Unauthorized viewer detection system and method

ABSTRACT

A system for detecting and responding to an intruding camera. The system includes an electronic media display device having a screen configured to display content, a sensor, and a processing circuit. The processing circuit is configured to obtain information from the sensor, analyze the information to determine a presence of a camera, and edit any displayed content in response to the presence of the camera.

CROSS-REFERENCE TO RELATED PATENT APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.13/711,311, filed Dec. 11, 2012, which was a continuation-in-part ofU.S. patent application Ser. No. 13/621,691, filed Sep. 17, 2012, nowU.S. Pat. No. 8,600,110, issued Dec. 3, 2013, each of which areincorporated herein by reference in their entirety and for all purposes.

BACKGROUND

Many times a person is watching some video or viewing some content on anelectronic display device that he does not want others to know he isviewing. However, due to the nature of viewing an electronic displaydevice, he may never know when a collateral viewer is intruding on hiscontent. Because he may not be aware that other persons or devices arelooking at his electronic display device, his sensitive content may beviewed by others without his permission. Thus, there is a need forimproved systems and methods of detecting intruding viewers ofelectronic displays and automatically editing content accordingly.

SUMMARY

One exemplary embodiment relates to a system for detecting andresponding to an intruding camera. The system includes an electronicmedia display device having a screen configured to display content, asensor, and a processing circuit. The processing circuit is configuredto obtain information from the sensor, analyze the information todetermine a presence of a camera, and edit any displayed content inresponse to the presence of the camera.

Another exemplary embodiment relates to a method of detecting andresponding to an intruding camera. The method includes displayingcontent on an electronic media display device having a screen, obtaininginformation from a sensor, analyzing the information to determine apresence of a camera, and editing any displayed content in response tothe presence of the camera.

Another exemplary embodiment relates to a non-transitorycomputer-readable medium having instructions stored thereon. Theinstructions include instructions for interfacing with an electronicmedia display device having a screen for visual content, instructionsfor obtaining information from a sensor, instructions for analyzing theinformation to determine a presence of a camera, and instructionsediting any displayed content in response to the presence of the camera.The information from the sensor corresponds to the environment aroundthe electronic media display device.

Another exemplary embodiment relates to a system for detecting viewersof a display and responding to an intrusion. The system includes anelectronic media display device configured to display content, a sensor,and a processing circuit. The processing circuit is configured to obtaininformation from the sensor, determine a visibility envelope of theelectronic media display device, analyze the information from the sensorto determine a presence of an intruder within the visibility envelope,distinguish the intruder from an authorized user, and edit any displayedcontent.

Another exemplary embodiment relates to a method for detecting intrudingviewers of a display and responding to an intrusion. The method includesdisplaying content on an electronic media display device, obtaininginformation from a sensor, determining a visibility envelope of thedisplay device, analyzing the information to determine a presence of anintruder within the visibility envelope, distinguishing the intruderfrom an authorized user, and editing any displayed content.

Another exemplary embodiment relates to a method for detecting intrudingviewers of a display of a camera-equipped mobile communication deviceand responding to an intrusion. The method includes obtaining input froma camera of the mobile communication device, determining an area withinwhich a viewer can resolve any visual content, analyzing the input todetermine a presence of an intruder within the area, distinguishing theintruder from an authorized user, and responding to the presence of theintruder by editing the visual content.

Another exemplary embodiment relates to a non-transitorycomputer-readable medium having instructions stored thereon. Theinstructions include instructions to interface with an electronic mediadisplay device that is configured to display content, instructions toobtain information from a sensor, instructions for determining an areawithin which a viewer can resolve any visual content, instructions toanalyze the information to determine a presence of an intruder withinthe area, and instructions for editing the visual content if thepresence of an intruder is detected.

The invention is capable of other embodiments and of being carried outin various ways. Alternative exemplary embodiments relate to otherfeatures and combinations of features as may be generally recited in theclaims.

The foregoing is a summary and thus by necessity containssimplifications, generalizations and omissions of detail. Consequently,those skilled in the art will appreciate that the summary isillustrative only and is not intended to be in any way limiting. Otheraspects, inventive features, and advantages of the devices and/orprocesses described herein, as defined solely by the claims, will becomeapparent in the detailed description set forth herein and taken inconjunction with the accompanying drawings.

BRIEF DESCRIPTION OF THE FIGURES

The invention will become more fully understood from the followingdetailed description taken in conjunction with the accompanying drawingswherein like reference numerals refer to like elements, in which:

FIG. 1 is a schematic diagram of an electronic media display device anda visibility envelope, shown according to an exemplary embodiment.

FIG. 2 is a block diagram of an electronic media display device, asensor, and a processing circuit, shown according to an exemplaryembodiment.

FIG. 3 is a detailed block diagram of a processing circuit, shownaccording to an exemplary embodiment.

FIG. 4 is a schematic diagram of an electronic media display device, asensor, and a processing circuit, shown according to an exemplaryembodiment.

FIG. 5 is a schematic diagram of a visibility envelope, shown accordingto an exemplary embodiment.

FIG. 6 is a schematic diagram of a visibility envelope, shown accordingto an exemplary embodiment.

FIG. 7 is a schematic diagram of a visibility envelope, shown accordingto an alternative embodiment.

FIG. 8 is a schematic diagram of an electronic media display device, asensor, a processing circuit, and a visibility envelope, shown accordingto an alternative embodiment.

FIG. 9 is a flowchart of a process for detecting and reacting to anintruding viewer of an electronic media display device, shown accordingto an exemplary embodiment.

FIG. 10 is a flowchart of a process for detecting and reacting to anintruding viewer of an electronic media display device, shown accordingto an alternative embodiment.

FIG. 11 is a flowchart of a general process for detecting and reactingto an intruding viewer of an electronic media display device, shownaccording to an exemplary embodiment.

FIG. 12 is a flowchart of a process for performing analysis of intrudingviewers of an electronic media display device, shown according to anexemplary embodiment.

FIG. 13 is a schematic diagram of an electronic media display device anda camera, shown according to an alternative embodiment.

FIG. 14 is a flowchart of a general process for detecting and reactingto an intruding camera, shown according to an exemplary embodiment.

FIG. 15 is a flowchart of a process for detecting and reacting to anintruding camera, shown according to an exemplary embodiment.

