors,thermal sensors, and ambient light sensors), accelerometers, compasses,and/or gyroscopes, which may act as a data source for the transmitter tosupplement data, as generated by various electronic devices physicallyassociated with the transmitter.

A transmitter may include or be associated with a processor, acommunications component, and a sensor device/sensor 112. The processormay control, manage, and otherwise govern the various processes,functions, and components of the transmitter. The processor may beconfigured to process and communicate various types of data (e.g.,sensor and camera data). Additionally or alternatively, the processor ofthe transmitter may manage execution of various processes and functionsof the transmitter, and may manage the components of the transmitter.For example, the processor may determine an interval at which a signal(such as Bluetooth or Infrared) may be broadcast by the communicationscomponent, to identify receivers (such as Bluetooth receiver) of awearable device 200 (as shown in the FIG. 2). In some cases, a singletransmitter may comprise a single processor. However, it should beappreciated that, in some cases, a single processor may control andgovern multiple transmitters. For example, the transmitters may becoupled to a system server 104 comprising a processor that executessoftware modules instructing the processor of the system server 104 tofunction as a transmitter processor capable of controlling the behaviorof the various transmitters. Additionally or alternatively, a singletransmitter may comprise multiple processors configured to execute orcontrol specified aspects of the transmitter's behavior and components.For example, the transmitter may comprise a transmitter processor and asensor processor, where the sensor processor is configured to manage asensor and a camera, and generate sensor data and camera data, and wherethe transmitter processor is configured to manage the remainingfunctions of the transmitter.

A communications component of a transmitter may effectuate wired and/orwireless communications to and from receivers of a wearable device 200(as shown in the FIG. 2). In some cases, the communications componentmay be an embedded component of the transmitter; and, in some cases, thecommunications component may be attached to the transmitter through anywired or wireless communications medium. In some embodiments, thecommunications component may be shared among a plurality oftransmitters, such that each of the transmitters coupled to thecommunications component may use the data received within acommunications signal, by the communications component.

The communications component may comprise electromechanical components(e.g., processor) that allow the communications component to communicatevarious types of data with one or more receivers of a wearable device200 (as shown in the FIG. 2), transmitters of the wearable device 200,and/or other components of the transmitter via communications signals.In some implementations, these communications signals may represent adistinct channel for hosting communications, independent from the sensorwave communication. The data may be communicated using thecommunications signals, based on predetermined wired or wirelessprotocols and associated hardware and software technology. Thecommunications component of the transmitter may operate based on anynumber of communication protocols, such as Bluetooth®, Wireless Fidelity(Wi-Fi), Near-Field Communications (NFC), ZigBee, and others. However,it should be appreciated that the communications component of thetransmitter is not limited to radio-frequency based technologies, butmay include radar, infrared, and sound devices for sonic triangulationof any receiver.

Using a communications signal, the transmitter may communicate data thatmay be used, e.g., to identify receivers of a wearable device 200 (asshown in the FIG. 2), determine whether users 110 are authorized toaccess sensitive data, determine whether the user 110 wearing thewearable device 200 is authorized to access sensitive data, among otherpossible functions. Similarly, a communications component of a receiverof the wearable device 200 may use a communications signal tocommunicate data that may be used to, e.g., alert transmitters of a userdevice 102 that the receiver has entered or is about to enter acommunication/transmission field of the transmitter. As an example, thecommunications component of the transmitter may communicate (i.e., sendand receive) different types of data (e.g., authentication andidentification data) containing various types of information.Non-limiting examples of the information may include a transmitteridentifier (TX ID), a user device identifier (device ID) for the userdevice 102, a user identifier (user ID) of the user 110, the receiver'slocation in the communication field, the user device 102 location in thecommunication field, and other such information.

A sensor (such as an imaging sensor or a camera) 112 may be physicallyassociated with a transmitter and/or a user device 102 (i.e., connectedto, or a component of). The sensor 112 may be configured to detect andidentify various conditions of the system 100 and/or communicationfield, and a location and position of a user 102 with respect to a userdevice 102. Sensor 112 is configured to generate sensor data (such asdigital images), which may then be used by the user device 102 todetermine various modes of operation. As detailed herein, the sensors112 may transmit the sensor data collected during the sensor operationsfor subsequent processing by a transmitter processor of the transmitterand/or a processor of the user device 102. Additionally oralternatively, one or more sensor processors may be connected to orhoused within the sensor 112. The sensor processors may comprise amicroprocessor that executes various primary data processing routines,whereby the sensor data received at the transmitter processor orprocessor of the user device 102 has been partially or completelypre-processed as useable data for scrambling or unscrambling a screenand/or content displayed on the screen of the user device 102.Hereinafter, the term “scrambling” and “encrypting” may beinterchangeably used. Also, the term “unscrambling” and “decrypting” maybe interchangeably used. In some configurations, the sensor device 112may be a part of (e.g., communicatively coupled with) the user device102. For instance, the sensor device 112 may be an internal cameradevice installed and executing on the user device 102 such as a laptopdevice. The system server 104 may identify that the user device 102comprises a camera and activate the camera in order to receive sensorydata from the sensor device 112.

A user device 102 or a system server 104 may generate instructions orexecute a scrambling algorithm/software program to scramble orunscramble content on screen of the user device 102. In someembodiments, the user device 102 or the system server 104 may generatethe instructions or execute the scrambling algorithm/software program toscramble or unscramble the screen of the user device 102. The executionand/or implementation of the scrambling algorithm/software programresults in the image (containing text data) displayed on the screenhaving jumbled graphical components (e.g., text elements). For instance,a scrambled text may comprise misplaced text characters (e.g.,alphabet).

In some embodiments, the execution and/or implementation of thescrambling algorithm/software program results in the image (containingtext or visual data) displayed on the screen being divided into multiplesegments. The segments may be squares, which can be tiled together toform the image. However, in some configurations, other types of segmentscan be formed out of other geometric shapes such as triangles andhexagons or any pre-determined shape not conforming to traditionalgeometric shapes. In some embodiments, the system server 104 may dividethe display screen into a pre-determined number of segments of same ordifferent sizes, for example, X×Y segments displaying unscrambledsegmented text 312 (as shown in the FIG. 3C). The system server 104 maythen invert each of the screen segments displaying scrambled segmentedtext 314 (as shown in the FIG. 3D) where each segmented text 314 may beof different size so that when viewed by an unauthorized person, thecontent display screen in not readily identifiable. In someconfigurations, only when viewed through a wearable device 200 (as shownin the FIG. 2) having a lens 204 of corresponding X×Y configuration, theimages will be seen in their original orientation.

When lens unit 204 of a wearable device 200 (as shown in the FIG. 2) areplaced together, the unscrambled image may then be formed on the side ofthe lens. In this manner, only the user 110 who wears the eyeglasses isable to view the unscrambled image on the screen of the user device 102,and to all other individuals, the screen of the user device 102 appearsto be a distorted compilation of individual texts (i.e., scrambledscreen).

In some embodiments, execution and/or implementation of the scramblingalgorithm/software program results in inversion of the multiple segmentsdisplaying scrambled segmented text 314 (as shown in the FIG. 3D) on thescreen of the user device 102. In some embodiments, execution and/orimplementation of the scrambling algorithm/software program results inscrambling of pixels 316, 318 on the screen of the user device 102 (asshown in the FIG. 3E and FIG. 3F) on the screen of the user device 102.In some embodiments, the execution and/or implementation of thescrambling algorithm/software program results in making the multiplesegment appear backwards, making the multiple segments appear smallerthan its regular size, and rotating the multiple segments about acentral point. Various other methods in which a screen and/or an image(containing text or visual data) on the screen of the user device 102may be distorted so that a specific lens of a wearable device 200 cancorrect the distortion and make the content displayed on the screenreadable. The arrangement of the distorted multiple segments is suchthat the compilation of the individual distorted multiple segments issufficiently different from the original content image and preventsunauthorized users from comprehending the content image on the screen ofthe user device 102.

In some embodiments, a sensor 112 associated with user device 102 maytransmit sensor data to the system server 104 via the user device 102.Although described in the exemplary embodiment as raw sensor data, it isintended that the sensor data is not limited to raw sensor data and caninclude data that is processed by a processor associated with the sensor112, processed by a processor associated with the user device 102,processed by a processor associated with the system server 104, or anyother processor. The sensor data can include information derived fromthe sensor 112 of the user device 102, and processed sensor data caninclude determinations based upon the sensor data. For example, agyroscope of a receiver of a wearable device 200 (as shown in the FIG.2) may provide data such as an orientation in X-plane, Y-plane, and Zplanes, and processed data from the gyroscope may include adetermination of the location of the receiver based upon the orientationof the receiver. In another example, data from an infrared sensor of thetransmitter may provide thermal imaging information, and processed datamay include an identification of the user 110 based upon the thermalimaging information. As used herein, any reference to the sensor data orthe raw sensor data can include data processed at the sensor 112, theimaging device, or other device. In some implementations, a gyroscopeand/or an accelerometer of the receiver of the wearable device 200 orthe user device 102 associated with the receiver may provide sensor dataindicating the orientation of the user 110 of the wearable device 200 oruser device 102 with respect to the user 110, which the user device 102or the system server 104 may use to determine whether to scramble orunscramble screen and/or content on screen of the user device 102.

A user device 102 or a system server 104 may make a determination towhether scramble or unscramble a screen and/or an image (containing textor video data) on the screen of the user device 102 based on sensorand/or camera data obtained from the sensor (such as imaging sensor(camera) or other sensor) 112 directly or indirectly associated with theuser device 102 and/or the system server 104. If the user device 102and/or the system server 104 chooses to unscramble the screen and/or theimage on the screen of the user device 102 based on the sensor and/orcamera data, then each screen and/or image segment is returned to itsoriginal orientation and the unscrambled screen and/or image will bevisible on the screen of the user device 102. If the user device 102and/or the system server 104 unscrambles the screen and/or the imagebased on the sensor data (or after the screen and/or the image segmentshave been returned to their original orientation) a determination ismade by the user device 102 and/or the system server 104 as to whetherthe execution of the scrambling algorithm/software program is to bestopped.

In some configurations, if the user device 102 and/or the system server104 terminates the execution of the scrambling algorithm/softwareprogram, then a determination is made by the user device 102 and/or thesystem server 104 on whether to change the configuration of the screenand/or image segments. In some configurations, the user 110 may be ableto terminate the scrambling of the display screen.

In some cases, a receiver may be embedded or attached to a wearabledevice 200 (as shown in the FIG. 2) comprising a gyroscope and/or anaccelerometer that generates data indicating an orientation of thewearable device 200. The receiver may transmit the data to a processorof a user device 102, via communications signals or waveforms. In suchimplementations, the processor may not scramble a screen and/or an imageon the screen of the user device 102 until the processor receives, viacommunication waves, the data produced by the gyroscope and/oraccelerometer, indicating that the receiver or the wearable device 200is in motion or has an orientation suggesting that the wearable device200 is in use.

As an example, a receiver may be attached to or embedded withineyeglasses, which may include a gyroscope and an accelerometer. In thisexample, while the eyeglasses are being utilized by the user 110, aprocessor of the user device 102 and/or the system server 104 maypresent unscrambled content on the screen of the user device 102. Butwhen the user 110 lifts the eyeglasses from his or her face, theaccelerometer then generates data indicating that the eyeglasses is inmotion and the gyroscope generates the data indicating that theeyeglasses has a planar-orientation indicating that the eyeglasses isnot against the user 110's face. The processor of the user device 102and/or the system server 104 may then determine from the data producedby the gyroscope and accelerometer that the eyeglasses is not againstthe user 110 face, and thus the processor of the user device 102 and/orthe system server 104 scrambles the screen and/or the content on thescreen of the user device 102. The processor of the user device 102and/or the system server 104 may make this determination according toany number of preset threshold values regarding data produced bygyroscopes and/or accelerometers.

A sensor 112 directly or indirectly associated with a user device 102and/or a system server 104 may be a device configured to emit sensorwaves, which may be any type of wave that may be used to identify a user110 in a transmission field of the sensor 112. Non-limiting examples ofthe sensor technologies for the sensors 112 may include:infrared/pyro-electric, ultrasonic, laser, optical, Doppler,accelerometer, microwave, millimeter, face recognition, head movement,motion, imaging, and radio frequency standing-wave sensors. Other sensortechnologies that may be well-suited to secondary and/orproximity-detection sensors may include resonant LC sensors, capacitivesensors, and inductive sensors. Based upon the particular type of thesensor waves used and the particular protocols associated with thesensor waves, the sensor 112 may generate sensor data. In some cases,the sensor 112 may include a sensor processor that may receive,interpret, and process sensor data, which the sensor 112 may thenprovide to a processor of the user device 102 and/or the system server104.

A sensor 112 directly or indirectly associated with a user device 102and/or a system server 104 may be a passive sensor, an active sensor,and/or a smart sensor. Passive sensors, such as tuned LC sensors(resonant, capacitive, or inductive) are a type of sensor 112 and mayprovide minimal but efficient object discrimination. The passive sensorsmay be used as secondary (remote) sensors that may be dispersed into acommunication field and may be part of a receiver or otherwiseindependently capture raw sensor data that may be wirelesslycommunicated a sensor processor. Active sensors, such as infrared (IR)or pyro-electric sensors, may provide efficient and effective targetdiscrimination and may have minimal processing associated with thesensor data produced by such active sensors. Smart sensors may besensors having on-board digital signal processing (DSP) for primarysensor data (e.g., prior to processing by a processor of the user device102 and/or the system server 104). The processors are capable of fine,granular object (such as user 110) discrimination and provide processorsof the user device 102 and/or the system server 104 with pre-processedsensor data that is more efficiently handled by the processor whendetermining when to scramble and unscramble the screen and/or content onthe screen of the user device 102.

A sensor 112 directly or indirectly associated with a user device 102and/or a system server 104 may have a capability to operate and generatedifferent types of sensor data, and may generate location-relatedinformation of a user 110 in various formats. Active and smart sensorsmay be categorized by sensor type, characteristic hardware and softwarerequirements, and capabilities for distance calculation and motiondetection of the user 110.

In some implementations, sensors 112 associated with a user device 102may be configured for the user 110 recognition, and thus maydiscriminate the user 110 from other objects, such as furniture.Non-limiting examples of the sensor data processed by humanrecognition-enabled sensors may include: body temperature data, infraredrange-finder data, motion data, activity recognition data, silhouettedetection and recognition data, gesture data, heart rate data, portabledevices data, and wearable device data (e.g., biometric readings andoutput, accelerometer data). In some embodiments, the sensors 112associated with the user device 102 may be configured for a particularuser 110 (for example, a first user) recognition, and thus maydiscriminate the first user from other users, such as a second user anda third user. The sensors 112 may recognize the first user based on oneor more of body temperature data associated with the first user,infrared range-finder data associated with the first user, motion dataassociated with the first user, activity recognition data associatedwith the first user, silhouette detection and recognition dataassociated with the first user, gesture data associated with the firstuser, heart rate data associated with the first user, portable devicesdata associated with the first user, or wearable device data (e.g.,biometric readings and output, accelerometer data) associated with thefirst user.

In operation, sensors 112 directly or indirectly associated with a userdevice 102 and/or a system server 104 may detect whether objects, suchas a user 110 (authorized or unauthorized user), enter a predeterminedproximity (of a transmitter) of the user device 102. In oneconfiguration, the sensor 112 may then instruct a processor of the userdevice 102 and/or the system server 104 to execute various actions suchas scrambling or unscrambling a screen and/or content on the screen ofthe user device 102 based upon the detected objects such as the user 110(authorized or unauthorized user). In another configuration, the sensor112 may transmit sensor data to the user device 102 and/or the systemserver 104, and the user device 102 and/or the system server 104 maydetermine which actions to execute.

For example, after the sensor 112 identifies that the user 110 hasentered a pre-defined communication field (for example, a Bluetooth orNFC field) of the user device 102, and the user device 102 and/or thesystem server 104 determines that the user 110 is within thepredetermined proximity (for example, a predetermined distance of 5 to10 meters) of the user device 102 based on the sensor data, the sensor112 could provide the relevant sensor data to the user device 102 and/orthe system server 104, causing the user device 102 and/or the systemserver 104 to scramble or unscramble screen and/or content on the screenof the user device 102. As another example, after identifying the user110 entering the field and then determining that the user 110 has comewithin the predetermined proximity of the user device 102 based on thesensor data, the sensor 112 may provide the sensor data to the userdevice 102 and/or the system server 104 that causes the user device 102and/or the system server 104 to scramble or unscramble screen and/orcontent on the screen of the user device 102.