DETAILED DESCRIPTION

Before turning to the figures, which illustrate the exemplaryembodiments in detail, it should be understood that the application isnot limited to the details or methodology set forth in the descriptionor illustrated in the figures. It should also be understood that theterminology is for the purpose of description only and should not beregarded as limiting.

Referring generally to the Figures, systems and methods for detectingintruding viewers of a display and editing content accordingly are shownand described. A person may be operating an electronic media displaydevice (e.g. a cellular phone, a tablet computer, a laptop computer, aneBook reading device, an ATM machine, a music player, a video player, amedical display, or any other device with an electronic display that isdisplaying content). The electronic media display device may be a fixeddevice or a mobile device. The person may be viewing sensitive content(e.g. private photographs, private videos, financial records, medicalrecords, or any other content that the person may not want other peopleto view). A collateral viewer may be behind the person, in a position toview the content, without the knowledge or permission of the person. Inanother situation the collateral viewer may be holding a still or videocamera, and may be using the camera to capture the screen of theelectronic media display device. In another situation, a camera may bemounted inconspicuously on an building, or on signage, or a vehicle,etc. Utilizing a sensor (e.g. a camera attached to the device, radarsensor, micropower impulse radar (MIR), light detection and rangingtechnology, microphone, ultrasonic sensor, infrared sensor,near-infrared (NIR) sensor, or any other sensor that is capable ofmeasuring the range and/or position of objects) the intruder or cameramay be detected, and action may be taken to prevent the content frombeing resolved.

The intruder may be detected by determining a visibility envelope of theelectronic media display device, and then performing analysis todetermine an intruder's presence and location within the visibilityenvelope. Use of a visibility envelope can be advantageous in order todistinguish intruders who are capable of viewing and recognizing thecontents of the display from ones who are capable of seeing the displaybut not of actually recognizing content displayed on it. By making thisdistinction, the display can take protective action (e.g., editing ormodifying the display contents) only when necessary to prevent contentbeing recognized, and not for the case of intruders who are not withinthe visibility envelope of the display and do not pose a significantthreat to the privacy of the displayed content. This reduction in theuse of protective action can reduce the inconvenience to the user anddisruption of the user's viewing activities that universal protectiveactions would entail. The intruder's presence may be based in part onhis distance from the electronic media display device. The visibilityenvelope may be generated by a processing circuit, which acceptsinformation from a sensor. The information may be of the electronicmedia display device's surroundings. The processing circuit may use theinformation to determine the presence of an intruder within thevisibility envelope based on the distance and viewing angle of theintruder. The processing circuit may perform an analysis of the distanceand viewing angle of the intruder and determine whether action needs tobe taken to edit or change the content that the electronic media displaydevice is displaying. According to an alternative embodiment, indetermining the presence of the intruder, the processing circuit mayalso perform red eye detection analysis, resolution analysis, anddisplay brightness analysis.

The camera may be detected by performing analysis to determine acamera's presence and location within the area around the electronicmedia display device. Because an intruding camera may be able to detectthe screen contents at distances and angles greater than that of humaneyesight (e.g., with a zooming lens, a telephoto lens, etc.), the use ofa visibility envelope as described above may not always be desirable. Insome embodiments, the visibility envelope features may be enable anddisabled as desired by a user, or as necessary for different types ofunauthorized viewer detection (e.g., human intruders, intruding camerasand devices, etc.). Ranges and angles may still be specified to limit anarea in which protective action is taken, and thereby reduce theinconvenience to the user and reduce disruption of the user's viewingactivities. The sensor may provide information to the processing circuitcorresponding to the electronic media display device's surroundings. Theprocessing circuit may use the information to determine the presence ofan intruding camera. The processing circuit may perform an analysis ofthe distance and viewing angle of the intruder and determine whetheraction needs to be taken to edit or change the content that theelectronic media display device is displaying. The processing circuitmay also be configured to take action whenever an intruding camera isdetected, regardless of distance or viewing angle.

The system may be enabled or disabled by a user as the user desires. Thethreshold of when and what action should be taken may be specified by apreference file or by default values. The actions may include editing orchanging of the content (e.g. turning off the display, switching thecontent to another content, degrading the visibility of the content,warning the user with an alert, or any other editing of the content).

For purposes of this disclosure, the term “coupled” means the joining oftwo members directly or indirectly to one another. Such joining may bestationary in nature or moveable in nature and such joining may allowfor the flow of electricity, electrical signals, or other types ofsignals or communication between the two members. Such joining may beachieved with the two members or the two members and any additionalintermediate members being integrally formed as a single unitary bodywith one another or with the two members or the two members and anyadditional intermediate members being attached to one another. Suchjoining may be permanent in nature or alternatively may be removable orreleasable in nature.

Referring to FIG. 1, a visibility envelope 110 is shown. Visibilityenvelope 110 is generated by mobile device 102 having a sensor 108,electronic media display 106, and processing circuit 104. Sensor 108 maybe a camera, or other appropriate sensor. Electronic media display 106may be an LCD screen, an e-Paper screen, or any other electronic mediadisplay capable of displaying content. Mobile device 102 is shown as acellular phone, but it may be a tablet computer, a portable movieplayer, or other mobile devices. The systems and methods of the presentdisclosure are not limited based on the type of mobile device, the typeof the sensor, type of electronic media display, or the type ofprocessing circuit.

User 112 is shown as operating mobile device 102. Electronic mediadisplay 106 may be showing textual content, video content,photographical content, or any other type of electronic content. Thesystems and methods of the present disclosure are not limited based onthe type of electronic content being displayed.

Visibility envelope 110 is shown as being generated for a certain range.Viewer 116 and intruder 114 are shown. Viewer 116 is depicted as beingtoo far away from the electronic media display 106 to resolve thecontent on the screen thereof, and thus outside of visibility envelope110. Intruder 114 is depicted as being within visibility envelope 110.The systems and methods of the present disclosure are not limited basedon the number or position of viewers and intruders. As an example, anintruder may be within the visibility envelope, and thus any contentbeing displayed by electronic media display 106 may be removed or editedto stop the intruder from viewing the content. However, in the sameexample, another viewer may be too far out of range, and not within thevisibility envelope. The system may not react to the presence of the outof range viewer.

Referring to FIG. 2, a block diagram of a system 100 for executing thesystems and methods of the present disclosure is shown. System 100includes sensor 200 for detecting information about the environmentaround system 100. The information that sensor 200 detects may beprovided to processing circuit 300. Processing circuit 300 may processthe information, generate a visibility envelope, use the processedinformation to determine the location and threat of any intrudingviewers within the visibility envelope, and make a determination ofwhether or not to edit content on electronic media display 400. Sensor200 may be coupled to electronic media display 400, and processingcircuit 300 may be coupled to electronic media display 400. Whiledepicted as separate modules in FIG. 2, sensor 200, processing circuit300, and electronic media display 400 may be part of one device. Forexample, sensor 200 may be the camera of a camera-equipped cellularphone, processing circuit 300 may be the processor or a separate modulewithin the cellular phone, and electronic media display 400 may be thedisplay of the cellular phone. As another example, sensor 200 may be thecamera of a camera-equipped laptop, processing circuit 300 may be theprocessor within the laptop, and electronic media display 400 may be theLCD display of the laptop.

Referring now to FIG. 3, a more detailed block diagram of processingcircuit 300 for completing the systems and methods of the presentdisclosure is shown, according to an exemplary embodiment. Processingcircuit 300 may be processing circuit 104 of FIG. 1. Processing circuit300 is generally configured to accept input from an outside source (e.g.a sensor, a camera, etc.) in addition to other information (e.g.configuration data, preference data files, etc.). Input may be acceptedcontinuously or periodically. In one embodiment, processing circuit 300is then configured to use the accepted information to analyzeinformation related to the environment, determine a visibility envelope,analyze the visibility envelope and determine intruders, determine ifany content should be edited, and control the editing of content. Inanother embodiment, processing circuit is configured to use the acceptedinformation to analyze information related to the environment, analyzeinformation and determine the presence of cameras, determine if anycontent should be edited, and control the editing of content. It isenvisioned that a device implementing the systems and methods disclosedherein may utilize either configuration (i.e., enabling or disablingvisibility envelope features per a configuration file, user preferences,or based on location or time, etc.). As an example, a device may firstscan for intruding viewers using a visibility envelope and then performa subsequent scan for intruding cameras without using a visibilityenvelope. In another example, a device may provided GPS coordinates toprocessing circuit 300, and processing circuit may enable or disablevisibility envelope features based on where a user is presently located.Settings stored within configuration data 312 or preference data 310 maybe used to control visibility envelope activation. In one embodiment, adevice implementing the systems and methods herein may perform a scanfor both intruding viewers and intruding cameras simultaneously.

Processing circuit 300 includes processor 318. Processor 318 may beimplemented as a general purpose processor, an application specificintegrated circuit (ASIC), one or more field programmable gate arrays(FPGAs), a group of processing components, or other suitable electronicprocessing components. Processing circuit 300 also includes memory 302.Memory 302 is one or more devices (e.g., RAM, ROM, Flash Memory, harddisk storage, etc.) for storing data and/or computer code forfacilitating the various processes described herein. Memory 302 may beor include non-transient volatile memory or non-volatile memory. Memory302 may include database components, object code components, scriptcomponents, or any other type of information structure for supportingthe various activities and information structures described herein.Memory 302 may be communicably connected to the processor 318 andinclude computer code or instructions for executing the processesdescribed herein (e.g., the processes shown in FIGS. 9-13).

Memory 302 includes memory buffer 304. Memory buffer 304 is configuredto receive data from a sensor, (e.g. sensor 200) through input 320. Thesensor data may include image or video data, or radar information, lightdetection and ranging information, infrared information, sonic orultrasonic information, or content information (e.g., contentinformation related to electronic media display 400). The image or videodata, for example, may be photographs taken by sensor 108. The datareceive through input 320 may be stored in memory buffer 304 untilmemory buffer 304 is accessed for data by the various modules of memory302. For example, the visibility envelope module may access the image orvideo data that is stored in memory buffer 304.

The memory 302 further includes configuration data 312. Configurationdata 312 includes data relating to processing circuit 300. For example,configuration data 312 may include information relating to interfacingwith an electronic media display. This may include the command setneeded to interface with graphic display components, for example agraphics processing unit (GPU). As another example, the configurationdata 312 may include information as to how often input should beaccepted from sensor 200 and how often the environment should be scannedfor intruders or cameras. As another example, configuration data 312 mayinclude data to configure the communication between the variouscomponents of processing circuit 300.

Memory 302 further includes user interface module 306. User interfacemodule 306 is configured to receive input data through input 320. Userinterface module 306 is further configured to interpret the data for theother modules of processing circuit 300. For example, user interfacemodule 306 may receive a cancel request, wherein a user requests an endto editing of the content, and user interface module 306 may beconfigured to receive that request and provide appropriate commands toedit generation module 316 to cease editing. User interface module 306may also generate a user interface to allow a user to control editgeneration module 316, as well as edit preference data 310. As anotherexample, the user interface module may receive a request to beginscanning for intruders, and user interface module 306 may be configuredto use that request and provide appropriate commands to enable thesystem.

Memory 302 further includes modules 308, 310, 314, and 316, forexecuting the systems and methods described herein. Modules 308, 310,314, and 316 are configured to receive image and video data, sensorinformation, radar information, light detection and range information,infrared information, sonic or ultrasonic information, preference data,and other data as provided by processing circuit 300. Modules 308, 310,314, and 316 are configured to analyze the data, optionally generate avisibility envelope, determine viewers and their characteristics (range,location, etc.), determine whether intruders are present within thevisibility envelope limits, use the data to determine if cameras arepresent within the area around the display, and determine whether toedit content on an electronic media display.

Visibility envelope module 314 is configured to receive range and angleinformation. The information may be provided by configuration data 312,or by preference data 310. Visibility envelope module 314 is configuredto interpret the range and angle information and determine a visibilityenvelope based on the information. The visibility envelope may be arepresentation of a danger zone of the device. For example, anyperson(s) within the visibility envelope may be classified as intruders,and may have the potential of being able to resolve content ofelectronic media display 300. Visibility envelope module 314 may beenable or disabled depending on the type of scan being performed. Forexample, when intruding viewers are to be detected, visibility envelopemodule 314 may be enabled. In another example, when intruding camerasare to be detected, visibility envelope module 314 may be disabled andbypassed. In practice, intruder analysis module 308 may choose to eitherutilize or not utilize the generated visibility envelope depending onwhat type of intrusion (e.g., human, camera, etc.) is to be detected.Such a configuration allows for simultaneous detection of humanintruders and camera intruders using a single source data set, where oneset of constraints (e.g. the visibility envelope) is applied whengenerating detection information related to human intruders, and anotherset of constraints (e.g., bypassing visibility the envelope) whengenerating detection information related to cameras. In one embodimentthat is directed solely toward detecting intruding camera, visibilityenvelope module 314 may be absent from processing circuit 300.