In another example, the system 100 may comprise an alarm device (notshown), which may produce a warning, and/or may generate and transmit adigital message to the system server 104 and/or an administrativecomputing device (not shown) configured to administer operations of thesystem 100. In this example, after the sensor 112 detects the user 110entering the predetermined proximity of the user device 102, orotherwise detects other unsafe or prohibited conditions of the system100, the sensor data may be generated and transmitted to a processor ofthe alarm device, which may activate the warning, and/or generate andtransmit a notification to the system server 104 or the administratordevice. A warning produced by the alarm device may comprise any type ofsensory feedback, such as audio feedback, visual feedback, hapticfeedback, or some combination.

In some embodiments, such as the exemplary system 100, a sensor 112 maybe a component of a user device 102, housed within the user device 102.In some embodiments, a sensor 112 may be external to the user device 102and may communicate, over a wired or wireless connection, sensor data toone or more processors of the user device 102. A sensor 112, which maybe external to the user device 102 or part of a single user device 102,may provide sensor data to the one or more processors, and theprocessors may then use the sensor data to scramble or unscramble screenand/or content on the screen of the user device 102. Similarly, in someembodiments, multiple sensors 112 may share sensor data with multipleprocessors. In such embodiments, sensors 112 or user device 102 may sendand receive sensor data with other sensors (for example, sensorsassociated with wearable device) in the system 100. Additionally oralternatively, the sensors 112 and/or the user device 102 may transmitor retrieve sensor data, to or from one or more memories.

As an example, as seen in FIG. 3A and FIG. 3B, a first user device 302may include a first sensor (now shown) that emits sensor waves andgenerates sensor data, which may be stored on the first user device 302and/or a mapping memory. In this example, the user device 302 maycomprise processors that may receive sensor data (such as capturedimages) from the sensors (such as cameras), and/or fetch stored sensordata from particular storage locations; thus, the sensor data producedby the respective sensor may be shared among the respective user device302.

The processors of the user device 302 may then use the sensor data, toscramble or unscramble screen and/or content (text or visual data) onthe screen of the user device 302 when a sensitive object (such as auser 308) is detected. For instance, a processor of the user device 302may display unscrambled content 304 on the screen of the user device 302when, based on the processed and analyzed sensor data, the sensitiveobject, e.g., user 308, is detected to be viewing the screen, theprocessor of the user device 302 may display scrambled content 306 onthe screen of the user device 302. In some configurations, the systemserver 104 may scramble and other unscrambled display of data when thesensitive object (such as the user 308) is detected to be located awayfrom the screen based on the processed and analyzed sensor data. Forinstance, when the user 308 walks away his or her computing device, thesystem server 104 may scramble the display of data.

Referring back to FIG. 1, a user device 102 may also include, orotherwise be associated with, multiple sensors 112 from which the userdevice 102 may receive sensor data. As an example, the user device 102may include a first sensor located at a first position of the userdevice 102 and a second sensor located at a second position on the userdevice 102. In such an embodiment, the sensors 112 may be imaging orbinary sensors that may acquire stereoscopic sensor data, such as thelocation of the user 110 relative to the first and the second sensors.In some embodiments, such binary or stereoscopic sensors may beconfigured to provide three-dimensional imaging capabilities, which maybe transmitted to the user device 102, an administrator's workstationand/or a system server 104. In addition, binary and stereoscopic sensorsmay improve the accuracy of a receiver of a wearable device or user 110location detection and displacement, which is useful, for example, inmotion recognition and tracking.

In some implementations, a sensor 112 of a user device 102 may detect auser 110 within a sensor field of operation (for example, a range withinwhich the sensor 112 may operate) that have been predetermined ortagged. In some cases, it may be desirable to avoid particular obstaclesin the field, such as furniture or walls, regardless of whether a sensor112 has identified a user 110, entering within proximity to a particularobstacle. As such, an internal or external mapping memory may storemapping data and/or sensor 112 identifying the particular location ofthe particular obstacle, thereby effectively tagging the location of theparticular location as being off-limits. Additionally or alternatively,the particular user 110 may be digitally or physically associated with adigital or physical tag that produces a signal or physical manifestationdetectable by the sensor 112, communications components, or othercomponent of the user device 102. For example, as part of generatingsensor data for the user device 102, the sensor 112 may access aninternal mapping memory (i.e., internal to the user device 102 housingthe sensor) that stores records of tagged obstacles to avoid, such as atable.

Additionally or alternatively, in some implementations, a sensor 112 maydetect a user 110 who has been tagged (i.e., previously recorded in aninternal mapping memory or external mapping memory or received a digitalor physical tag detectable by the sensors 112). Under thesecircumstances, after detecting a tag or tagged user 110, or otherwisedetermining that a tag or tagged user 110 is within a field, the sensor112 may generate sensor data that causes the user device 102 to switchfrom scrambled screen (scrambled content on the screen) to unscramblescreen (unscrambled content on the screen) or vice-versa.

User device 102 may include an antenna array, which may be a set of oneor more antennas configured to transmit and receive one or more signals(for example, identification data signals) from a receiver (in awearable device). In some embodiments, an antenna array may includeantenna elements, which may be configurable tiles comprising an antenna,and zero or more integrated circuits controlling the behavior of theantenna in that element, such as having predetermined characteristics(e.g., amplitude, frequency, trajectory, phase). An antenna of theantenna array may transmit a series of signals having the predeterminedcharacteristics, such that the series of signals arrive at a givenlocation within a field, and exhibit those characteristics.

In some embodiments, a user device 102 may include receivers (along withtransmitters), which may be an electrical device coupled to orintegrated with the user device 102. A receiver may comprise one or moreantennas that may receive communication signals from (a transmitter of)a wearable device 200 (as shown in FIG. 2). The receiver may receive thecommunication signals produced by and transmitted directly from thetransmitter. The receiver directly or indirectly associated with theuser device 102 may include a receiver-side communications component,which may communicate various types of data with a transmitter of awearable device 200 (as shown in FIG. 2) in real-time or near real-time,through a communications signal generated by the receiver'scommunications component. The data may include mapping data, such asdevice status data, status information for the receiver, statusinformation for the user device 102. In other words, the receiver mayprovide information to the transmitter regarding a current locationinformation of the user device 102 and certain user identificationinformation, among other types of information.

As mentioned, in some implementations, a receiver may be integrated intoa user device 102, such that for all practical purposes, the receiverand the user device 102 would be understood to be a single unit orproduct, whereas in some embodiments, the receiver may be coupled to theuser device 102 after production. It should be appreciated that thereceiver may be configured to use the communications component of theuser device 102 and/or comprise a communications component of its own.As an example, the receiver might be an attachable but distinct unit orproduct that may be connected to the user device 102, to providebenefits to the user device 102. In this example, the receiver maycomprise its own communications component to communicate data withtransmitters of a wearable device 200 (as shown in FIG. 2). Additionallyor alternatively, in some embodiments, the receiver may utilize orotherwise operate with the communications component of the user device102. For example, the receiver may be integrated into a laptop computerduring manufacturing of the laptop or at some later time. In thisexample, the receiver may use the laptop's communication component(e.g., Bluetooth®-based communications component) to communicate datawith transmitters of a wearable device 200.

A system server 104 may function as an interface for an administrator toset configuration settings or provide operational instructions tovarious components of a system 100. The system server 104 may be anydevice comprising a communications component capable of wired orwireless communication with components of the system 100 and amicroprocessor configured to transmit certain types of data tocomponents of the system 100. Non-limiting examples of the system server104 may include a desktop computer, a server computer, a laptopcomputer, a tablet computer, and the like. For ease of explanation, FIG.1 shows a single computer device functioning as the system server 104.However, it should be appreciated that some embodiments may comprise anynumber of computing devices capable of performing the various tasksdescribed herein.

A system server 104 may be a device that may comprise a processorconfigured to execute various routines for tagging a receiver in awearable device 200 (as shown in FIG. 2) and a user device 102, basedupon a type of a technology employed. As mentioned herein, taggingreceivers and other users 110 within a field may indicate to componentsof the system 100 that those components should or should not executecertain routines. As an example, the system server 104 may be a laserguidance device that transmits tagging data to a transmittercommunication component of the user device 102, sensor 112 of the userdevice 102, mapping memory, or other device of the system 100 that isconfigured to receive and process the laser guidance-based tagging data.In this example, the tagging data may be generated whenever a user 110interacts with an interface input, such as a push button on the wearabledevice 200 or graphical user interface (GUI) on the user device 102, anda laser “tags” the desired user 110. In some cases, the resultingtagging data is immediately transmitted to the transmitter or otherdevice for storage into mapping data. In some cases, a sensor 112 havinglaser-sensitive technology may identify and detect the laser-based tag.Although additional and alternative means of tagging objects such asusers 110 and devices are described herein, one having ordinary skill inthe art would appreciate that there are any number of guidancetechnologies that may be employed to tag a user 110 and generate ordetect tagging data.

A system server 104 may execute a software application associated with asystem 100, where the software application may include one or moresoftware modules for generating and transmitting tagging data to variouscomponents of the system 100. The tagging data may contain informationuseful for identifying the users 110 or current locations of the users110. That is, the tagging data may be used to instruct a sensor 112that, when a particular sensory signature (e.g., infrared) is detected,the sensor 112 should generate certain sensor data, which wouldeventually inform the user device 102 whether to scramble or unscramblescreen and/or content on the screen of the user device 102.

A system server 104 may be a server computer or other workstationcomputer that is directly or indirectly connected to a user device 102.In such implementations, an administrator may provide tagging datadirectly to an external mapping memory 117, which may be stored untilneeded by the user device 102. Although FIG. 1 shows the system server104 as being a distinct device from the user device 102, it should beappreciated that they may be the same devices and may functionsimilarly. In other words, the user device 102 may function as thesystem server 104; and/or the system server 104 may receive instructionsthrough associated transmitters or receivers, embedded or coupled to thesystem server 104.

User device 102 may further be associated with one or moremapping-memories, which may be non-transitory machine-readable storagemedia configured to store mapping data, and which may be data describingaspects of fields associated with processors and sensors of the userdevice 102. The mapping data may comprise processor data, camera data,location data, and sensor data. The sensor data may be generated bysensor processors to identify users 110 located in a field of a sensor112. Thus, sensor data stored in a mapping memory of the system 100 mayinclude information indicating location of a receiver of a wearabledevice 200 (as shown in FIG. 2), location of the users 110, and othertypes of data, which can be used by a processor of the user device 102and/or the system server 104 to scramble and unscramble screen and/orcontent on the screen of the user device 102. The user device 102 and/orthe system server 104 may query the mapping data stored in the recordsof a mapping memory, or the records may be pushed to the user device 102and/or the system server 104 in real-time, so that the user device 102and/or the system server 104 may use the mapping data as inputparameters for determining whether to execute programs to scramble andunscramble screen and/or content on the screen of the user device 102.In some implementations, the user device 102 and/or the system server104 may update the mapping data of a mapping memory as new, up-to-datemapping data is received, from the processors governing thecommunications components or sensors 112.

A user device 102 may comprise non-transitory machine-readable storagemedia configured to host an internal mapping memory, which may storemapping data within the user device 102. A processor of the user device102, such as a transmitter processor or a sensor processor, may updaterecords of the internal mapping memory as new mapping data is identifiedand stored. In some embodiments, the mapping data stored in the internalmapping memory may be transmitted to additional devices of the system100, and/or the mapping data in the internal mapping memory may betransmitted and stored into an external mapping memory at a regularinterval or in real-time.

A system 100 may include an external mapping memory, which may be asystem database 106 or a collection of machine-readable computer files,hosted by non-transitory machine-readable storage media of one or moresystem servers 104. In such embodiments, the system database 106 may becommunicatively coupled to the user device 102 and/or the system server104 by any wired or wireless communications protocols and hardware. Thesystem database 106 may contain mapping data for one or morecommunication fields that are associated with the user device 102 and/orthe system server 104. The records of the system database 106 may beaccessed by each user device 102, which may update the mapping data whenscanning a communication field for receivers (of a wearable device suchas deciphering eyeglasses) or users 110; and/or query the mapping datawhen determining whether to scramble or unscramble screen and/or contenton the screen of the user device 102.

System databases 106 may have a logical construct of data files that arestored in non-transitory machine-readable storage media, such as a harddisk or memory, controlled by software modules of a database program(for example, SQL), and a related database management system (DBMS) thatexecutes the code modules (for example, SQL scripts) for various sensordata queries and other management functions generated by the systemserver 104. In some embodiments, a memory of the system databases 106may be a non-volatile storage device. The memory may be implemented witha magnetic disk drive, an optical disk drive, a solid-state device, oran attachment to a network storage. The memory may include one or morememory devices to facilitate storage and manipulation of program code,set of instructions, tasks, data, PDKs, and the like. Non-limitingexamples of memory implementations may include, but are not limited to,a random access memory (RAM), a read only memory (ROM), a hard diskdrive (HDD), a secure digital (SD) card, a magneto-resistive read/writememory, an optical read/write memory, a cache memory, or a magneticread/write memory. In some embodiments, a memory of the system databases106 may be a temporary memory, meaning that a primary purpose of thememory is not long-term storage. Examples of the volatile memories mayinclude dynamic random access memories (DRAM), static random accessmemories (SRAM), and other forms of volatile memories known in the art.In some embodiments, the memory may be configured to store largeramounts of information than volatile memory. The memory may further beconfigured for long-term storage of information. In some examples, thememory may include non-volatile storage elements. Examples of suchnon-volatile storage elements include magnetic hard discs, opticaldiscs, floppy discs, flash memories, or forms of electricallyprogrammable memories (EPROM) or electrically erasable and programmable(EEPROM) memories.

FIG. 2 illustrates a wearable device 200, according to an exemplaryembodiment. For ease of explanation, the FIG. 2 shows the wearabledevice 200 as eyeglasses, however, it should be appreciated that someembodiments may include any suitable wearable device 200 capable ofperforming various tasks described herein. For example, the wearabledevice 200 may be a display device in form of glasses, goggles, or anyother structure comprising a frame 202 that supports and incorporatesvarious components of the wearable device 200, as well as serves as aconduit for electrical and other component connections. In some otherembodiments, a software product running on a camera (e.g., anapplication executing on a mobile device enabled with a camera device)may also be used as the wearable device. Therefore, even thoughdescribed as a wearable device 200, the wearable device 200 may still beoperational while not worn by the user.

A wearable device 200 is configured for viewing and interacting with areal world item such as text displayed on a user computing device (asdescribed in the FIG. 1), with a virtual display of imagery and/or text.For instance, the wearable device 200 may comprise augmented realitysystems, which may be a form of virtual reality (VR) that unscramblesand layers virtual information (such as scrambled text displayed on auser computing device) over a live camera feed (using a camera attachedon the wearable device 200) into the wearable device 200 or through asmartphone or tablet device giving a user of the wearable device 200 theability to view three-dimensional and/or unscrambled text on displaylenses (204 a and 204 b) of the wearable device 200. In someembodiments, the display lenses (204 a and 204 b) may be a virtualretinal display (VRD). The VRD display is scanned directly onto retinaof the user's eye, which results in bright images displaying unscrambledtext with high revolution and high contrast. The user sees aconventional display displaying unscrambled text floating in space.

A wearable device 200 may include a lens unit having two or more displaylenses (204 a and 204 b) connected to the frame 202. The frame 202 is aneyeglass frame adapted to be located on a head of a user. When the frame202 is located on the head of the user, the display lenses 204 arelocated in front of the user's eyes. In an alternate embodiment, anysuitable type of frame could be provided, such as a headset or helmet.In some embodiments, the wearable device 200 could comprise merely onedisplay lenses or more than two display lenses (204 a and 204 b).

Display lenses (204 a and 204 b) may include one or more cameras, whichmay be devices for capturing a photographic image or recording a video.The one or more cameras may be placed on at least one of the displaylenses (204 a and 204 b). When the wearable device 200 is synchronizedwith a user computing device (as described in the FIG. 1) and/or a userwearing the wearable device 200 is authorized, then scrambled textinformation displayed on the user computing device may be relayed to theuser through the wearable device 200 as an overlay on the cameraattached on the display lenses (204 a and 204 b).