In an exemplary embodiment, visibility envelope module 314 receives fromconfiguration data 312 a range R_(m1) and a viewing angle θ_(m1). RangeR_(m1) represents a maximum range over which an electronic media display(e.g. electronic media display 400) may be viewed such that theelectronic media display's contents may be resolved. Viewing angleθ_(m1) represents a maximum angle over which an electronic media display(e.g. electronic media display 400) may be viewed such that theelectronic media display's contents may be resolved. Range R_(m1) andviewing angle θ_(m1) may correspond to the specifications of theelectronic media display. Visibility envelope module 314 may provide thevisibility envelope information R_(m1) and θ_(m1) to intruder analysismodule 308. While the discussion of the visibility envelope herein isgenerally in terms of independent bounds on range, R_(m1), and viewingangle, θ_(m1), in some embodiments, the visibility envelope can be givenby a functional relationship, such as R_(m1)(θ_(m1)), in which the rangeis a function of the viewing angle, θ_(m1). For instance, R_(m1) can belarger for θ_(m1)=0, than for θ_(m1)=20°. In some embodiments, thevisibility envelope depends on a two dimensional viewing angle (e.g., onazimuth and elevation) relative to the display's axes, not simply on thepolar angle from the display's normal vector, θ_(m1).

In another exemplary embodiment, visibility envelope module 314 receivesfrom preference data 310 a range R_(m2) and a viewing angle θ_(m2). Theviewing angle R_(m2) represents a maximum range specified by a user foranalysis. The viewing angle θ_(m2) represents a maximum angle specifiedby a user for analysis. For example, a user may not be concerned aboutany viewers more than a certain angle to the side of his device, and canspecify as such in the preferences. As another example, a user may notbe concerned about viewers who are greater than a certain distance awayfrom the device, and can specify as such in the preferences. Visibilityenvelope module 314 may provide the visibility envelope informationR_(m2) and θ_(m2) to intruder analysis module 308.

In one embodiment, visibility envelope module 314 receives fromconfiguration data 312 a range R_(m3) and a viewing angle θ_(m3). RangeR_(m3) represents a maximum range over which an electronic media display(e.g. electronic media display 400) may be viewed such that theelectronic media display's contents may be resolved. Viewing angleθ_(m3) represents a maximum angle over which an electronic media display(e.g. electronic media display 400) may be viewed such that theelectronic media display's contents may be resolved. Additionally,visibility envelope module 314 receives a brightness level B of theelectronic media display's brightness level. Visibility envelope module314 then adjusts R_(m3) and θ_(m3) according to brightness B. Forexample, if the electronic media display's brightness is at a maximumlevel, R_(m3) and θ_(m3) may be increased, and if the electronic mediadisplay's brightness is at a minimum level, R_(m3) and θ_(m3) may bedecreased. Additionally, visibility envelope module 314 receives abrightness level B_(a) of the ambient environment's brightness leveland/or its polarization. Visibility envelope module 314 then adjustsR_(m3) and θ_(m3) according to brightness B_(a). For example, if theambient brightness is at a maximum level, R_(m3) and θ_(m3) may bedecreased, and if the ambient brightness is at a minimum level, R_(m3)and θ_(m3) may be increased. Visibility envelope module 314 may providethe adjusted visibility envelope information R_(m3′) and θ_(m3′) tointruder analysis module 308.

In one embodiment, visibility envelope module 314 receives fromconfiguration data 312 a range R_(m4) and a viewing angle θ_(m4). RangeR_(m4) represents a maximum range over which an electronic media display(e.g. electronic media display 400) may be viewed such that theelectronic media display's contents may be resolved. Viewing angleθ_(m4) represents a maximum angle over which an electronic media display(e.g. electronic media display 400) may be viewed such that theelectronic media display's contents may be resolved. Additionally,visibility envelope module 314 receives a content type description ofthe primary content type that is being displayed on the electronic mediadisplay. Visibility envelope module 314 then adjusts R_(m4) and θ_(m4)according to the content type. For example, if the content type isphotographical content, R_(m4) and θ_(m4) may be increased. If thecontent type is textual content, R_(m4) and θ_(m4) may be decreased.Visibility envelope module 314 may provide the adjusted visibilityenvelope information R_(m4′) and θ_(m4′) to intruder analysis module308.

Intruder analysis module 308 receives visibility envelope informationfrom visibility envelope module 314, and intruder analysis module 308receives a user preference file from preference data 310. Additionally,intruder analysis module 308 receives sensor information, which isprovided by the sensor (e.g. sensor 200) through input 320. In anembodiment that utilizes the visibility envelope features describedherein, intruder analysis module 308 uses the received visibilityenveloped information in performing its analysis. Intruder analysismodule 308 scans the input for viewers, and classifies them as eitherintruders or safe viewers. Intruder analysis module 308 also scans theinput for cameras or camera-equipped devices (e.g., SLR cameras,camera-equipped cellular phones, point-and-shoot cameras,building-mounted camera systems, etc.). Intruder analysis module 308 mayclassify an object as a viewer or camera using any number of detectionalgorithms. For example, intruder analysis module 308 may apply motiondetection algorithms on the sensor information, and may classify anymoving object as a viewer. As another example, intruder analysis module308 may apply shape detection algorithms that scan the sensorinformation for lens (e.g., circular) shapes. As another example,intruder analysis module 308 may apply shape detection algorithms thatscans the sensor information to determine whether a detected camera hasa lens cap emplaced; in this case it may not be considered as anintruder. As another example, intruder analysis module 308 may applyshape detection algorithms that scans the sensor information todetermine the orientation of a detected camera. The camera's orientationmay include an angle between the camera's imaging direction and a lineof sight from the camera to the electronic media display device. Thecamera's status as an intruder may be based on whether or not it ispointing towards the electronic media display device. As anotherexample, intruder analysis module 308 may apply facial recognitionalgorithms on the sensor information, and may classify any detectedfaces as viewers. As another example, intruder analysis module 308 maycompare an object to a database of camera specification information, andmay implement pattern matching algorithms using the object's dimensionsor characteristics.

Intruder analysis module 308 analyzes any detected viewers to determineeach viewer's range and location information. A viewer's range andlocation information may be determined by any number of range-findingand location-finding algorithms. The systems and methods of the presentdisclosure are not limited based on the type of range-finding andlocation-finding algorithms. Intruder analysis module 308 may compare aviewer's range and location to the bounds of the visibility envelope.For example, if a viewer's range is greater than the visibilityenvelope's range, intruder analysis module 308 may not classify theviewer as an intruder. As another example, if a viewer's location issuch that the viewer has a viewing angle greater than the visibilityenvelope's maximum viewing angle, intruder analysis module 308 may notclassify the viewer as an intruder. As another example, if a viewer islocated 20 ft. from the display device, and the visibility envelope hasa maximum range of 15 ft., the viewer would not be classified as anintruder. For viewers that are within the bounds of the visibilityenvelope, intruder analysis module 308 may perform additional analysisas discussed below.

Intruder analysis module 308 may use any number of algorithms todetermine that the user is not an intruder. As a simple example,intruder analysis module 308 may classify the closest viewer as a safeuser. As another example, intruder analysis module 308 may classify apartially obscured viewer as an intruder. As another example, intruderanalysis module 308 may determine demographics of the viewer (e.g., age,sex, race) and compare these to those of safe user demographics asspecified by a user preferences file to classify the viewer as either asafe user or as an intruder; for instance all children within thevisibility envelope may be classified as intruders. As another example,intruder analysis module 308 may apply additional facial recognitionalgorithms on any detected viewers. Intruder analysis module 308 maycompare a detected viewer's face to a set of safe user faces asspecified by a user preferences file (e.g. preference data 310).Intruder analysis module 308 may then determine whether the detectedviewer has a face that is within the set of safe user faces, if so,intruder analysis module 308 may not classify that viewer as anintruder. Intruder analysis module 308 may further use algorithms todetect the eye-state or red-eye response of a viewer. Intruder analysismodule 308 may use the eye information to restrict classifying a viewerwith closed eyes as an intruder. Intruder analysis module 308 may thenprovide the results of the analysis to edit generation module 316.

Intruder analysis module 308 analyzes any detected cameras to determineeach camera's range and location information. A camera's range andlocation information may be determined by any number of range-findingand location-finding algorithms. The systems and methods of the presentdisclosure are not limited based on the type of range-finding andlocation-finding algorithms. Intruder analysis module 308 may compare acamera's range and location to the bounds stored within a preferencesfile (e.g., configuration data 312, preference data 310) or compare acamera's range and location data to default values. For example, if acamera's range is greater than the maximum range, intruder analysismodule 308 may not consider a camera as an intruder. As another example,if a camera's location is such that the camera it at an angle greaterthan a specified maximum viewing angle, intruder analysis module 308 maynot classify the camera as an intruder. Intruder analysis module 308provides the results of this analysis to edit generation module 316.

In one embodiment, intruder analysis module 308 may receive input viainput 320 from a sensor that is a single camera. The input may be ofimage information, and may include the camera's focal length for theparticular image. Intruder analysis module 308 may also receiveinformation from configuration data 312 of the camera's specifications.Intruder analysis module 308 may detect viewers as discussed above, andthen determine a viewer's range based on the angular size of theintruder (or portions thereof). For example, the size of some portionsof the human body (e.g., facial width, or eye-to-eye separation) arerelatively constant for most people. Accordingly, a priori knowledge ofthis physical size, combined with the angular size as measured by acamera, allows intruder analysis module 308 to infer a range estimate.Intruder analysis module 308 may detect viewers as discussed above, andthen determine a viewer's range based on focusing algorithms. Forexample, intruder analysis module 308 may use the focal length necessaryfor focus in conjunction with the camera's specifications to calculate adistance. As another example, intruder analysis module may use contrastdetection and phase detection algorithms to focus the image. Intruderanalysis module 308 may use the calculated distance and the imageinformation to determine a viewing angle of a viewer. Intruder analysismodule 308 may then use the calculated distance and viewing angle inanalyzing the viewer as discussed above. As another example, intruderanalysis module 308 may use the ability of the camera to resolvefeatures of the viewer in order to infer the ability of the viewer toresolve visual contents displayed on the screen, i.e., if the cameracannot clearly resolve the viewer, the intruder analysis module 308 mayassume the converse, and not classify him as an intruder. This analysismay involve a priori knowledge of typical human visual acuity (which maybe dependant upon the ambient lighting conditions) as well as theimaging resolution capabilities of the camera and the quality of theimage it obtains of the viewer.

In one embodiment, intruder analysis module 308 receives input via input320 from a sensor that contains two cameras. The input may be of imageor video information. Intruder analysis module 308 may also receivecamera specification information from configuration data 312. Using thetwo camera input, intruder analysis module 308 may use stereoscopicalgorithms to calculate the range of a viewer. Intruder analysis module308 may use the calculated range and the image or video information todetermine a viewing angle of a viewer. Intruder analysis module 308 mayuse the calculated range and viewing angle in analyzing the viewer asdiscussed above.

In one embodiment, intruder analysis module 308 may receive input viainput 320 from a sensor that contains a camera and distance measuringdevice (e.g., a sonic or ultrasonic device, a microphone, an infrareddevice, a micropower impulse radar device, a light detection and rangingdevice etc.) The input may be of image or video information and distanceinformation. Intruder analysis module 308 may also receive cameraspecification information from configuration data 312. Intruder analysismodule 308 may use the distance information to determine a range of aviewer. Intruder analysis module 308 may then use the range and theimage or video information to determine a viewing angle of a viewer.Intruder analysis module 308 may use the range and viewing angle inanalyzing the viewer as discussed above.

In one embodiment, intruder analysis module 308 may receive contentinformation, in addition to input from a sensor. The content informationmay be of a content type that is being primarily displayed. For example,a content type may be of “text” or “video.” Intruder analysis module mayuse the content type information in addition to analyzing the viewer asdiscussed above. For example, if the content being displayed on anelectronic media display is text of a small font, the range in which aviewer is considered an intruder may be decreased due to the difficultyof reading small text at a distance. As another example, if the contentbeing displayed is an image, the range in which a viewer is consideredan intruder may be increased due to the ease of viewing an image.