Display lenses (204 a and 204 b) may further include an LCD display. Insome embodiments, the display lenses (204 a and 204 b) may include animaging system, which can be implemented with any number of microdisplay panels, lenses, and reflecting elements to display and projectan image. The display panels, lenses, and/or reflecting elements of theimaging system can be implemented with various display technologies,such as implemented with a transparent LCD, or using a projectiontechnology. The projection technology can be implemented using LCD typedisplays with powerful backlights and high optical energy densities.Alternatively, a micro display and/or reflecting element can beimplemented using a reflective technology, such as digital lightprocessing (DLP) and liquid crystal on silicon (LCOS), that reflectsexternal light, which is reflected and modulated by an optical material.

A wearable device 200 may be implemented as an independent, portabledevice that further includes communication electronics, which mayinclude transmitters, receivers, cameras, sensors, memory, software, aprocessor, and/or a power source. The transmitter and the receiver mayuse communications signals to communicate information relating to eachother in the form of signals carrying digital data. The transmitter andthe receiver may use communications signals to communicate information(such as location data and credentials) relating to the wearable device200 in the form of signals carrying digital data to user computingdevice (now shown). In addition, the wearable device 200 may becommunicatively linked (using Bluetooth) to a controller such as asystem server and/or a user computing device that includes any one orcombination of the memory, software, processor, and/or power source,such as a battery unit. The system server and/or the user computingdevice can be implemented for wired or wireless communication with thewearable device 200. The system server, the user computing device,and/or the wearable device 200 can also be implemented with any numberand combination of differing components. For example, the system server,the user computing device, and/or the wearable device 200 includes adecipher/scrambler application implemented as computer-executableinstructions, such as a software application, and executed by aprocessor to implement embodiments of the wearable device 200.

The execution of the software application results in configuration ofthe display lenses (204 a and 204 b). The display lenses (204 a and 204b) then displays an image from a screen of the user computing devicetransmitted by cable or wireless technology from the computing device.The display lenses (204 a and 204 b) contains a processor to unscramblea transmitted image (for example, a scrambled screen image) from thecomputing device such that only the user wearing the eyeglasses 200 cansee the unscrambled data in the screen image.

A wearable device 200 may further include a detector, which may comprisehardware, which may allow the detector to receive Bluetooth or othercommunication signals originating from a user computing device. Thedetector may be used by users using the wearable device 200 to identifya location of the user computing device, so that users may determine aplacement of a screen of the user computer device. In some embodiments,the detector may comprise an indicator light that indicates when thedetector is wirelessly connected with the user computing device. Forexample, when a detector of the wearable device 200 is located withinthe a signal range (Bluetooth range) generated by a Bluetoothtransmitter of the user computing device, it may trigger the detector toturn on their respective indicator lights because the detector isreceiving Bluetooth signals, whereas, the indicator light of thedetector, is turned off, when the detector is not receiving theBluetooth signals from the transmitter of the user computing device.

FIG. 3A illustrates a user computing device 302 displaying unscrambledtext content 304 based on a first position of a user 308 and FIG. 3Billustrates the user computing device 302 displaying scrambled text 306based on a second position of a user 304. The user computing device 302may include an output component such as a display screen 310 which mayinclude one or more of the display components such as a cathode raytube, a liquid crystal display, an OLED display, an AMOLED display, asuper-AMOLED display, a plasma display, an incandescent light, afluorescent light, a front or rear projection display, or a lightemitting diode indicator.

A user interface of the user computing device 302 may be connected to aprocessor of the user computing device 302 for entering data andcommands in the form of text, touch input, gestures, etc. The userinterface may be a touch screen device, but may alternatively be aninfrared proximity detector or sensor or any input/output devicecombination capable of sensing gestures and/or touches including atouch-sensitive surface. In addition, the user interface may include oneor more components, such as a video input component such as an opticalsensor (for example, a camera or imaging technology), an audio inputcomponent such as a microphone, and a mechanical input component such asbutton or key selection sensors, a touch pad sensor, a touch-sensitivesensor, a motion sensor, and/or a pointing device such as a joystick, atouch pad, a touch screen, a fingerprint sensor, or a pad for anelectronic stylus. One or more of these user interface devices mayfunction in multiple modes.

A user computing device 302 may include an authentication apparatus suchas a sensor device for facial, iris, retina, eye vein, and/or face veinrecognition or other facial feature or facial component recognition thatcapture images and/or emits sensor waves; and generate sensor dataassociated with face detection, head movement, and/or other facialfeatures of a user 308, which may be stored on a database in the userdevice 302 and/or a mapping memory. The authentication apparatus mayfurther draw upon stored information in the mapping memory, such as alook up table to compare and contrast data of new user with known users,including data related to information on facial, iris, retina, and/oreye vein information, fingerprints, breath analysis, body odor, voicepatterns, etc.

A user computing device 302 may include one or more processors that mayreceive camera data and/or sensor data for facial, iris, retina, eyevein, and/or face vein recognition or other facial feature from thesensors, and/or fetch stored sensor data such as a look up table fromthe particular storage locations; thus, the sensor data produced by therespective sensor may be shared with the user computing device 302. Theprocessors of the user computing device 302 may then use currentlycaptured sensor data, to scramble or unscramble screen and/or content onthe screen of the user computing device 302 when the user 308 isdetected within an operation range of the sensor of the user computingdevice 302.

For instance, in some embodiments, a user computing device 302 may beassociated with an eye-tracking module that is implemented as a softwaremodule running on associated hardware, and configured to receive commanddata from a processor of a user computing device 302, process thecommand data into hardware operation data, and provide the hardwareoperation data to an eye-tracking sensor module. The eye-tracking moduleis configured to receive ocular sensor data from eye-tracking sensormodule, processes the ocular sensor data to generate ocular engagementdata, and provides the ocular engagement data to the processor. Furtherto these embodiments, ocular engagement data includes one or moremetrics characterizing the level of engagement of user 308 with contentbeing displayed via a screen of a user computing device 302. In anexample, the ocular engagement data includes data describing whether ornot the gaze of the user 308 is directed toward the content displayedvia the screen, a general level of interest in the content displayed viathe screen as determined by the eye movements of the user 308, and thelike. In these embodiments, hardware operation data includesinstructions for hardware operation, such as instructions to activateeye-tracking sensors, to begin to track the gaze of the user 308, tostop tracking the gaze of user 308, and the like.

An eye-tracking sensor module is implemented as a software configured tocontrol associated hardware, and configured to receive hardwareoperation data from the eye-tracking module, interact with the user 308in order to generate ocular sensor data, and provide the ocular sensordata to the eye-tracking module. In these embodiments, ocular sensordata includes data describing the movement of the eyes of the user 308.In one example, the eye-tracking sensor module is implemented assoftware configured to control a camera hardware (e.g., a camera pair,not shown) included within the user computing device 302 that isconfigured to determine the direction of the gaze of the user 308. Inthis example, ocular sensor data includes the length of stare of theuser 308 on one or more regions of content being displayed via thescreen, whether or not the user 308 is looking at one or more portionsof content being displayed via the screen, and the path of the gaze ofthe user 308 as the user 308 views content being displayed via thescreen. The processors of the user computing device 302 may then usecurrently captured ocular sensor data, to scramble or unscramble screenand/or content on the screen of the user computing device 302. As shown,the processor of the user computing device 302 displays the unscrambledcontent 304 on the display screen 310 of the user computing device 302when the sensor detects and authenticates the user 308 viewing thescreen based on the ocular sensor data, and the processor of the usercomputing device 302 displays the scrambled content 306 on the displayscreen 310 of the user computing device 302 when the sensor detects theuser 308 facing away from the screen based on the ocular sensor data.

A eye-tracking module may utilize sensor or camera data to determine thegaze of the user 308. In one embodiment, a light (e.g., infrared) isreflected from the user 308 eye and a video camera or other sensor canreceive the corneal reflection. The eye-tracking module analyzes theocular sensor data of the user 308 to determine eye rotation of the user308 from a change in the light reflection. A vector between a pupilcenter of the user 308 and the corneal reflections of the user 308 canbe used to compute a gaze direction of the user 308. Eye movement dataof the user 308 may be based upon a saccade and/or a fixation, which mayalternate. A fixation is generally maintaining a visual gaze on a singlelocation, and it can be a point between any two saccades. A saccade isgenerally a simultaneous movement of both eyes of the user 308 betweentwo phases of fixation in the same direction.

In one implementation, the eye-tracking module can use a dark-pupiltechnique, whereby if the illumination source is offset from the opticalpath, then the pupil appears dark as the retro reflection from theretina of the user 308 is directed away from the camera. In anotherimplementation, the eye-tracking module can use a bright-pupiltechnique, whereby if the illumination is coaxial with the optical path,then the eye of the user 308 acts as a retro reflector as the lightreflects off the retina creating a bright pupil effect. In yet anotherimplementation, a camera or sensor can track eye image features (e.g.,retinal blood vessels) and follow the features as the eye of the user308 rotates. It is preferable that the eye tracking data is obtained ina manner that is non-invasive. In yet another implementation, a cameraor sensor can identify a location of an iris of the user 308 or pupil ofthe user 308 based on the circular shape or by detection an edge. Themovement of the iris or pupil of the user 308 can then be detected. Theprocessors of the user computing device 302 may then use currentlycaptured iris/pupil data, to scramble or unscramble screen and/orcontent on the screen of the user computing device 302. As shown, theprocessor of the user computing device 302 displays the unscrambledcontent 304 on the display screen 310 of the user computing device 302when the sensor detects and authenticates the user 308 viewing thescreen based on the iris/pupil data, and the processor of the usercomputing device 302 displays the scrambled content 306 on the displayscreen 310 of the user computing device 302 when the sensor detects theuser 308 facing away from the screen based on the iris/pupil data.

In some embodiments, a user computing device 302 may be associated withan expression processing module, which may be an eye-tracking processingmodule or a head tracking module. The expression processing module canuse a coding system that recognizes eye movement and/or gaze directionof the user 308 and generates a score based on duration and direction.Eye movement or gazing may have a duration of about 1/25 of a second to2 seconds or longer, so the expression processing module will receive adata feed of eye movements of the user 308 from a high speed camerahaving increments of less than one second to account for very quickchanges. Some micro-eye movements occur so quickly that a human observercannot detect or sense the shift in gaze or eye movement. In oneimplementation, supplemental content will be displayed when the eyemovement of the user 308 meets a threshold value, when the gaze of theuser 308 is directed away from the displayed content, or both. Theprocessors of the user computing device 302 may then use currentlycaptured eye movement data, to scramble or unscramble screen and/orcontent on the screen of the user computing device 302. As shown, theprocessor of the user computing device 302 displays the unscrambledcontent 304 on the display screen 310 of the user computing device 302when the sensor detects and authenticates the user 308 viewing thescreen based on the eye movement data, and the processor of the usercomputing device 302 displays the scrambled content 306 on the displayscreen 310 of the user computing device 302 when the sensor detects theuser 308 facing away from the screen based on the eye movement data.

In some embodiments, a user computing device 302 may be associated witha tracking sensor module such as a head tracking sensor module which isimplemented as software configured to control associated hardware, andconfigured to receive hardware operation data from the head-trackingmodule, interact with the user 308 in order to generate head positiondata of the user 308, and provide the head position data of the user 308to the head tracking module. In these embodiments, the head positiondata of the user 308 includes data describing the movement of the headof the user 308. In an example, head-tracking sensor module isimplemented as software configured to control camera hardware (e.g., acamera pair, not shown) included within the user computing device 302that is configured to determine the position of the head of the user308. In this example, head position data of the user 308 includes theposition of the head of the user 308 with respect to one or more regionsof content being displayed via the screen of the user computing device302, whether or not the user 308 is looking at one or more portions ofcontent being displayed via the screen, and the path of the headmovement of the user 308 as the user 308 views content being displayedvia the screen.

A head tracking module may utilize sensor or camera data to determinethe initial head position of a user 308 and any subsequent change fromthe initial head position of the user 308. In one embodiment, a light(e.g., infrared) is reflected from the user 308 head and a video cameraor other sensor can receive the reflection from the user 308 head. Thehead tracking module analyzes the head position data of the user 308 todetermine head movement of the user 308 from a change in the lightreflection. A vector between a location on the user 308 head and thehead reflections can be used to compute a change in head position ordirection. Head position data of the user 308 may be based upon amovement and/or a fixation, which may alternate. A fixation is generallymaintaining a head position in single location. A movement is generallyany change in position of the head of the user 308 from an initialposition. The processors of the user computing device 302 may then usecurrently captured head movement data, to scramble or unscramble screenand/or content on the screen of the user computing device 302. As shown,the processor of the user computing device 302 displays the unscrambledcontent 304 on the display screen 310 of the user computing device 302when the sensor detects and authenticates the user 308 viewing thescreen based on the head movement data, and the processor of the usercomputing device 302 displays the scrambled content 306 on the displayscreen 310 of the user computing device 302 when the sensor detects theuser 308 facing away from the screen based on the head movement data.

In another example case, as depicted in FIG. 3G, a user 308 may be usinga device 320 such as a mobile phone, and when the user 308 and/or thedevice 320 comes into proximity of a user computing device 302displaying scrambled content 322, then an authentication apparatus ofthe user computing device 302 may authenticate the user 308 and/or thedevice 320. Upon successful authentication of the user 308 and/or thedevice 320, then the device 320 may determine a decryption technique tounscramble/decrypt the scrambled data/content 322 that is unreadable toa human. For instance, a first decryption technique may be applicable tounscramble a first type of scrambled content (for example, scrambledcontent such as scrambled pixels 322 displayed on the user computingdevice 302) and a second decryption technique may be applicable tounscramble a second type of scrambled content (for example, jumbledalphabets).

Thus, firstly, the device 320 may determine a type of scrambled content322 displayed on a screen of the user computing device 302, and upondetermining the type of scrambled content 322, the device 320 may thenidentify a decryption technique applicable to the determined type ofscrambled content 322 to unscramble the content. Upon analysis, thedevice 320 may determine that the scrambled content 322 comprisesscrambled pixels, and thus a first decryption technique is applicablebased on records associated with decryption techniques. Uponidentification of the first decryption technique, then the device 320execute the first decryption technique, which may result in transmissionand display of unscrambled content 324, which may be readable by humanson a GUI of the device 320.

In yet another example case, as depicted in FIG. 3H, a user computingdevice 302 displays encrypted content on its screen in form of a machinereadable code 326. The machine readable code 326 image may be a QR codeimage, barcode image, or other known code image for use with an opticalscanner. In some embodiments, the machine readable code 326 image mayrepresent a code that is a string of alphanumeric characters that aregenerated by an algorithm contained within the user computing device 302application. A user 308 may be using a device 320 such as a mobile phonecomprising an optical scanner to scan the machine readable code 326image on the user computing device 302. After the machine readable code326 image is scanned by the optical scanner of the device 320, the usercomputing device 302 may first determine identification data associatedwith the device 320 to authenticate the device 320. The user computingdevice 302 may use the identification data associated with the device320 to search a database comprising records of approved devices that areeligible to view content on the user computing device 302. Thesuccessful authentication of the device 320 by the user computing device302 may then result in transmission and display of decrypted content 328on a GUI of the device 320, which may be readable by humans.

In alternate embodiments, upon the identification of the firstencryption technique, the device 320 may transmit a notificationregarding the first encryption technique to the user computing device302, and the user computing device 302 may then execute the firstencryption technique, which may result in transmission and display ofunscrambled content 324, which may be text readable by a human on a GUIof the device 320.

FIG. 4 illustrates a user computing device 402 displaying scrambled textdue to presence of an unauthorized person. The user computing device 402may include an imaging device 408 such as a sensor or camera, which maybe used to scan an area (a zone within which content on a screen of auser computing device 402 are readable) and find all users that areavailable within said area. Then the user computing device 402, inresponse to determining that an unauthorized user 406 has entered intoviewable range of the screen, the screen and/or content displayed on thescreen may be automatically scrambled, which is permitted to be visibleonly to authorized user 404.