Edit generation module 316 is configured to receive data from intruderanalysis module 308. Edit generation module 316 is further configured toprovide communication capabilities with an electronic media display viainput 320 and output 322. The data may include results from any analysisperformed by intruder analysis module 308. Edit generation module 316may determine whether to perform edits to content on an electronic mediadisplay (e.g., electronic media display 400). For example, the data mayindicate the presence of intruders (e.g., intruding viewers, intrudingcameras), and edit generation module 316 may then determine that contentmust be edited. Edit generation module 316 may accept informationcorresponding to the contents displayed on an electronic media display.Edit generation module may then provide the commands for editing thecontent and transmit the commands via output 322.

As an example, edit generation module 316 may provide commands todegrade the visibility of the electronic media display content (e.g.blurring the content of the electronic media display, dimming thebrightness of the content of the electronic media display, reducing thefont size of the content of the electronic media display, switching thecontent of the electronic media display to a new content, stopping (orrefusing to start) the display of the content of the electronic mediadisplay device, etc.) As another example, edit generation module 316 mayprovide commands necessary for warning the user with an alert message,by playing an alert sound, or by muting the sound. As another example,the alert may involve haptic feedback (e.g., a vibration), or visualalert indication (e.g., flashes, color changes). As another example, thedata from intruder analysis module 308 may indicate the lack of anyintruders, and edit generation module 316 may then determine that thecontent should be displayed unedited and may not send any commands toedit content, or may send commands to cease any editing that isoccurring.

In one embodiment, edit generation module 316 may generate commands toswitch content displayed on an electronic media display (e.g.,electronic media display 400) to new content in real time. For example,electronic media display 400 may be the display of a cellular phone, anda user may be watching a film that is not appropriate for children onthe cellular phone. A child may walk up behind the display, and editgeneration module 316 may send commands to switch the film to a blankstream of white frames with no audio. In another example edit generationmodule 316 may send commands to pause the film and blur the display. Inanother example edit generation module 316 may send commands to pausethe film and dim the brightness of the display.

In one embodiment, edit generation module 316 may generate commands tomute the audio of an electronic media display device (e.g., electronicmedia display device 402 of FIG. 4). For example, electronic mediadisplay device 402 may be a camera equipped cellular phone, and a usermay be making a video call with speakerphone enabled. An intruder maywalk up behind the device, and edit generation module 316 may producecommands to mute the audio output of the cellular phone. In thisfashion, the audio of the video call would be muted before the intrudercan actively hear the discussion.

In an alternative embodiment, edit generation module 316 may generatecommands to freeze the current content displayed on an electronic mediadisplay (e.g., electronic media display 400). This may be useful as partof a parental control system. For example, electronic media display 400may be the display of a laptop computer, and a parent may set the userpreferences to freeze the screen if an intruder is detected. The parentmay have not added his or her face to a list of safe users. The parentmay walk up behind the display when the display is being used by achild, and edit generation module 316 may send commands to freeze thecontents of the display. In this fashion, the parent may see what thechild was viewing before the child can actively change the content.

Preference data 310 may be stored in a database local to or remotelyfrom processing circuit 300, or may be received via a preference filetransmitted to processing circuit 300 via input 320. Preference data 310relates to user preferences for the visibility envelope module 314,intruder analysis module 308, and edit generation module 316. Using apreference file stored in preference data 310, the constraints of avisibility envelope may be customized for a user. Additionally, a safeuser may be specified for use in determining an intruder. A user'spreferred content editing methods (e.g. blurring the screen, etc.) mayalso be specified and stored in the preference file. For example, if auser is in a particularly sensitive environment, the user may increasethe range in which a viewer is considered an intruder.

Processing circuit 300 further includes an input 320 and an output 322.Input 320 may be configured to receive image information, videoinformation, content information, preference file information, and otherinformation relating to the determination of a visibility envelope,performing intruder analysis, and editing content as described above.Output 322 may be configured to provide an output to a client,electronic display, or other electronic device as described above.Outputs may include commands, data including image sequences, preferencefile information, and other information related to editing content asdescribed above. Outputs may involve recording the time and/or locationof an intrusion event, an image of the intruder, the position of theintruder relative to the device, the determination of the viewer aseither a safe viewer or as an intruder, the editing action taken, orother information related to the event.

Referring generally to FIGS. 4-14, various schematic diagrams andprocesses are shown and described that may be implemented using thesystems and methods described herein. The schematic diagrams andprocesses may be implemented using the system 100 of FIG. 2 andprocessing circuit 300 of FIG. 3.

Referring to FIG. 4, a schematic diagram of an electronic media displaydevice, a sensor, and a processing circuit is shown according to oneembodiment. Electronic media display device 402 is shown ascamera-equipped cellular phone. Sensor 404 is shown as a camera that iscoupled to electronic media display device 402. Processing circuit 300is shown as internal processing components. Processing circuit 300contains modules and components as describe above. While FIG. 4 onlyshows one camera as a sensor, it should be understood that sensor 402may be any of the sensors discussed above. Coupling sensor 402 andprocessing circuit to electronic media display device 402 allows forportability of the system.

As an exemplary embodiment, electronic media display device 402 may be atablet computing device. Sensor 404 may be an onboard camera that iscoupled to the tablet computer. Processing circuit 300 may be theprocessing components of the tablet computer that are configured toimplement the systems and methods described herein.

Referring to FIG. 5, a schematic diagram of a sensor 502 andcorresponding visibility envelope 500 is shown. Analysis performed byintruder analysis module 308 of processing circuit 300 is depicted asangle 504 and distance 506. An intruder 508, maximum viewing angle 510,and maximum viewing range 512 are also depicted. According to anexemplary embodiment, angle 510 and range 512 may correspond to thespecifications of an electronic media display device. For example, aparticular mobile LCD display may have a maximum viewing angle of 160°and a maximum resolvable viewing distance of 15 ft. According to analternative embodiment, angle 510 and range 512 may be offset withvalues as specified by a user preferences file. According to anexemplary embodiment, angle 504 is be calculated as the angle between acenter axis and the position of a viewer 508. The center axis may bepositioned midway within the maximum viewing angle.