An imaging device 408 may include a camera. The camera is an opticalinstrument for recording or capturing images within the area, which maybe stored locally, transmitted to another location, or both. The imagesmay be individual still photographs or sequences of images constitutingvideos or movies of objects and users within the area. The camera mayuse an electronic image sensor, such as a charge coupled device or aCMOS sensor to capture images within the area, which may be transferredor stored in a memory or other storage inside the camera, a systemserver, or the user computing device 402 for processing.

The raw images from an imaging device 408 are transmitted to a processorof a user computing device 402 or a system server, which segregates theimages (based on content within it) and normalize the images. The usercomputing device 402 and system server may be connected to each otherthrough a network to share data among each other. While processing theimages captured within the area, the processor of the user computingdevice 402 may employ face recognition technology for processing thenormalized image. The face recognition technology may use patternrecognition and facial expression analysis to recognize users capturedwithin the images. In one method, the face recognition technology maydetect facial area within the images using a neural network. In anothermethod, the face recognition technology may detect facial area withinthe images using statistical features of facial brightness, which may bea principal component analysis of brightness within the captured images.

In operation, in order to recognize user faces within images captured ofan area, a user computing device 402 may employ an extracted face imageas an input of a face recognition technology as a means of detecting theexact position of facial components or facial features in the extractedface region. In other words, in order to compare an input image with aface recognition model, face position extraction and a size normalizingprocess for compensating for differences in size, angle, and orientationof the facial image extracted from the input image relative to a facialimage of the face recognition model template are performed. In someembodiments of the face recognition models, an eye area may be used as areference facial component in the alignment and the normalizingprocesses since the feature of the eye area remain unchanged comparedwith those of other facial components, even if a change occurs in thesize, expression, lighting, etc., of a facial image.

One or more techniques may be employed for eye detection, which maynormalize correlation at all locations within an input image by makingeye templates of various sizes and forming a Gaussian pyramid image ofthe input image. In one technique, a matrix for eyes, nose, and mouthareas may be provided according to a size of a template, and features ofinterest are searched through comparison with an input image in allareas within the template image. In another technique, a template havingtwo ellipses for detecting facial ellipses may be used to detect afacial location through evaluating a size of edge contours which mayencircle a face in a region between the two ellipses.

A user computing device 402 or a system server upon identifying userswithin an area using face recognition technology may then determinewhether the users are authorized or unauthorized. In some embodiments,the user computing device 402 or the system server may compare biometricor facial data of the users that has been identified with information ina biometric or facial feature database to determine the authorization ofthe identified users to view certain content on a screen of the usercomputing device 402. Where the captured biometric or facial data froman identified user matches a template within the biometric or facialfeature database, the user may be identified as being authorized. Theidentified user may be treated as an unauthorized person in the absenceof authenticating the user as an authorized user.

A user computing device 402 or a system server, upon identifying anunauthorized user 406 within a pre-defined area (when a face of user 406doesn't matches a known template within a database), may determine alocation of the unauthorized user 406 within the area. The usercomputing device 402 or the system server may use one or more motionsensors directly or indirectly associated with the user computing device402 or the system server to determine exact location of the unauthorizeduser 406 within the area. In some embodiments, the user computing device402 or the system server may use one or more location sensors directlyor indirectly associated with the user computing device 402 or thesystem server to determine exact location of the unauthorized user 406within the area. The one or more location sensors may detect the actuallocation of the unauthorized user 406 by generating an electromagneticbeam, such as an infrared or laser beam, and analyzing reflections fromthe electromagnetic beam to determine the position of the unauthorizeduser 406 based on the reflections.

In some embodiments, any suitable location determination technique maybe used by the user computing device 402 or the system server todetermine the exact location of the unauthorized user 406 within thearea. The user computing device 402 or the system server upondetermining the location of the unauthorized user 406 may furtherdetermine whether a screen of the user computing device 402 is withinviewable range of the unauthorized user 406. The user computing device402 may determine whether the screen is within the viewable range of theunauthorized user 406 depending on whether there is an unobstructed lineof sight between one or both of the unauthorized user 406 eyes and thescreen. In some embodiments, whether a screen of the user computingdevice 402 is within viewable range of the unauthorized user 406 mayalso depend on the distance between the unauthorized user 406 eyes andthe screen. In some embodiments, whether a screen of the user computingdevice 402 is within viewable range of the unauthorized user 406 mayalso depend on the distance between the unauthorized user 406 and thescreen.

In some configurations, the user computing device 402 or the systemserver, upon identifying that the unauthorized user 406 is within theviewable range of the screen, may generate and execute software programsto lock the screen, scramble the screen, scramble the content on thescreen such that content is not readable by a human, and/or hidesensitive data displayed on the screen (and only display insensitivedata). The user computing device 402 or the system server maycontinuously monitor the location and/or movement of the unauthorizeduser 406, and upon identifying that the unauthorized user 406 has movedaway from the viewable range of the screen, may generate and executesoftware programs to unlock the screen, unscramble the screen,unscramble the content on the screen such that content is readable by ahuman, and/or display sensitive data displayed on the screen.

FIG. 5 illustrates a user computing device 502 displaying scrambled textdue to a current location of a user 504. The user computing device 502may include a transmitter that transmits connection signals to connectwith a receiver of a wearable device (for example, eyeglasses) operatedby the user 504. The user computing device 502 and a system server maybe connected to each other through a network to share data among eachother. Non-limiting examples of the user computing device 502 mayinclude laptops, mobile phones, smartphones, tablets, electronicwatches, among other types of devices.

A connection signal may serve as data input used by variouscommunication elements responsible for controlling production ofcommunication signals. The connection signal may be produced by thereceiver of the wearable device or the transmitter of the user device502 using an external power supply and a local oscillator chip, which insome cases may include using a piezoelectric material. The connectionsignal may be any communication medium or protocol capable ofcommunicating data between processors of the user device 502 and thewearable device, such as Bluetooth®, RFID, infrared, near-fieldcommunication (NFC). The connection signal may be used to conveyinformation between the transmitter of the user device 502 and thereceiver of the wearable device used to adjust the connection signal, aswell as contain information related to status, device identifier,geo-location, and other types of information.

Initially, a wearable device establishes a wired or wireless connectionor otherwise associates with a user device 502. That is, in someembodiments, the user device 502 and the wearable device may communicatecontrol data over using a wireless communication protocol capable oftransmitting information between two processors of the user device 502and the wearable device (e.g., Bluetooth®, Bluetooth Low Energy (BLE),Wi-Fi, NFC, ZigBee®). For example, in present embodiments implementingBluetooth® or Bluetooth® variants, the user device 502 may scan forwearable device broadcasting advertisement signals or a wearable devicemay transmit an advertisement signal to the user device 502.

The advertisement signal may announce the wearable device's presence tothe user device 502, and may trigger an association between the userdevice 502 and the wearable device. As described herein, in someembodiments, the advertisement signal may communicate information thatmay be used by various devices (e.g., user device 502, wearable device,sever computers, etc.) to execute and manage secure display of contenton screen of the user device 502. Information contained within theadvertisement signal may include a device identifier (e.g., wearabledevice address) and a user identifier (e.g., user name). The user device502 may use the advertisement signal transmitted to identify thewearable device (and the user 504) and, in some cases, locate thewearable device (and the user 504) in a two-dimensional space or in athree-dimensional space.

Once the user device 502 identifies the wearable device used by a user504 and/or the user 504 itself, the user device 502 may then establish awireless connection with the wearable device and/or authorizes the user504, allowing the user device 502 and wearable device to communicatecontrol signals over a communication channel. In some cases, the userdevice 502 may use the advertisement signal to authenticate user 502,determine a role of user 502, and then display unscrambled content onscreen of the user device 502 based on permissible unscrambled contentbased on the role of the user. The user device 502 may use informationcontained in the wearable device advertisement signal, or in subsequentconnection signals received from the wearable device, to determine whatunscrambled content and for how much time to display on the screen ofthe user device 502.

In some embodiments, when a user device 502 identifies and wirelesslyconnects with a wearable device, a system server, the user device 502and/or the wearable device may then initiate steps to authenticate auser 504 using the wearable device, unlock a screen of the user device502, unscramble screen and/or content on the screen, and therebyallowing the user 504 to view unscrambled content on the unlocked screenof the user device 502. The system server, the user device 502 and/orthe wearable device may authenticate the user 504 based on securitymechanisms, which may use biometric identification of the user 504. Forexample, the security mechanisms may be biometric-based securityprocesses, and based on, or include, use of a biometric component suchas a fingerprint reader, an iris scanner, a voice recognition mechanism,an image analysis/facial detection mechanism, etc., that can be used toidentify a particular user 504 using a particular wearable device.

In some embodiments, the system server, the user device 502 and/or thewearable device may implement a pulse detection apparatus toauthenticate the user 504, which may use pulse waveform data of the user504 and uses the pulse waveform data to conduct biometric identificationof the user 504. The pulse data measurements of the user 504 may begathered using a variety of sensors of the pulse detection apparatus onfingers, wrists, temples, eyes, of the user 504 or through other similarmeans.

In some embodiments, during an enrollment process of a user 504 forbiometric-based security process, a biometric signature created by asystem server to authenticate the user 504 may be generated frombiometric profiles of the user 504. For example, an exemplary number ofbiometric profiles that may be averaged by the system server to createthe biometric signature as used herein is two biometric profiles.However, any number of biometric profiles may be combined, each of whichis created through an operation of the biometric profile creationsession, which is a first part of the biometric-based security processthat includes the presentation and biometric data biometric data captureportion, biometric data pre-processing portion, biometric datasegmentation portion, and biometric data feature extraction portion.Accordingly, one or more biometric profiles may be used to establish abiometric signature of the user 504. In addition, during anauthentication process, one or more biometric profiles of the user 504may also be captured utilizing the biometric profile creation sessionpreviously used to capture the enrollment biometric profiles used togenerate the biometric signature of the user 504 during the enrollmentprocess for biometric-based security process.

A pulse detection apparatus may include various electronic components(such as sensors), and be part of or a separate component associatedwith a system server, a user device 502 and/or a wearable device. In oneexample, the pulse detection apparatus that contains pulse sensors maybe integrated into the wearable device to provide dynamic biometricbased measurements, for example, measurements of pulse wave data at oneor more measurement points on the user 504. The measurements of thepulse wave data at the one or more measurement points on the user 504 isused to form a biometric signature for the user 504. In another example,the pulse detection apparatus integrated into the wearable device mayobtain pulse data of the user 504 when user 504 is wearing the wearabledevice, where inputs from the sensors providing the pulse data of theuser 504 is utilized to form a biometric signature for the user 504,which may be used to perform biometric identification of the user 504.In another example, the pulse detection apparatus may be included in theuser device 502 or any system server that obtains the pulse data of theuser 504 to perform biometric identification, e.g., from pulse sensorsdisposed on or viewing a user 504. The user 504 pulse data may includepulse data that permits an conclusion as to the identity of the user504.

The pulse data of the user 504 may be collected at a plurality of pointsin order to offer a more accurate identification of the user 504. Forexample, two or more different blood vessels of the user 504 may bemeasured to obtain user 504 pulse data for each. The two or moremeasurements are combined or correlated with one another to furtherrefine or improve the biometric identification. In some embodiments, oneor more sensors may be used, e.g., on opposite sides of a wearabledevice, in order to obtain the pulse data of the user 504 at multiplelocations. The pulse data for the multiple locations can be compared (asto time and magnitude, e.g., of a pulse wave) in order to form abiometric signature for the user 504. In another example, a camera ofthe user device 502 may sample or obtain image data of two or moredifferent blood vessels in order to derive pulse data of the user 504,e.g., pulse wave data, for use in biometric identification of the user504.

During a validation session of the biometric-based security process, asystem server, a user device 502 and/or a wearable device may capturebiometric data of the user 504 and then compare to the biometricsignature of the user 504 to perform authentication of the user. Forinstance, the user device 502 and/or the wearable device may utilize theuser 504 biometric pulse data to determine if the user 504 biometricpulse data matches expected user biometric pulse data. In other words,the currently detected user 504 pulse data obtained is compared to knownuser pulse data of a particular user in order to identify the particularuser. The known user pulse data may be stored locally or accessed from aremote database. The known user pulse data may include a biometricsignature or profile that has been generated based on historicallydetected user pulse data.

In accordance with various aspects of the disclosed embodiments, duringan authentication operation based on the matching operation ofdetermined versus expected biometric data of the user 504, each point ofthe captured biometric pulse data of the user 504 may be compared to arespective point in the biometric signature using a matching algorithm,such as Euclidean distance, hamming distance, etc., to evaluate if theverification biometric pulse data matches the biometric signature at agiven threshold. Accordingly, the a profile of the user 504 with abiometric pulse data distribution does not have to be identical to thebiometric signature. If the profile of the user 504 matches with thebiometric signature, then the user 504 is authenticated, and if there isno match then authentication of the user 504 is denied.

If the user 504 is identified, using the pulse data of the user 504,that is, the currently detected pulse data of the user 504 is similar orequivalent to known pulse data of the user 504, the user 504 may begranted access to view unscrambled content on the screen of the userdevice 502, and have continued access to the unscrambled content on thescreen of the user device 502. If the user 504 is not identified usingthe detected pulse data, the lack of user identification may lead to arequirement for further authentication data and/or may result in reduceduser device 502 functionality. For example, if a user 504 is identifiedusing the user pulse data, user-specific functionality may be providedby the user device 502 and the unscrambled screen will be displayed onthe user device 502. In contrast, if the particular user 504 is notidentified using the user pulse data, a temporary setting may be appliedto the user device 502 and the scrambled screen will be displayed on theuser device 502, subject to further identification being made, e.g.,using certain information that the user 504 has knowledge of, such as apassword, two factor identification methods, or certain informationwhich the user 504 has possession of, such as a token, or one or morephysical characteristics of the user 504, such as the user's fingerprintprofile.

In some embodiments, when a wired or wireless connection between awearable device used by a user 504 and a user device 502 is terminatedbecause the wearable device or the user 504 wearing the wearable deviceare out of range from the user device 502, then a system server and/orthe user device 502 may generate and execute software programs to lock ascreen of the user device 502, scramble the screen, scramble content onthe screen such that content is not readable by a human, and/or hidesensitive data displayed on the screen (and only display insensitivedata). The user computing device 402 or the system server may monitorthe location and/or movement of the wearable device or the user 504wearing the wearable device, and upon re-establishing the wired orwireless connection between the wearable device used by the user 504 andthe user device 502 when the wearable device used by the user 504 andthe user device 502 are in range of each other, then the system serverand/or the user device 502 may again initiate authentication process ofthe user 504. Upon authentication of the user 504, the system serverand/or the user device 502 may then generate and execute softwareprograms and/or algorithms to unlock the screen, unscramble the screen,unscramble content on the screen such that content is readable by ahuman, and/or display sensitive data on the screen.

FIG. 6 shows execution of a method showing operations of a distributeddata processing and display system, according to an exemplary method600. The exemplary method 600 shown in FIG. 6 comprises execution steps602, 604, 606, and 608. However, it should be appreciated that otherembodiments may comprise additional or alternative execution steps, ormay omit one or more steps altogether. It should also be appreciatedthat other embodiments may perform certain execution steps in adifferent order; steps may also be performed simultaneously ornear-simultaneously with one another. In addition, the exemplary method600 of FIG. 6 is described as being executed by a single servercomputer, referred to as a system server in this exemplary embodiment.However, one having skill in the art will appreciate that, in someembodiments, steps may be executed by any number of computing devicesoperating in a distributed computing environment. In some cases, acomputer executing one or more steps may be programmed to executevarious other, unrelated features, where such computer does not need tobe operating strictly as a user computing device or a system serverdescribed herein.

In a first step 602, a user computing device may display on itsgraphical user interface (GUI) or a monitor screen, an image or a videocontent. The image and/or the video content may include textual orvisual data/information.

The screen may be an output device, which displays information such asthe image or the video content in pictorial form. The screen may includea display device, circuitry, casing, and power supply. The displaydevice may be a thin film transistor liquid crystal display,light-emitting diode display, or an organic light-emitting diodedisplay. The screen may be connected to the user computing device viaVGA, Digital Visual Interface (DVI), HDMI, Display Port, Thunderbolt,low-voltage differential signaling (LVDS) or other proprietaryconnectors and signals.

Initially, when a user computing device is not being operated by anyuser, a screen of the user computing device may be scrambled orscrambled data/content may be displayed on the screen that is unreadableto a human. The term “scrambled” and “encrypted” may be interchangeablyused. In some embodiments, the scrambled data may correspond to jumbledletters, which may not make any sense to the user. For example, the usercomputing device or a system server may randomly arrange words andletters, and put words or letters in a wrong order so that they do notmake sense (even though maintaining the styles and numbers of letters ineach word). The scrambling performed is random and may be undone usingone or more unscrambling techniques.

In some embodiments, scrambled data may correspond to a plurality ofsegments of an image displayed on a screen such that information withinsegmented image is unreadable to a human. A user computing device and/ora system server associated with the user computing device may generateand execute software programs and/or algorithms to divide the displayscreen and/or the image on the screen into multiple segments. Upondividing the display screen and/or the image on the screen into themultiple segments, in one embodiment, the user computing device and/orthe system server may orient each of the segment such that the data inthe segmented image is unreadable to the human. In another embodiment,upon dividing the display screen and/or the image on the screen into themultiple segments, the user computing device and/or the system servercompress each segment such that the data in the segmented image isunreadable to the human. In yet another embodiment, upon dividing thedisplay screen and/or the image on the screen into the multiplesegments, the user computing device and/or the system server overturneach segment such that the data in the segmented image is unreadable tothe human.

In a next step 604, a user computing device may receive a request for awired or wireless connection from a wearable device. The wearable devicemay be a display device in form of eyeglasses, goggles, or any otherstructure comprising a frame that supports and incorporates variouscomponents of the wearable device, as well as serves as a conduit forelectrical and other component connections.

A user computing device may transmit a request for the wired or thewireless connection to the wearable device when the wearable device iswithin a range of the user computing device. Each of the user computingdevice and the wearable device may include communication components, oneor more transmitters, and one or more receivers. In one example, atransmitter of a user computing device may first identify and thentransmit a request for connection to a receiver of a wearable device. Inanother example, a transmitter of a wearable device may first identifyand then transmit a request for connection to a transmitter of a usercomputing device.

A transmitter and a receiver may communicate to each other with orwithout communication components. The communications component mayinclude electromechanical components (e.g., processor, antenna) thatallow the communications component to communicate various types of datawith the receivers, transmitters, and/or other components of thetransmitters. In some implementations, communications signals betweenthe transmitter and the receiver may represent a distinct channel forhosting communications. The data may be communicated using thecommunications signals, based on predetermined wired or wirelessprotocols and associated hardware and software technology. Thecommunications component may operate based on any number ofcommunication protocols, such as Bluetooth®, Wireless Fidelity (Wi-Fi),Near-Field Communications (NFC), ZigBee, and others. However, it shouldbe appreciated that the communications component is not limited to thesetechnologies, but may include radar, infrared, and sound devices aswell.

In a next step 606, a user computing device may connect to a wearabledevice. The computing device may connect to the wearable device, inresponse to the user computing device determining that a set ofpurported credentials associated with the wearable device received fromthe wearable device through communications signals matches a set ofcredentials authenticating the wearable device that are stored in asystem database. For example, after the communication channel betweenthe user computing device and the wearable device is established, thenthe user computing device may generate a graphical user interface (GUI)on the user computing device containing a credentials prompt requestinga user of the wearable device to input a set of user credentials. Insome cases, after the communication channel between the user computingdevice and the wearable device is established, then the user computingdevice may transmit to the wearable device the GUI containing thecredentials prompt. The wearable may then transmit to the user computingdevice, the set of user credentials, in response to the credentialsprompt. The user computing device may then match the set of usercredentials received from the wearable device with a set of credentialsauthenticating the wearable device that are stored in a system database.Once the match is confirmed, then the wearable device and the usercomputing device may be authenticated and connected. In someembodiments, upon the user computing device receiving the set of usercredentials from the wearable device, in response to the credentialsprompt, the user computing device may transmit the set of usercredentials to a system server, which may be directly or indirectlyconnected to the user computing device. The system server may then matchthe set of user credentials received from the wearable device with a setof credentials authenticating the wearable device that are stored in asystem database. Once the match is confirmed, the system server mayauthenticate the wearable device and the user computing device, andconnect them to each other.

In some embodiments, during operation, a user computing device mayreceive a request from a wearable device to become a trusted wearabledevice for allowing a user using the wearable device access to contenton a screen of the user computing device. The request may be generatedin any suitable manner. For example, the user of the wearable devicelogs into a secure display application service installed on the usercomputing device and/or the wearable device where the request isgenerated. The user may log into the secure display application serviceby entering username and/or user ID of a user. When the user enters thelogin details, a request for authorizing the wearable device to becomethe trusted device may be generated, and then transmitted to a usercomputing device and/or a system server.

Upon the receipt of the request by the user computing device and/or theserver, the user computing device and/or the server may implement aseries of security protocols in order to verify the wearable device andthe user. For instance, in a first layer of security protocolimplemented by the user computing device and/or the server, the usercomputing device and/or the server may generate a security code that maybe transmitted to a phone number of a mobile device of the user, and theuser may be requested to read and/or enter the code on an user interfaceof the user computing device. The code may include a secret token, whichmay be, for example, a globally unique identifier (GUID), such as forexample but not limited to a unique string of characters including, butnot limited to letters or numbers or both. In another example, the codemay also include one or more Uniform Resource Locators (URLs). In someembodiments, the code may be associated with an expiry time. The expirytime may be included in the code. The user may then read and enter thecode into an user interface of the user computing device to establishsecure connection and synchronization between the user computing deviceand the wearable device.

In a next step 608, once a wearable device and a user computing deviceare wirelessly connected to each other, a wearable device may determinea decryption technique to unscramble the scrambled data/contentdisplayed on a screen of said user computing device that is unreadableto a human. In some embodiments, a first decryption technique may beapplicable to unscramble a first type of scrambled content (for example,jumbled alphabets) and a second decryption technique may be applicableto unscramble a second type of scrambled content (for example, scrambledpixels). Thus, the wearable device may first determine a type ofscrambled content displayed on the screen, and upon determining the typeof scrambled content, may then identify an encryption techniqueapplicable to the determined type of scrambled content to unscramble thecontent. Upon identification of the decryption technique, which may beapplicable for the determined type of scrambled content, then thewearable device may execute the decryption technique, which may resultin transmission and display of unscrambled content on the wearabledevice. In alternate embodiments, upon the identification of thedecryption technique, which may be applicable for the determined type ofscrambled content, the wearable device may transmit a notificationregarding the identified decryption technique to the user computingdevice, and the user computing device may then execute the decryptiontechnique, which may result in transmission and display of unscrambled(or decrypted) content on the wearable device. At a time when the userof the wearable device is able to view unscrambled content on thewearable device, the screen of the user computing device will continueto display scrambled content.

In some embodiments, once a wearable device and a user computing deviceare wirelessly connected to each other, the user computing device mayexecute software programs/algorithms for unscrambling the scrambled datadisplayed on the screen such that a jumbled alphabets of the image arereconfigured and information within the image makes sense when thescreen of the user computing device is viewed through one or more lensesof the wearable device. In some embodiments, the user computing devicemay execute software programs/algorithms for unscrambling the scrambleddata displayed on the screen such that a plurality of segments of theimage are reconfigured to original arrangement, and information withinthe image is readable when the screen of the user computing device isviewed through one or more lenses of the wearable device.

In some embodiments, once a wearable device and a user computing deviceare wirelessly connected to each other, the user computing device maytransmit the scrambled data to the wearable device. The user computingdevice may also transmit configuration information of the plurality ofsegments of the scrambled data to the wearable device. In response toreceipt of the configuration information of the plurality of segments ofthe scrambled data, a processor of the wearable device causes theconfiguration of the plurality of segments to be such that the pluralityof segments of the image are reconfigured to original arrangement, andthe data in the image is readable by viewing at the one or more lenses.

In some embodiments, a wearable device may include an imaging sensor,which may receive the scrambled data from the user computing device. Theimaging sensor or a processor of the wearable device may then generateinstructions to execute software programs/algorithms to unscramble thescrambled data. Subsequently, the processor of the wearable device maytransmit the unscrambled data to the user computer device for display onthe screen of the user computing device. In some cases, the processor ofthe wearable device may transmit the unscrambled data to a systemserver, and the system server may then transmit the unscrambled data tothe user computer device for display on the screen of the user computingdevice.

FIG. 7 shows execution of a method showing operations of a distributeddata processing and display system, according to an exemplary method700. The exemplary method 700 shown in FIG. 7 comprises execution steps702, 704, 706, and 708. However, it should be appreciated that otherembodiments may comprise additional or alternative execution steps, ormay omit one or more steps altogether. It should also be appreciatedthat other embodiments may perform certain execution steps in adifferent order; steps may also be performed simultaneously ornear-simultaneously with one another. In addition, the exemplary method700 of FIG. 7 is described as being executed by a single servercomputer, referred to as a system server in this exemplary embodiment.However, one having skill in the art will appreciate that, in someembodiments, steps may be executed by any number of computing devicesoperating in a distributed computing environment. In some cases, acomputer executing one or more steps may be programmed to executevarious other, unrelated features, where such computer does not need tobe operating strictly as user computing device or a server describedherein.

In a first step 702, a user computing device may display on itsgraphical user interface (GUI) or a monitor screen, an image or a videocontent. The image and/or the video content may include textual orvisual data/information.

The screen may be an output device, which displays information such asthe image or the video content in pictorial form. The screen may includea display device, circuitry, casing, and power supply. The displaydevice may be a thin film transistor liquid crystal display,light-emitting diode display, or an organic light-emitting diodedisplay. The screen may be connected to the user computing device viaVGA, Digital Visual Interface (DVI), HDMI, Display Port, Thunderbolt,low-voltage differential signaling (LVDS) or other proprietaryconnectors and signals.

Initially, when a user computing device is not being operated by anyuser, a screen of the user computing device may be scrambled orscrambled data/content may be displayed on the screen that is unreadableto a human. In some embodiments, the scrambled data may correspond tojumbled letters, which may not make any sense to the user. For example,the user computing device or a system server may randomly arrange wordsand letters, and put words or letters in a wrong order so that they donot make sense (even though maintaining the styles and numbers ofletters in each word). The scrambling performed is random and may beundone using one or more unscrambling techniques.

In some embodiments, scrambled data may correspond to a plurality ofsegments of an image displayed on a screen such that information withinsegmented image is unreadable by a human. A user computing device and/ora system server associated with the user computing device may generateand execute software programs and/or algorithms to divide the displayscreen and/or the image on the screen into multiple segments. Upondividing the display screen and/or the image on the screen into themultiple segments, in one embodiment, the user computing device and/orthe system server may orient each of the segment such that the data inthe segmented image is unreadable by the human. In another embodiment,upon dividing the display screen and/or the image on the screen into themultiple segments, the user computing device and/or the system servercompress each segment such that the data in the segmented image isunreadable by the human. In yet another embodiment, upon dividing thedisplay screen and/or the image on the screen into the multiplesegments, the user computing device and/or the system server overturneach segment such that the data in the segmented image is unreadable bythe human.

In a next step 704, a user computing device may capture via one or morecameras directly or indirectly associated with the user computingdevice, a real-time facial image of a user adjacent to a user computingdevice. In some embodiments, a camera may be a thermal camera, which isconfigured to capture one or more facial images of a user that will onlydetect shape of a head of a user and will ignore the user accessoriessuch as glasses, hats, or make up.

The cameras may be used to capture a series of exposures to produce thepanoramic image within a region of the user computing device. The cameraincludes a zoom lens for directing image light from a scene toward animage sensor, and a shutter for regulating exposure time. Both the zoomand the shutter are controlled by a microprocessor in response tocontrol signals received from a system server including a shutterrelease for initiating image capture. A flash unit may be used toilluminate the scene when needed. The image sensor includes a discretenumber of photosite elements or pixels arranged in an array to formindividual photosites corresponding to the pixels of the image. Theimage sensor can be either a conventional charge coupled device (CCD)sensor or a complementary metal oxide semiconductor (CMOS) imager.

The camera may be operable in a regular mode and a panoramic mode, andin different angles to create a 3D model of an image. In the regularmode, the camera captures and produces individual still digital imagesin a manner well known to those skilled in the art. In the panoramicmode, the camera captures a series of overlapping digital images to beused in constructing a panoramic image. The memory of the camera storesthe instructions for the processor for implementing the panoramic mode.

During operation, once images are captured, a user computing device maythen determine users within the captured images. The user computingdevice may implement one or more techniques to identify the users withinthe captured images. Once the users are identified, then the usercomputing device may extract face recognition information from a facialimage of each user. The face recognition information may correspond toinformation associated with a shape of a face. In some embodiments, theface recognition information may correspond to features on a surface ofa face such as a contour of eye sockets, nose, and chin of a user.

In a next step 706, a user computing device may track eye position of auser based on information retrieved from a real-time facial image of auser. The user computing device may execute eye position trackingtechnologies on the real-time facial image of the user to track eyeposition of the user. In one example, the user computing device may usean illuminator, a tracking camera, and an image processor to track theeye position of the user. The illuminator, which may be an infraredilluminator, generates an IR beam that illuminates a user's face. Theuser's eyes may generate a comparatively high level of reflectionrelative to other features of the user's face, which may be used todistinguish the position of the eyes from those other features. Thetracking camera captures the reflected light from the user's cornea. Theimage processor locates the position of the user's eyes by examining theimage captured by the tracking camera. The position of the user's eyesmay be determined relative to the other parts of the user's body.

In a next step 708, a user computing device may determine whether a useris authorized to view readable data on a screen of the user computingdevice, in response to matching a set of purported identificationsassociated with a facial image received from cameras with a set ofidentifications authenticating the user that is stored in a systemdatabase. For example, the user computing device may compare and matchcontour of eye sockets, nose, or chin of a user with a template of facefeatures of known users stored in the database. When there is a matchbetween determined and stored face features, the user is thenauthenticated, and unscrambled readable data is then displayed on thescreen.

In some embodiments, a user computing device may monitor a current eyeposition of an authenticated user, and only when the current eyeposition of the authenticated user is determined to be in line of sightwith the screen, then the user computing device may display unscrambledreadable data on the screen. The user computing device may continuouslymonitor a current eye position of an authenticated user, and when thecurrent eye position of the authenticated user is determined to not bein line of sight with the screen (i.e., the user is not viewing thescreen), then the user computing device may display scrambled data onthe screen.

In some embodiments, a user computing device may monitor a head positionof an authenticated user, and only when the head position of theauthenticated user is determined to be in line of sight with the screen,then the user computing device may display unscrambled readable data onthe screen. The user computing device may continuously monitor a currenthead position of an authenticated user, and when the current headposition of the authenticated user is determined to not be in line ofsight with the screen (i.e., the head of user is not towards thescreen), then the user computing device may display scrambled data onthe screen.

In some embodiments, a user computing device may monitor a current eyeposition and a head position of an authenticated user, and only when thecurrent eye position and the head position of the authenticated user isdetermined to be in line of sight with the screen, then the usercomputing device may display unscrambled readable data on the screen.The user computing device may continuously monitor a current eyeposition and head position of an authenticated user, and when thecurrent eye position and head position of the authenticated user isdetermined to not be in line of sight with the screen (i.e., the user isnot viewing the screen), then the user computing device may displayscrambled data on the screen.

FIG. 8 shows execution of a method showing operations of a distributeddata processing and display system, according to an exemplary method800. The exemplary method 800 shown in FIG. 8 comprises execution steps802, 804, 806, and 808. However, it should be appreciated that otherembodiments may comprise additional or alternative execution steps, ormay omit one or more steps altogether. It should also be appreciatedthat other embodiments may perform certain execution steps in adifferent order; steps may also be performed simultaneously ornear-simultaneously with one another. In addition, the exemplary method800 of FIG. 8 is described as being executed by a single servercomputer, referred to as a system server in this exemplary embodiment.However, one having skill in the art will appreciate that, in someembodiments, steps may be executed by any number of computing devicesoperating in a distributed computing environment. In some cases, acomputer executing one or more steps may be programmed to executevarious other, unrelated features, where such computer does not need tobe operating strictly as user computing device or a server describedherein.

In a first step 802, a user computing device may display on itsgraphical user interface (GUI) or a monitor screen, an image or a videocontent. The image and/or the video content may include textual orvisual data/information.