Referring to FIG. 6, a schematic diagram of a sensor 602 andcorresponding visibility envelope 600 is shown. Analysis performed byintruder analysis module 308 of processing circuit 300 is depicted asangles 606, 608, and 610, and distances 614, 616, and 618. User 620,viewers 622, 624 and 626, maximum viewing angle 604, and maximum viewingrange 612 are also depicted. According to an exemplary embodiment, angle604 and range 612 correspond to the specifications of an electronicmedia display device. According to an alternative embodiment, angle 604and range 612 may be offset with values as specified by a userpreferences file. As shown in FIG. 6, viewer 626 is shown as having arange 616 that is greater than the maximum resolvable viewing range 612.For example, viewer 626 may be positioned 25 ft. from sensor 602, whichis coupled to an electronic media display that has a maximum viewingrange of 15 ft. In this example, viewer 626 would not be considered anintruder. Similarly, viewer 624 may be positioned at an angle that isgreater than half of the display's maximum viewing angle. Viewer 624would not be considered an intruder. However, viewer 622 is a positionedat a range that is less than maximum viewing range 612, and at an anglethat is less than half of the maximum viewing angle 612. Viewer 622would be considered an intruder.

Referring to FIG. 7, a schematic diagram of a sensor 702 andcorresponding visibility envelope 700 is shown. Analysis performed byintruder analysis module 308 of processing circuit 300 (as is shown inFIG. 3) is depicted as angles 706, and 710, and distances 708 and 712.Additionally, analysis related to eye detection is also depicted at 718.Viewers 716 and 720, maximum viewing angle 704 and maximum viewing range714 are also depicted. According to an exemplary embodiment, angle 704and range 714 correspond to the specifications of an electronic mediadisplay device. Both viewers 716 and 720 are shown as within viewingenvelope 700. However, viewer 720 has his or her eyes 722 closed, or maybe turned around looking the other way. For example, a viewer may besleeping. Viewer 716 has his or her eyes 718 open. In an alternativeembodiment, an intruder analysis module such as intruder analysis module308 may use this information in determining if a viewer is an intruder.For example, if a red eye response cannot be determined for a viewer,that viewer may not be classified as an intruder. As shown in FIG. 7,viewer 716 would be classified as an intruder, but viewer 720 would not.As an example, algorithms that may be used to detect open eyes includered-eye response algorithms, and other facial recognition algorithms.

Referring to FIG. 8, a schematic diagram of shows electronic mediadisplay device 802, sensor 806, processing circuit 300 (as is shown inFIG. 3), and visibility envelope 800. According to an exemplaryembodiment, the electronic media display device is part of an ATMmachine. Sensor 806 may be a camera that is coupled to the ATM machine,and processing circuit 300 may be the processing components of the ATMmachine. User 810 is shown as operating the ATM machine, and viewer 812is shown as being within visibility envelope 800. Contents of electronicmedia display device 802 are shown as blurred 814. By automaticallyblurring the contents of the display, sensitive content can be protectedfrom being viewed by unauthorized viewers. Similar embodiments are alsouseful in situations where sensitive content is displayed. For example,a medical display device that displays or gathers information about auser's medical history.

Referring to FIG. 9, a flow diagram of a process 900 for detecting anintruding viewer of a camera-equipped electronic media display deviceand editing content is shown, according to an exemplary embodiment.Process 900 includes capturing an image of the electronic media displaydevice's surroundings using a camera (step 902), determining avisibility envelope (step 904), and analyzing the captured image andvisibility envelope information to determine if an intruder is present(step 906). If a viewer is present (step 908), and the viewer is withinthe visibility envelope (step 910), and the content on the screen is notalready edited (step 912), the content on the electronic media displaydevice is edited or changed (step 914). However, if the viewer is notdetermined to be an intruder, and the content is already edited (step918), it is safe to reset any previous edits and display uneditedcontent again (step 916). If an intruder is detected and the content isalready edited, no further action needs to be taken (step 912).

Referring to FIG. 10, a flow diagram of a process 1000 for detecting anintruding viewer of camera-equipped electronic media display device andediting content according to a user preference file is shown, accordingto an exemplary embodiment. Process 1000 includes receiving a userpreference data file (step 1002), capturing an image of the electronicmedia display device's surrounding using the camera (step 1004),determining a visibility envelope (step 1006), and analyzing thecaptured image and visibility envelope information to determine if anintruder is present (step 1008). If a viewer is present (step 1010), andthe viewer is within the visibility envelope (step 1012), and thecontent on the screen is not already edited (step 1014), content on theelectronic media display device is edited or changed (step 1016).However, if the viewer is not determined to be an intruder, and thecontent is already edited (step 1020), it is safe to reset any previousedits and display unedited content again (step 1018). If an intruder isdetected and the content is already edited, no further action needs tobe taken (step 1014).

Referring to FIG. 11, a flow diagram of a general process 1100 fordetecting and reacting to an intruding viewer of an electronic mediadisplay device is shown according to an exemplary embodiment. Process1100 includes obtaining information from a sensor (step 1102),determining a visibility envelope based on the sensor and inputinformation (step 1104), performing analysis to determine a presence ofan intruder within the visibility envelope (step 1106), and editing orchanging content on a display device if an intruder is detected (step1108).

Referring to FIG. 12, a flow diagram of a process 1200 for performingintruder analysis is shown, according to an exemplary embodiment.Process 1200 includes detecting all viewers of a display device (step1202) and performing the following steps for each detected viewer:determining the viewer's range from the display device (step 1204),determining the viewer's angle with respect to the display device (step1206), performing additional analysis (step 1208), and comparing theanalyzed information to a visibility envelope to determine if the vieweris an intruder and is a threat to the display device's content (step1210). Step 1208 may include performing additional operations inaddition to those performed in steps 1204 and 1206. For example, asystem may be configured to perform red eye analysis to determine if aviewer can see the display. As another example, a system may beconfigured to adjust a visibility envelope according to userpreferences. As another example, a system may be configured to take thedisplay's brightness or content type into consideration. As anotherexample, a system may be configured to take the display's size and theaverage quality of human eyesight into consideration.