The screen may be an output device, which displays information such asthe image or the video content in pictorial form. The screen may includea display device, circuitry, casing, and power supply. The displaydevice may be a thin film transistor liquid crystal display,light-emitting diode display, or an organic light-emitting diodedisplay. The screen may be connected to the user computing device viaVGA, Digital Visual Interface (DVI), HDMI, Display Port, Thunderbolt,low-voltage differential signaling (LVDS) or other proprietaryconnectors and signals.

Initially, when a user computing device is not being operated by anyuser, a screen of the user computing device may be scrambled orscrambled data/content may be displayed on the screen that is unreadableby a human. In some embodiments, the scrambled data may correspond tojumbled letters, which may not make any sense to the user. For example,the user computing device or a system server may randomly arrange wordsand letters, and put words or letters in a wrong order so that they donot make sense (even though maintaining the styles and numbers ofletters in each word). The scrambling performed is random and may beundone using one or more unscrambling techniques.

In some embodiments, scrambled data may correspond to a plurality ofsegments of an image displayed on a screen such that information withinsegmented image is unreadable by a human. A user computing device and/ora system server associated with the user computing device may generateand execute software programs and/or algorithms to divide the displayscreen and/or the image on the screen into multiple segments. Upondividing the display screen and/or the image on the screen into themultiple segments, in one embodiment, the user computing device and/orthe system server may orient each of the segment such that the data inthe segmented image is unreadable by the human. In another embodiment,upon dividing the display screen and/or the image on the screen into themultiple segments, the user computing device and/or the system servercompress each segment such that the data in the segmented image isunreadable by the human. In yet another embodiment, upon dividing thedisplay screen and/or the image on the screen into the multiplesegments, the user computing device and/or the system server overturneach segment such that the data in the segmented image is unreadable bythe human.

In a next step 804, a user computing device, via one or more imagesensors, associated with the user computing device may capture at leasta portion of a face of a user adjacent to the user computing device. Theimage sensor may be used to capture a series of exposures to produce thepanoramic image within a region of the image sensor. The image sensormay analyze portion of the face to identify biometric and facialfeatures of the user such as shape of face, shape of eyes, shape ofnose, and shape of other parts of the face.

In a next step 806, a user computing device may determine whether a useris authorized to view data on a screen of the user computing device, inresponse to matching a set of purported identifications associated witha portion of a face received from imaging sensors with a set ofidentifications authenticating the user that is stored in a systemdatabase. In one example, a user computing device may compare and matchbiometric features of a user with a template of biometric features ofknown users stored in the database. When there is a match betweendetermined and stored biometric features, the user is thenauthenticated. In another example, the user computing device may compareand match contour of eye sockets, nose, or chin of a user with atemplate of such face features of known users stored in the database.When there is a match between determined and stored face features, theuser is then authenticated.

In a next step 808, a user computing device may execute softwareprograms and/or algorithms to unlock a screen, unscramble a screen,unscramble scrambled content on a screen such that content is readableby a human, and/or display sensitive data on the screen. In one example,upon the execution of the software programs and/or algorithms, aplurality of segments of segmented and scrambled image are reconfiguredto make information within the unscrambled image readable.

FIG. 9 shows execution of a method showing operations of a distributeddata processing and display system, according to an exemplary method900. The exemplary method 900 shown in FIG. 9 comprises execution steps902, 904, 906, 908, 910, and 912. However, it should be appreciated thatother embodiments may comprise additional or alternative executionsteps, or may omit one or more steps altogether. It should also beappreciated that other embodiments may perform certain execution stepsin a different order; steps may also be performed simultaneously ornear-simultaneously with one another. In addition, the exemplary method900 of FIG. 9 is described as being executed by a single servercomputer, referred to as a system server in this exemplary embodiment.However, one having skill in the art will appreciate that, in someembodiments, steps may be executed by any number of computing devicesoperating in a distributed computing environment. In some cases, acomputer executing one or more steps may be programmed to executevarious other, unrelated features, where such computer does not need tobe operating strictly as user computing device or a server describedherein.

In a first step 902, a user computing device may display on itsgraphical user interface (GUI) or a monitor screen, an image or a videocontent. The image and/or the video content may include textual orvisual data/information.

The screen may be an output device, which displays information such asthe image or the video content in pictorial form. The screen may includea display device, circuitry, casing, and power supply. The displaydevice may be a thin film transistor liquid crystal display,light-emitting diode display, or an organic light-emitting diodedisplay. The screen may be connected to the user computing device viaVGA, Digital Visual Interface (DVI), HDMI, Display Port, Thunderbolt,low-voltage differential signaling (LVDS) or other proprietaryconnectors and signals.

Initially, when a user computing device is not being operated by anyuser, a screen of the user computing device may be scrambled orscrambled data/content may be displayed on the screen that is unreadableby a human. In some embodiments, the scrambled data may correspond tojumbled letters, which may not make any sense to the user. For example,the user computing device or a system server may randomly arrange wordsand letters, and put words or letters in a wrong order so that they donot make sense (even though maintaining the styles and numbers ofletters in each word). The scrambling performed is random and may beundone using one or more unscrambling techniques.

In some embodiments, scrambled data may correspond to a plurality ofsegments of an image displayed on a screen such that information withinsegmented image is unreadable by a human. A user computing device and/ora system server associated with the user computing device may generateand execute software programs and/or algorithms to divide the displayscreen and/or the image on the screen into multiple segments. Upondividing the display screen and/or the image on the screen into themultiple segments, in one embodiment, the user computing device and/orthe system server may orient each of the segment such that the data inthe segmented image is unreadable by the human. In another embodiment,upon dividing the display screen and/or the image on the screen into themultiple segments, the user computing device and/or the system servercompress each segment such that the data in the segmented image isunreadable by the human. In yet another embodiment, upon dividing thedisplay screen and/or the image on the screen into the multiplesegments, the user computing device and/or the system server overturneach segment such that the data in the segmented image is unreadable bythe human.

In a next step 904, a user computing device may capture via one or morecameras associated with the user computing device, a real-time facialimage of a first user adjacent to a user computing device. For example,a camera may be installed on the user computing device and is an opticalinstrument for recording or capturing images within an area, which maybe stored locally, transmitted to another location, or both. The imagesmay be individual still photographs or sequences of images constitutingvideos or movies of objects and users within the area. The imagescaptured from the camera are fed to a processor of a user computingdevice or a system server which segregates the images (based on contentwithin it) and normalize the images. While processing the imagescaptured within the area, the processor of the user computing device mayemploy face recognition technology for processing the normalized image.The face recognition technology may use pattern recognition and facialexpression analysis to recognize first user captured within the images.In one method, the face recognition technology may detect facial areawithin the images using a neural network. In another method, the facerecognition technology may detect facial area within the images usingstatistical features of facial brightness, which may be a principalcomponent analysis of brightness within the captured images.

In a next step 906, a user computing device may determine whether afirst user is authorized to view image data on the screen, in responseto matching a set of purported identifications associated with thefacial image of the first user received from the one or more sensorswith a set of identifications authenticating the first user that isstored in a system database. The set of purported identificationsassociated with the facial image of the first user comprises facerecognition information. The face recognition information may correspondto information associated with a shape of the face. In some embodiments,the face recognition information may correspond to features on a surfaceof a face such as a contour of eye sockets, nose, and chin of a user.The user computing device may compare and match extracted face featuresof the user with a template of face features of known users stored in adatabase. When there is a match between determined and stored facefeatures, the user is then authenticated.

In a next step 908, a user computing device may execute softwareprograms and/or algorithms to unlock a screen, unscramble a screen,unscramble scrambled content on a screen such that content is readablefrom a naked eye of a first user, and/or display sensitive data on thescreen. In one example, upon the execution of the software programsand/or algorithms, a plurality of segments of segmented and scrambledimage are reconfigured to make information within the unscrambled imagereadable to the first user.

In a next step 910, a user computing device upon processing of imagescaptured by one or more sensors and/or cameras may detect a second userwith operation area of the one or more sensors and/or cameras. In somecases, when the user computing device determines that there exists thesecond user within the area of operation of the camera and/or sensor,then the user computing device may determine authorization andauthorization status of the user. In some cases, when the user computingdevice determines that there exists the second user within the area ofoperation of the camera and/or sensor, then the user computing devicemay determine whether the second user is in line of sight of a screen.In some cases, when the user computing device determines that thereexists the second user within the area of operation of the camera and/orsensor, then the user computing device may determine authorization andauthorization status of the user as well as whether the second user isin line of sight of a screen.

In operation, to determine whether a second user is in line of sight ofa screen, a user computing device or a system server may determine alocation of the second user. The user computing device or the systemserver may use one or more motion sensors directly or indirectlyassociated with the user computing device or the system server todetermine exact location of the second user. The user computing deviceor the system server may use one or more location sensors directly orindirectly associated with the user computing device or the systemserver to determine exact location of the second user. The one or morelocation sensors may detect the actual location of the second user bygenerating an electromagnetic beam, such as an infrared or laser beam,and analyzing reflections from the electromagnetic beam to determine theposition of the second user based on the reflections. In someembodiments, any suitable location determination technique may be usedby the user computing device or the system server to determine the exactlocation of the second user within the area. The user computing deviceor the system server upon determining the location of the second usermay further determine whether a screen of the user computing device iswithin viewable range of the second user based on eye position and/orhead position of the second user. The user computing device maydetermine whether the screen is within the viewable range of the seconduser depending on whether there is an unobstructed line of sight betweenone or both of the second user eyes and the screen. In some embodiments,whether a screen of the user computing device is within viewable rangeof the second user may also depend on the distance between the seconduser eyes and the screen. In some embodiments, whether a screen of theuser computing device is within viewable range of the second user mayalso depend on the distance between the second user and the screen.

In a next step 912, a user computing device or a system server uponidentifying that the second user is within the viewable range of ascreen may generate and execute software programs to lock the screen,scramble the screen, scramble content on the screen such that content isnot readable from a naked eye of the second user, and/or hide sensitivedata displayed on the screen (and only display insensitive data). Theuser computing device or the system server may continuously monitor thelocation and/or movement of the second user, and upon identifying thatthe second user has moved away from the viewable range of the screen,may generate and execute software programs to unlock the screen,unscramble the screen, unscramble the content on the screen such thatcontent is readable from a naked eye, and/or display sensitive datadisplayed on the screen.

FIG. 10 shows execution of a method showing operations of a distributeddata processing and display system, according to an exemplary method1000. The exemplary method 1000 shown in FIG. 10 comprises executionsteps 1002, 1004, 1006, 1008, and 1010. However, it should beappreciated that other embodiments may comprise additional oralternative execution steps, or may omit one or more steps altogether.It should also be appreciated that other embodiments may perform certainexecution steps in a different order; steps may also be performedsimultaneously or near-simultaneously with one another. In addition, theexemplary method 1000 of FIG. 10 is described as being executed by asingle server computer, referred to as a system server in this exemplaryembodiment. However, one having skill in the art will appreciate that,in some embodiments, steps may be executed by any number of computingdevices operating in a distributed computing environment. In some cases,a computer executing one or more steps may be programmed to executevarious other, unrelated features, where such computer does not need tobe operating strictly as user computing device or a server describedherein.

In a first step 1002, a server may store records of pulse waveform datacollected from known users in a database. The pulse waveform data maycorrespond to measurement of a pulse waveform transit time, bloodpressure, respiratory rate, oxygen saturation, and stroke volume in theuser.

In some embodiments, the server may receive via one or more pulsesensors, the pulse waveform data collected from one or more measurementpositions of a known user. In some embodiments, the server may receivevia the one or more pulse sensors, the pulse waveform data collectedfrom the one or more measurement positions of the known user whilewearing eyeglasses. In some embodiments, the server may receive via theone or more pulse sensors, the pulse waveform data collected from theone or more measurement positions of the known user while wearing anyappropriate wearable device. The one or more measurement positions mayinclude a temple pulse position, a hand pulse position, an eye pulseposition, a neck pulse position, or the like. The pulse waveform data iscollected from the one or more measurement positions at one or morepoints on a body of the known user. The one or more points may includeone or more blood vessel points of the known user.

The one or more pulse sensors may be electronic devices for detectingthe pulse wave of a user from reflected light or transmitted light byirradiating the site of a blood vessel with light having an infrared ornear infrared range. In some embodiments, the pulse wave sensor maycomprise a pair of a light emitting diode (LED) and a phototransistor(photo detector) is attached to a portion of a body to measure the heartrate by calculating the cycle (frequency) of pulse waves from thewaveform of reflected light or transmitted light detected by the abovephoto detector.

In some embodiments, a pulse sensor may be a piezoelectric sensor. Thepiezoelectric sensor may be a capacitive electromechanical transducerthat generate electrical charge in proportion to applied stress. Thepiezoelectric sensor may generate an electrical signal that isproportional to the force caused by blood flow (pulse) in the area ofthe artery or other areas of the body where a pulse could be detected.The piezoelectric sensor may not be mechanically clamped at theirperiphery, and may be sensitive to longitudinal stress. Although thepiezoelectric sensor material is somewhat sensitive to stress appliednormal to its thickness and width, the piezoelectric sensor may bedesigned to be most sensitive to stresses applied normal to its length.

In a next step 1004, a server may store records of biometric pulsesignatures characterizing pulse waveform data collected from known usersin a database. The biometric pulse signature is unique for each knownuser, and may be used to uniquely identify and authenticate a knownuser.

In some embodiments, a server may generate biometric pulse signaturescharacterizing pulse waveform data identifying known users wearingeyeglasses. In some embodiments, the server may generate biometric pulsesignatures characterizing pulse waveform data identifying known userswearing any suitable wearable device. The biometric pulse signaturegenerated for each known user is unique for each known user, and may beused to uniquely identify and authenticate a known user. The biometricpulse signature associated with the known user wearing the eyeglasses orany wearable device may be stored in the database comprising anon-transitory machine readable storage medium configured to store aplurality of biometric pulse signatures associated with a plurality ofknown users. Each of the plurality of biometric pulse signaturesassociated with the plurality of known users may be refined over time,for example, by collecting known user pulse data repeatedly and therebyupdating known user's biometric signature.

In a next step 1006, a server may receive via one or more pulse sensors,pulse waveform data collected from one or more measurement positions ofa new and unknown user (a candidate user). A pulse sensor may be anelectronic device configured for detecting the pulse wave of thecandidate user from reflected light or transmitted light by irradiatingthe site of a blood vessel with light having an infrared or nearinfrared range. The pulse wave sensor may comprise a pair of a lightemitting diode (LED) and a phototransistor (photo detector) is attachedto a portion of a candidate body to measure the heart rate bycalculating the cycle (frequency) of pulse waves from the waveform ofreflected light or transmitted light detected by the above photodetector.

A server may receive via the one or more pulse sensors, the pulsewaveform data collected from the one or more measurement positions ofthe new and unknown user (a candidate user) who is wearing eyeglasses.In some embodiments, the server may receive via the one or more pulsesensors, the pulse waveform data collected from the one or moremeasurement positions of the new and unknown user (a candidate user)wearing any suitable wearable device. The one or more measurementpositions may include a temple pulse position, a hand pulse position, aneye pulse position, a neck pulse position, or the like. The pulsewaveform data is collected from the one or more measurement positions atone or more points on a body of the candidate user. The one or morepoints may include one or more blood vessel points of the candidateuser.

In a next step 1008, a server may initiate a process to authenticate anew user (a candidate user), in response to the server determining thepulse waveform data associated with the new user matches at least onebiometric pulse signature of the plurality of biometric pulse signaturesstored in the system database.

Initially, a server may generate a biometric pulse signaturecharacterizing pulse waveform data identifying a new user wearingeyeglasses. In some embodiments, the server may generate a biometricpulse signature characterizing pulse waveform data identifying a newuser wearing any suitable wearable device. The biometric pulse signaturegenerated for new user is unique for the new user, and may be used touniquely identify and authenticate the new user. For instance, theserver may use the new user pulse data and/or biometric pulse signatureto determine if the new user pulse data and/or the biometric pulsesignature matches any known user records stored in a database. Forexample, the server may compare the biometric pulse signature of the newuser to known users signatures in order to identify the new user.

In a next step 1010, if the new user is identified using the user pulsedata records of the new user, that is, the currently detected user pulsedata (such as biometric pulse signature) of the new is similar to knownuser pulse data, the new user may be granted access to a user computingdevice.

A server may execute software programs/algorithms for unscramblingscrambled data displayed on a screen of a user computing device. Forinstance, the execution of the software programs/algorithms by theserver may result in reconfiguration of the jumbled alphabets of theimage such that information within the image makes sense when the screenof the user computing device is viewed through one or more lenses of thewearable device. In some embodiments, the server may execute softwareprograms/algorithms for unscrambling the scrambled data displayed on thescreen such that a plurality of segments of the image are reconfiguredto original arrangement, and information within the image is readablewhen the screen of the user computing device is viewed through one ormore lenses of the wearable device.

In some embodiments, a server may transmit scrambled data from a usercomputing device to a wearable device. The server may also transmitconfiguration information of a plurality of segments of the scrambleddata to the wearable device. In response to receipt of the configurationinformation of the plurality of segments of the scrambled data, aprocessor of the wearable device causes the configuration of theplurality of segments to be such that the plurality of segments of theimage are reconfigured to original arrangement, and the data in theimage is readable by viewing though the one or more lenses of theeyeglasses.

In some embodiments, a wearable device may include an imaging sensor,which may receive the scrambled data from a server via a user computingdevice. The imaging sensor or a processor of the wearable device maythen generate instructions to execute software programs/algorithms tounscramble the scrambled data. Subsequently, the processor of thewearable device may transmit the unscrambled data to the user computerdevice for display on the screen of the user computing device. In somecases, the processor of the wearable device may transmit the unscrambleddata to a system server, and the system server may then transmit theunscrambled data to the user computer device for display on the screenof the user computing device.

FIG. 11 shows execution of a method showing operations of a distributeddata processing and display system, according to an exemplary method1100. The exemplary method 1100 shown in FIG. 11 comprises executionsteps 1102, 1104, 1106, 1108, 1110, and 1112. However, it should beappreciated that other embodiments may comprise additional oralternative execution steps, or may omit one or more steps altogether.It should also be appreciated that other embodiments may perform certainexecution steps in a different order; steps may also be performedsimultaneously or near-simultaneously with one another. In addition, theexemplary method 1100 of FIG. 11 is described as being executed by asingle server computer, referred to as a system server in this exemplaryembodiment. However, one having skill in the art will appreciate that,in some embodiments, steps may be executed by any number of computingdevices operating in a distributed computing environment. In some cases,a computer executing one or more steps may be programmed to executevarious other, unrelated features, where such computer does not need tobe operating strictly as user computing device or a server describedherein.

In a first step 1102, a server may receive via one or more pulsesensors, pulse waveform data collected from one or more measurementpositions of a new user (candidate user). The pulse waveform data maycorrespond to measurement of a pulse waveform transit time, bloodpressure, respiratory rate, oxygen saturation, and stroke volume in theuser.

In some embodiments, the server may receive via the one or more pulsesensors, the pulse waveform data collected from the one or moremeasurement positions of the new user while wearing eyeglasses. In someembodiments, the server may receive via the one or more pulse sensors,the pulse waveform data collected from the one or more measurementpositions of the new user while wearing any appropriate wearable device.The one or more measurement positions may include a temple pulseposition, a hand pulse position, an eye pulse position, a neck pulseposition, or the like. The pulse waveform data is collected from the oneor more measurement positions at one or more points on a body of the newuser. The one or more points may include one or more blood vessel pointsof the new user.

The one or more pulse sensors may be electronic devices for detectingthe pulse wave of a user from reflected light or transmitted light byirradiating the site of a blood vessel with light having an infrared ornear infrared range. In some embodiments, the pulse wave sensor maycomprise a pair of a light emitting diode (LED) and a phototransistor(photo detector) is attached to a portion of a body to measure the heartrate by calculating the cycle (frequency) of pulse waves from thewaveform of reflected light or transmitted light detected by the abovephoto detector.

In some embodiments, a pulse sensor may be a piezoelectric sensor. Thepiezoelectric sensor may be a capacitive electromechanical transducerthat generate electrical charge in proportion to applied stress. Thepiezoelectric sensor may generate an electrical signal that isproportional to the force caused by blood flow (pulse) in the area ofthe artery or other areas of the body where a pulse could be detected.The piezoelectric sensor may not be mechanically clamped at theirperiphery, and may be sensitive to longitudinal stress. Although thepiezoelectric sensor material is somewhat sensitive to stress appliednormal to its thickness and width, the piezoelectric sensor may bedesigned to be most sensitive to stresses applied normal to its length.

In a next step 1104, a server may generate a biometric pulse signaturecharacterizing pulse waveform data identifying a new user wearingeyeglasses. In some embodiments, the server may generate the biometricpulse signature characterizing pulse waveform data identifying the newuser wearing any suitable wearable device. The biometric pulse signaturegenerated for the new user is unique for the new user, and may be usedto uniquely identify and authenticate the new user.

In a next step 1106, a server may authenticate a new user (a candidateuser), in response to the server determining the pulse waveform dataassociated with the new user matches at least one biometric pulsesignature of the plurality of biometric pulse signatures stored in thesystem database. For instance, a server may use new user pulse dataand/or biometric pulse signature to determine if the new user pulse dataand/or the biometric pulse signature matches any known user recordsstored in a database comprising a non-transitory machine readablestorage medium configured to store a plurality of biometric pulsesignatures associated with a plurality of known users. Each of theplurality of biometric pulse signatures associated with the plurality ofknown users may be refined over time, for example, by collecting knownuser pulse data repeatedly and thereby updating known user's biometricsignature. In response to determining that the biometric pulse signatureassociated with the new user matches at least one biometric pulsesignature of the known user stored in the system database, the serveridentifies and authenticates the new user.

In a next step 1108, if the new user is identified using the user pulsedata records of the new user, that is, the currently detected user pulsedata (such as biometric pulse signature) of the new is similar to knownuser pulse data, a server may grant the new user access to unscrambledcontent on a user computing device. In some embodiments, a serverestablish a wireless connection (such as Bluetooth connection) betweenthe user computing device and the wearable device after theauthentication of the new user. In some embodiments, a wirelessconnection between the user computing device and the wearable device maybe present before the authentication of the new user.

Examples

A server may execute software programs/algorithms for unscramblingscrambled data displayed on a screen of a user computing device. Forinstance, the execution of the software programs/algorithms by theserver may result in reconfiguration of the jumbled alphabets of theimage such that information within the image makes sense when the screenof the user computing device is viewed through one or more lenses of thewearable device. In some embodiments, the server may execute softwareprograms/algorithms for unscrambling the scrambled data displayed on thescreen such that a plurality of segments of the image are reconfiguredto original arrangement, and information within the image is readablewhen the screen of the user computing device is viewed through one ormore lenses of the wearable device.

In some embodiments, a server may transmit scrambled data from a usercomputing device to a wearable device. The server may also transmitconfiguration information of a plurality of segments of the scrambleddata to the wearable device. In response to receipt of the configurationinformation of the plurality of segments of the scrambled data, aprocessor of the wearable device causes the configuration of theplurality of segments to be such that the plurality of segments of theimage are reconfigured to original arrangement, and the data in theimage is readable by viewing though the one or more lenses of theeyeglasses.

In some embodiments, a wearable device may include an imaging sensor,which may receive the scrambled data from a server via a user computingdevice. The imaging sensor or a processor of the wearable device maythen generate instructions to execute software programs/algorithms tounscramble the scrambled data. Subsequently, the processor of thewearable device may transmit the unscrambled data to the user computerdevice for display on the screen of the user computing device. In somecases, the processor of the wearable device may transmit the unscrambleddata to a system server, and the system server may then transmit theunscrambled data to the user computer device for display on the screenof the user computing device.

In a next step 1110, a server may detect via one or more motionsensors/detectors, a movement of the new user or the wearable devicerelative to the user computing device. The one or more motionsensors/detectors may be connected to the user computing device, thewearable device, or may be located at any place in a room where the usercomputing device is situated.

In some embodiments, an electronic motion detector contains an optical,microwave, or acoustic sensor. The changes in the optical, microwave, oracoustic field in the device's proximity are interpreted by theelectronics based on one of the sensor technologies. For example, anultrasonic transducer emits an ultrasonic wave (sound at a frequencyhigher than a human ear can hear) and receivers reflections from nearbynew users. Similar to Doppler radar, detection of the received fieldindicates motion of the new user. The detected Doppler shift is also atlow audio frequencies (for walking speeds of new user) since theultrasonic wavelength of around a centimeter is similar to thewavelengths used in microwave motion detectors. In another example,infrared sensors may be used, which are sensitive to a user's skintemperature through emitted black body radiation at mid-infraredwavelengths, in contrast to background objects at room temperature. Theemitted black body radiation may be used to determine movement of thenew user. In yet another example, a camera may be used detect motion ofa new user in its field of view using software. The camera may beconfigured to record video triggered by motion detection of the user.Since the observed field may be normally illuminated, use of camerasensor may be considered passive technology. However it can also be usedtogether with near-infrared illumination to detect motion of user in thedark, that is, with the illumination at a wavelength undetectable by auser eye.

In a next step 1112, a server upon detecting a movement of new user or awearable device, may then compare a current location of the new user orthe wearable device with respect to the user computing device. Theserver upon determining that a distance between the current location ofthe new user or the wearable device with respect to the user computingdevice is more than a pre-defined threshold range (such as Bluetoothrange), then the server switch off the connection between the usercomputing device and the wearable device. In some embodiments, anemployer of a user operating a user computing device may determine avalue of pre-defined threshold range. The server may also generate andexecute instructions to display scrambled screen on the user computingdevice such that the data on the scrambled screen is not readable forany user.

For example, a server may execute software programs/algorithms forscrambling unscrambled data displayed on a screen of a user computingdevice. For instance, the execution of the software programs/algorithmsby the server may result in configuration of jumbled alphabets of theimage such that information within the image does not make sense whenthe screen of the user computing device is viewed by any user. In someembodiments, the server may execute software programs/algorithms forscrambling the unscrambled data displayed on the screen such that aplurality of segments of the image are configured to an arrangementwhere information within the image is not readable when view by a humanor when the screen of the user computing device is viewed through one ormore lenses of the wearable device.

A server may continuously monitor location and/or movement of the user,and upon identifying that the user has moved within the pre-definedthreshold range, may generate and execute software programs to againauthenticate the user, unlock the screen, unscramble the screen,unscramble the content on the screen such that content is readable froma human, and/or display sensitive data displayed on the screen.

FIG. 12 shows execution of a method showing operations of a distributeddata processing and display system, according to an exemplary method1200. The exemplary method 1200 shown in FIG. 12 comprises executionsteps 1202, 1204, 1206, 1208, and 1210. However, it should beappreciated that other embodiments may comprise additional oralternative execution steps, or may omit one or more steps altogether.It should also be appreciated that other embodiments may perform certainexecution steps in a different order; steps may also be performedsimultaneously or near-simultaneously with one another. In addition, theexemplary method 1200 of FIG. 12 is described as being executed by asingle server computer, referred to as a system server in this exemplaryembodiment. However, one having skill in the art will appreciate that,in some embodiments, steps may be executed by any number of computingdevices operating in a distributed computing environment. In some cases,a computer executing one or more steps may be programmed to executevarious other, unrelated features, where such computer does not need tobe operating strictly as a user computing device or a system serverdescribed herein.

In a first step 1202, a server and/or a user computing device maydisplay on its graphical user interface (GUI) or a monitor screen, animage or a video content. The image and/or the video content may includetextual or visual data/information. The screen may be an output device,which displays information such as the image or the video content inpictorial form.

Initially, when a user computing device is not being operated by anyuser, a screen of the user computing device may be scrambled orscrambled data/content may be displayed on the screen that is unreadableby a human. In some embodiments, the scrambled data may correspond to ashadow around one or more fonts in text data of the image or videocontent such that the text data become unreadable by the human. In someembodiments, the scrambled data may correspond to jumbled letters, whichmay not make any sense to the user. For example, the user computingdevice or a system server may randomly arrange words and letters, andput words or letters in a wrong order so that they do not make sense(even though maintaining the styles and numbers of letters in eachword). The scrambling performed is random and may be undone using one ormore unscrambling techniques.

In some embodiments, scrambled data may correspond to a plurality ofsegments of an image displayed on a screen such that information withinsegmented image is unreadable by a human. A user computing device and/ora system server associated with the user computing device may generateand execute software programs and/or algorithms to divide the displayscreen and/or the image on the screen into multiple segments. Upondividing the display screen and/or the image on the screen into themultiple segments, in one embodiment, the user computing device and/orthe system server may orient each of the segment such that the data inthe segmented image is unreadable by the human. In another embodiment,upon dividing the display screen and/or the image on the screen into themultiple segments, the user computing device and/or the system servercompress each segment such that the data in the segmented image isunreadable by the human. In yet another embodiment, upon dividing thedisplay screen and/or the image on the screen into the multiplesegments, the user computing device and/or the system server overturneach segment such that the data in the segmented image is unreadable bythe human.

In a next step 1204, a server and/or a user computing device may receivea request for a wired or wireless connection from a wearable device. Thewearable device may be a display device in form of eyeglasses, goggles,or any other structure comprising a frame that supports and incorporatesvarious components of the wearable device, as well as serves as aconduit for electrical and other component connections.

A user computing device may transmit a request for the wired or thewireless connection to the wearable device when the wearable device iswithin a range of the user computing device. Each of the user computingdevice and the wearable device may include communication components, oneor more transmitters, and one or more receivers. In one example, atransmitter of a user computing device may first identify and thentransmit a request for connection to a receiver of a wearable device. Inanother example, a transmitter of a wearable device may first identifyand then transmit a request for connection to a transmitter of a usercomputing device.

A transmitter and a receiver may communicate to each other with orwithout communication components. The communications component mayinclude electromechanical components (e.g., processor, antenna) thatallow the communications component to communicate various types of datawith the receivers, transmitters, and/or other components of thetransmitters. In some implementations, communications signals betweenthe transmitter and the receiver may represent a distinct channel forhosting communications. The data may be communicated using thecommunications signals, based on predetermined wired or wirelessprotocols and associated hardware and software technology. Thecommunications component may operate based on any number ofcommunication protocols, such as Bluetooth®, Wireless Fidelity (Wi-Fi),Near-Field Communications (NFC), ZigBee, and others. However, it shouldbe appreciated that the communications component is not limited to thesetechnologies, but may include radar, infrared, and sound devices aswell.

In a next step 1206, a server may connect a user computing device to awearable device. The user computing device may connect to the wearabledevice, in response to the user computing device determining that a setof purported credentials associated with the wearable device receivedfrom the wearable device through communications signals matches a set ofcredentials authenticating the wearable device that are stored in asystem database. For example, after the communication channel betweenthe user computing device and the wearable device is established, thenthe user computing device may generate a graphical user interface (GUI)on the user computing device containing a credentials prompt requestinga user of the wearable device to input a set of user credentials. Insome cases, after the communication channel between the user computingdevice and the wearable device is established, then the user computingdevice may transmit to the wearable device the GUI containing thecredentials prompt. The wearable may then transmit to the user computingdevice, the set of user credentials, in response to the credentialsprompt. The user computing device may then match the set of usercredentials received from the wearable device with a set of credentialsauthenticating the wearable device that are stored in a system database.Once the match is confirmed, then the wearable device and the usercomputing device may be authenticated and connected. In someembodiments, upon the user computing device receiving the set of usercredentials from the wearable device, in response to the credentialsprompt, the user computing device may transmit the set of usercredentials to a system server, which may be directly or indirectlyconnected to the user computing device. The system server may then matchthe set of user credentials received from the wearable device with a setof credentials authenticating the wearable device that are stored in asystem database. Once the match is confirmed, the system server mayauthenticate the wearable device and the user computing device, andconnect them to each other.

In some embodiments, during operation, a user computing device mayreceive a request from a wearable device to become a trusted wearabledevice for allowing a user using the wearable device access to contenton a screen of the user computing device. The request may be generatedin any suitable manner. For example, the user of the wearable devicelogs into a secure display application service installed on the usercomputing device and/or the wearable device where the request isgenerated. The user may log into the secure display application serviceby entering username and/or user ID of a user. When the user enters thelogin details, a request for authorizing the wearable device to becomethe trusted device may be generated, and then transmitted to a usercomputing device and/or a system server.

Upon the receipt of the request by the user computing device and/or theserver, the user computing device and/or the server may implement aseries of security protocols in order to verify the wearable device andthe user. For instance, in a first layer of security protocolimplemented by the user computing device and/or the server, the usercomputing device and/or the server may generate a security code that maybe transmitted to a phone number of a mobile device of the user, and theuser may be requested to read and/or enter the code on an user interfaceof the user computing device. The code may include a secret token, whichmay be, for example, a globally unique identifier (GUID), such as forexample but not limited to a unique string of characters including, butnot limited to letters or numbers or both. In another example, the codemay also include one or more Uniform Resource Locators (URLs). In someembodiments, the code may be associated with an expiry time. The expirytime may be included in the code. The user may then read and enter thecode into an user interface of the user computing device to establishsecure connection and synchronization between the user computing deviceand the wearable device.

In a next step 1208, a server and/or a user computing device maygenerate and execute instructions to adjust a focus value of one or morelenses of a wearable device. A button may be placed on the wearabledevice, and a processor of the wearable device may receive instructionsfrom the server and/or the user computing device to adjust a focus valueof one or more lenses. In some embodiments, the server and/or the usercomputing device may directly activate the button of the wearable deviceto adjust a focus value of one or more lenses.

The server and/or the user computing device may adjust the focus valueof the one or more lenses to synchronize with respect to readability ofthe screen and/or a page displayed on the screen. The user computingdevice may adjust the focus value of the one or more lenses tosynchronize with respect to readability of the screen and/or a pagedisplayed on the screen based on the one or more attributes associatedwith the session. The one or more attributes associated with the sessionmay include an identifier associated with the user computing device, anidentifier associated with the wearable device, and an identifier of oneor more users associated with the wearable device. The server and/or theuser computing device may adjust the focus value of the one or morelenses to synchronize with respect to readability of the screen and/or apage displayed on the screen for each new session based on one or moreattributes associated with each new session.

In some embodiments, a server and/or a user computing device may adjustthe focus value of the one or more lenses to synchronize with respect tothe readability of the screen and/or a page displayed on the screen,based on a current eye position of a user wearing the wearable device.In some embodiments, a server and/or a user computing device may adjustthe focus value of the one or more lenses to synchronize with respect tothe readability of the screen and/or a page displayed on the screen,based on a current eye position of a user wearing the wearable device inaddition to one or more session attributes. The server and/or the usercomputing device may monitor a current eye position of the user usingone or more motion detector and sensor devices. The one or more motiondetector and sensor devices may be directly or indirectly associatedwith the user computing device and/or the server. For example, using theinformation obtained from the motion detector and sensor devices, whenit is determined by the server and/or the user computing device that theuser is looking at the screen based on the current eye position of theuser, then the server and/or the user computing device may adjust thefocus value of the one or more lenses to synchronize with respect toreadability of the screen and/or a page displayed on the screen based onthe current eye position of the user, which is that the user is lookingat the screen.

The one or more motion detector and sensor devices may continuouslymonitor movement of the eyes of the user, and when using informationobtained from the motion detector and sensor devices, it is determinedby the server and/or the user computing device that the user is notlooking at the screen based on the current eye position of the user,then the server and/or the user computing device may adjust the focusvalue of the one or more lenses to synchronize with respect toreadability of the portion of the user computing device which the useris looking at based on the current eye position of the user. Forexample, when using information obtained from the motion detector andsensor devices, it is determined by the server and/or the user computingdevice that the user is looking at a keyboard of the user computingdevice based on the current eye position of the user, then the serverand/or the user computing device may adjust the focus value of the oneor more lenses to synchronize with respect to readability of text on thekeyboard which the user is looking at based on the current eye positionof the user.

In a next step 1210, a user computing device may execute softwareprograms/algorithms for unscrambling the scrambled data displayed on thescreen. For instance, the user computing device may execute softwareprograms/algorithms for unscrambling the scrambled data displayed on thescreen such that the shadow is removed and the one or more fonts in theimage are readable when the screen of the user computing device isviewed through the one or more lenses with adjusted focus value.

In some embodiments, the user computing device may execute softwareprograms/algorithms for unscrambling the scrambled data displayed on thescreen such that jumbled alphabets of the image are reconfigured andinformation within the image makes sense when the screen of the usercomputing device is viewed through one or more lenses of the wearabledevice with adjusted focus value. In some embodiments, the usercomputing device may execute software programs/algorithms forunscrambling the scrambled data displayed on the screen such that aplurality of segments of the image are reconfigured to originalarrangement, and information within the image is readable when thescreen of the user computing device is viewed through one or more lensesof the wearable device with adjusted focus value.

In some embodiments, a user computing device may transmit the scrambleddata to the wearable device. The user computing device may also transmitconfiguration information of the plurality of segments of the scrambleddata to the wearable device. In response to receipt of the configurationinformation of the plurality of segments of the scrambled data, aprocessor of the wearable device causes the configuration of theplurality of segments to be such that the plurality of segments of theimage are reconfigured to original arrangement, and the data in theimage is readable by viewing at the one or more lenses.

In some embodiments, a wearable device may include an imaging sensor,which may receive the scrambled data from the user computing device. Theimaging sensor or a processor of the wearable device may then generateinstructions to execute software programs/algorithms to unscramble thescrambled data. Subsequently, the processor of the wearable device maytransmit the unscrambled data to the user computer device for display onthe screen of the user computing device. In some cases, the processor ofthe wearable device may transmit the unscrambled data to a systemserver, and the system server may then transmit the unscrambled data tothe user computer device for display on the screen of the user computingdevice.

The various illustrative logical blocks, modules, circuits, andalgorithm steps described in connection with the embodiments disclosedherein may be implemented as electronic hardware, computer software, orcombinations of both. To clearly illustrate this interchangeability ofhardware and software, various illustrative components, blocks, modules,circuits, and steps have been described above generally in terms oftheir functionality. Whether such functionality is implemented ashardware or software depends upon the particular application and designconstraints imposed on the overall system. Skilled artisans mayimplement the described functionality in varying ways for eachparticular application, but such implementation decisions should not beinterpreted as causing a departure from the scope of the presentinvention.

Embodiments implemented in computer software may be implemented insoftware, firmware, middleware, microcode, hardware descriptionlanguages, or any combination thereof. A code segment ormachine-executable instructions may represent a procedure, a function, asubprogram, a program, a routine, a subroutine, a module, a softwarepackage, a class, or any combination of instructions, data structures,or program statements. A code segment may be coupled to another codesegment or a hardware circuit by passing and/or receiving information,data, arguments, parameters, or memory contents. Information, arguments,parameters, data, and the like, may be passed, forwarded, or transmittedvia memory sharing, message passing, token passing, networktransmission, or the like.

The actual software code or specialized control hardware used toimplement these systems and methods is not limiting of the invention.Thus, the operation and behavior of the systems and methods weredescribed without reference to the specific software code beingunderstood that software and control hardware can be designed toimplement the systems and methods based on the description herein.

When implemented in software, the functions may be stored as one or moreinstructions or code on a non-transitory computer-readable orprocessor-readable storage medium. The steps of a method or algorithmdisclosed herein may be embodied in a processor-executable softwaremodule, which may reside on a computer-readable or processor-readablestorage medium. A non-transitory computer-readable or processor-readablemedia includes both computer storage media and tangible storage mediathat facilitate transfer of a computer program from one place toanother. A non-transitory processor-readable storage media may be anyavailable media that may be accessed by a computer. By way of example,and not limitation, such non-transitory processor-readable media maycomprise RAM, ROM, EEPROM, CD-ROM or other optical disk storage,magnetic disk storage or other magnetic storage devices, or any othertangible storage medium that may be used to store desired program codein the form of instructions or data structures and that may be accessedby a computer or processor. Disk and disc, as used herein, includecompact disc (CD), laser disc, optical disc, digital versatile disc(DVD), floppy disk, and Blu-ray disc where disks usually reproduce datamagnetically, while discs reproduce data optically with lasers.Combinations of the above should also be included within the scope ofcomputer-readable media. Additionally, the operations of a method oralgorithm may reside as one or any combination or set of codes and/orinstructions on a non-transitory processor-readable medium and/orcomputer-readable medium, which may be incorporated into a computerprogram product.

The preceding description of the disclosed embodiments is provided toenable any person skilled in the art to make or use the presentinvention. Various modifications to these embodiments will be readilyapparent to those skilled in the art, and the generic principles definedherein may be applied to other embodiments without departing from thespirit or scope of the invention. Thus, the present invention is notintended to be limited to the embodiments shown herein but is to beaccorded the widest scope consistent with the following claims and theprinciples and novel features disclosed herein.

While various aspects and embodiments have been disclosed, other aspectsand embodiments are contemplated. The various aspects and embodimentsdisclosed are for purposes of illustration and are not intended to belimiting, with the true scope and spirit being indicated by thefollowing claims.

What is claimed is:
 1. A method, comprising: receiving, by a server, viaone or more pulse sensors, pulse waveform data collected from one ormore measurement positions of a known user while wearing a wearabledevice, wherein the one or more measurement positions comprises at leasta temple pulse position and a wrist pulse position; generating, by theserver, a biometric pulse signature characterizing the pulse waveformdata identifying the known user wearing the wearable device, wherein thebiometric pulse signature associated with the known user wearing thewearable device is stored in a system database comprising anon-transitory machine readable storage medium configured to store aplurality of biometric pulse signatures associated with a plurality ofknown users; receiving, by the server, via the one or more pulsesensors, pulse waveform data collected from the one or more measurementpositions of a new user wearing the wearable device; authenticating, bythe server, the new user, in response to the server determining thepulse waveform data associated with the new user matches at least onebiometric pulse signature of the plurality of biometric pulse signaturesstored in the system database; and transmitting, by the server,instructions to a user computing device to convert scrambled datadisplayed on a screen of the user computing device into unscrambleddata, whereby the screen of the user computing device displays theunscrambled data as a plurality of segments in a predeterminedconfiguration, at least a portion of the segments not readable withoutthe wearable device, and wherein the unscrambled data is readable whenthe screen of the user computing device is viewed through one or morelenses of the wearable device by the new user, the one or more lenseshaving a segment configuration corresponding to the predeterminedconfiguration of the plurality of segments displayed on the usercomputing device.
 2. The method according to claim 1, wherein the one ormore measurement positions further comprises a hand pulse, an eye pulse,and a neck pulse.
 3. The method according to claim 1, furthercomprising: displaying, by the server, a graphical user interface on theuser computing device containing a credentials prompt; and receiving, bythe server, a set of user credentials in response to the credentialsprompt, the set of user credentials comprises user ID and password data.4. The method according to claim 1, wherein the pulse waveform data iscollected from the one or more measurement positions at one or morepoints, wherein the one or more points comprises one or more bloodvessel points.
 5. The method according to claim 1, wherein the usercomputing device comprising the screen configured to display an imagecomprising the scrambled data that is unreadable to a human, and whereinthe scrambled data corresponds to a plurality of segments of the imagethat are configured such that the data in the image is unreadable to thehuman.
 6. The method according to claim 5, wherein converting thescrambled data into the unscrambled data comprises reconfiguring theplurality of segments of the image such that information in the image isreadable when the screen of the user computing device is viewed throughthe one or more lenses.
 7. The method according to claim 1, wherein thewearable device comprises an imaging sensor configured to receive thescrambled data from the user computing device; unscramble the scrambleddata; and transmit the unscrambled data to the user computer device fordisplay on the screen of the user computing device.
 8. The methodaccording to claim 1, further comprising: establishing, by the server, awireless connection between the user computing device and the wearabledevice, wherein the wireless connection is a Bluetooth connection; anddisplaying, by the server, the scrambled screen on the user computingdevice such that the data on the scrambled screen is not readable forthe user in response to detection of movement of the user beyondBluetooth range.
 9. A system, comprising: a system database hosted onone or more servers comprising a non-transitory machine readable storagemedium, the system database configured to store a plurality of biometricpulse signatures associated with a plurality of known users; one or morepulse sensors is configured to collect pulse waveform data from one ormore measurement positions of a known user wearing a wearable device,wherein the one or more measurement positions comprises at least atemple pulse position and a wrist pulse position; and a serverconfigured to: receive the pulse waveform data of the known user fromthe one or more pulse sensors; generate a biometric pulse signaturecharacterizing the pulse waveform data identifying the known userwearing the wearable device, wherein the biometric pulse signatureassociated with the known user wearing the wearable device is stored inthe system database; receive from the one or more pulse sensors, pulsewaveform data collected from the one or more measurement positions of anew user wearing the wearable device; authenticate the new user, inresponse to determining that the pulse waveform data associated with thenew user matches at least one biometric pulse signature of the pluralityof biometric pulse signatures stored in the system database; andtransmit instructions to a user computing device to convert scrambleddata displayed on a screen of the user computing device into unscrambleddata, whereby the screen of the user computing device displays theunscrambled data as a plurality of segments in a predeterminedconfiguration, at least a portion of the segments not readable withoutthe wearable device, and wherein the unscrambled data is readable whenthe screen of the user computing device is viewed through one or morelenses of the wearable device by the new user, the one or more lenseshaving a segment configuration corresponding to the predeterminedconfiguration of the plurality of segments displayed on the usercomputing device.
 10. The system according to claim 9, wherein the oneor more measurement positions further comprises a hand pulse, an eyepulse, and a neck pulse.
 11. The system according to claim 9, whereinthe server is further configured to: display a graphical user interfaceon the user computing device containing a credentials prompt; andreceive a set of user credentials in response to the credentials prompt,the set of user credentials comprises user ID and password data.
 12. Thesystem according to claim 9, wherein the pulse waveform data iscollected from the one or more measurement positions at one or morepoints, wherein the one or more points comprises one or more bloodvessel points.
 13. The system according to claim 9, wherein the usercomputing device comprising the screen configured to display an imagecomprising the scrambled data that is unreadable to a human, and whereinthe scrambled data corresponds to a plurality of segments of the imagethat are configured such that information in the image is unreadable tothe human.
 14. The system according to claim 13, wherein converting thescrambled data into the unscrambled data comprises reconfiguring theplurality of segments of the image such that information in the image isreadable when the screen of the user computing device is viewed throughthe one or more lenses.
 15. The system according to claim 9, wherein thewearable device comprises an imaging sensor configured to receive thescrambled data from the user computing device; unscramble the scrambleddata; and transmit the unscrambled data to the user computer device fordisplay on the screen of the user computing device.
 16. A method,comprising: receiving, by a server, via one or more pulse sensors, pulsewaveform data collected from one or more measurement positions of a userwhile wearing a wearable device, wherein the one or more measurementpositions comprises at least a temple pulse position and a wrist pulseposition; generating, by the server, a biometric pulse signaturecharacterizing the pulse waveform data identifying the user wearing thewearable device; authenticating, by the server, the user, in response tothe server determining the biometric pulse signature associated with theuser matches at least one biometric pulse signature of a known userstored in a system database comprising a non-transitory machine readablestorage medium configured to store a plurality of biometric pulsesignatures associated with a plurality of known users; in response toauthentication of the user, displaying, by the server, on a screen of auser computing device, data, whereby the screen of the user computingdevice displays the unscrambled data as a plurality of segments in apredetermined configuration, at least a portion of the segments notreadable without the wearable device, and wherein the data is readablewhen the screen of the user computing device is viewed through one ormore lenses of the wearable device by the user, the one or more lenseshaving a segment configuration corresponding to the predeterminedconfiguration of the plurality of segments; detecting, by the server,via one or more motion sensors, a movement of at least the user or thewearable device relative to the user computing device; and in responseto detection of movement of the user beyond a pre-defined range,displaying, by the server, scrambled screen on the user computing devicesuch that the data on the scrambled screen is not readable for the user.17. The method according to claim 16, wherein the one or moremeasurement positions further comprises a hand pulse, an eye pulse, anda neck pulse.
 18. The method according to claim 16, wherein the pulsewaveform data corresponds to measurement of a pulse waveform transittime, blood pressure, respiratory rate, oxygen saturation, and strokevolume in the user.
 19. The method according to claim 16, furthercomprising: displaying, by the server, a graphical user interface on theuser computing device containing a credentials prompt; and receiving, bythe server, a set of user credentials in response to the credentialsprompt, the set of user credentials comprises user ID and password data.20. The method according to claim 16, wherein the pulse waveform data iscollected from the one or more measurement positions at one or morepoints, wherein the one or more points comprises one or more bloodvessel points.