Referring to FIG. 13, a schematic diagram of shows electronic mediadisplay device 1300, intruding camera 1302 attached to building 1306,and user 1306. According to an exemplary embodiment, electronic mediadisplay device 1300 is a cellular phone equipped with a camera 1308(e.g., electronic media display device 402 of FIG. 4), which isconfigured to scan for intruding cameras according to systems andmethods described herein. The processing circuit of electronic mediadisplay device 1300 receives data from camera 1308 relating to theenvironment around electronic media display device 1300. The processingcircuit (via the intruder analysis module) analyzes the information todetermine the presence of intruding camera 1302. The processing circuit(via the edit generation module) edits or changes content on electronicmedia display device 1300 in response to detecting intruding camera1302. For example, the processing circuit may blur the contents of thedisplay or cause an alert to appear, thereby notifying user 1306 of theintrusion. In this manner, sensitive content can be protected from beingcaptured by unauthorized cameras. It should be understood that theapplication is not limited to detecting cameras attached to buildings,and that other scenarios are envisioned. For example, electronic mediadisplay device 1300 may detect another cellular phone equipped with acamera. Similar embodiments are also useful in public locations or whilea user is taking public transportation, where intruding cameras arelikely to be present.

Referring to FIG. 14, a flow diagram of a general process 1400 fordetecting and reacting to an intruding viewer of an electronic mediadisplay device is shown according to an exemplary embodiment. Process1400 includes obtaining information from a sensor (step 1402),performing analysis to determine a presence of a camera within theenvironment around the sensor (e.g., within the data captured by thesensor) (step 1404), and editing or changing content on a display deviceif a camera is detected (step 1406).

Referring to FIG. 15, a flow diagram of a process 1500 for detecting anintruding camera of a camera-equipped electronic media display deviceand editing content is shown, according to an exemplary embodiment.Process 1500 includes capturing an image of the electronic media displaydevice's surroundings using a camera (step 1502), and analyzing thecaptured image information to determine if a camera is present in theimage (step 1504). If a camera is present in the captured image (step1506), and the content on the screen is not already edited (step 1508),the content on the electronic media display device is edited or changed(step 1510). However, if there are no cameras present in the capturedimage, (step 1506), it is safe to reset any previous edits and displayunedited content again (step 1512). If a camera is detected and thecontent is already edited, no further action needs to be taken (step1508) and process 1500 may start again.

The present disclosure contemplates methods, systems and programproducts on any machine-readable media for accomplishing variousoperations. The embodiments of the present disclosure may be implementedusing existing computer processors, or by a special purpose computerprocessor for an appropriate system, incorporated for this or anotherpurpose, or by a hardwired system. Embodiments within the scope of thepresent disclosure include program products comprising machine-readablemedia for carrying or having machine-executable instructions or datastructures stored thereon. Such machine-readable media can be anyavailable media that can be accessed by a general purpose or specialpurpose computer or other machine with a processor. By way of example,such machine-readable media can comprise RAM, ROM, EPROM, EEPROM, CD-ROMor other optical disk storage, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to carry or storedesired program code in the form of machine-executable instructions ordata structures and which can be accessed by a general purpose orspecial purpose computer or other machine with a processor. Wheninformation is transferred or provided over a network or anothercommunications connection (either hardwired, wireless, or a combinationof hardwired or wireless) to a machine, the machine properly views theconnection as a machine-readable medium. Thus, any such connection isproperly termed a machine-readable medium. Combinations of the above arealso included within the scope of machine-readable media.Machine-executable instructions include, for example, instructions anddata which cause a general purpose computer, special purpose computer,or special purpose processing machines to perform a certain function orgroup of functions.

Although the figures may show a specific order of method steps, theorder of the steps may differ from what is depicted. Also two or moresteps may be performed concurrently or with partial concurrence. Suchvariation will depend on the software and hardware systems chosen and ondesigner choice. All such variations are within the scope of thedisclosure. Likewise, software implementations could be accomplishedwith standard programming techniques with rule based logic and otherlogic to accomplish the various connection steps, processing steps,comparison steps and decision steps.

What is claimed is:
 1. A system for detecting and responding to anintruding camera, comprising: an electronic media display device havinga screen configured to display content; a sensor; and a processingcircuit configured to: obtain information from the sensor; analyze theinformation to determine a presence of a camera and whether the cameracan resolve any displayed content; and edit the displayed content inresponse to the camera being able to resolve the displayed content. 2.The system of claim 1, wherein the sensor is coupled to the electronicmedia display device.
 3. The system of claim 1, wherein the sensorincludes a passive imager.
 4. The system of claim 3, wherein the passiveimager includes a range-sensitive camera.
 5. The system of claim 1,wherein the processing circuit is further configured to performcalculations using a focal length.
 6. The system of claim 1, wherein thesensor includes a set of two cameras.
 7. The system of claim 6, whereinthe processing circuit is further configured to perform calculationsbased on stereoscopic information.
 8. The system of claim 1, wherein thesensor includes an active imager.
 9. The system of claim 1, wherein thesensor uses a radar.
 10. The system of claim 9, wherein the radarincludes a micropower impulse radar (MIR).
 11. The system of claim 1,wherein the sensor includes at least one of light detection and rangingtechnology (LIDAR), a microphone, an ultrasonic sensor, an infraredsensor, and a near-infrared (NIR) sensor.
 12. A method of detecting andresponding to an intruding camera, comprising: displaying content on anelectronic media display device having a screen; obtaining informationfrom a sensor; analyzing the information to determine a presence of acamera and whether the camera can resolve any displayed content; andediting the displayed content in response to the camera being able toresolve the displayed content.
 13. The method of claim 12, furthercomprising determining an angle of the camera relative to an axisorthogonal to the screen based on the information, wherein the angle isused to determine whether the camera can resolve any displayed content.14. The method of claim 12, further comprising alerting a user based ondetermining the presence of the camera and that the camera is able toresolve the displayed content.
 15. The method of claim 14, wherein thealert includes at least one of displaying a flashing content on aportion of the screen and changing a color of a portion of contentdisplayed on the screen.
 16. The method of claim 14, wherein the alertincludes displaying a message on the screen.
 17. The method of claim 14,wherein the alert is defined by a user's settings.
 18. The method ofclaim 12, wherein the editing comprises at least one of turning off thescreen, freezing the displayed content, adjusting a brightness of thescreen, and muting any audio.
 19. The method of claim 12, wherein theediting comprises disabling a displaying of new content.
 20. The methodof claim 12, wherein the editing comprises temporarily disabling anyinput.
 21. The method of claim 12, wherein the editing comprisesdegrading the displayed content.
 22. The method of claim 21, wherein thedegrading comprises at least one of blurring, dimming, and reducing thesize of the displayed content.
 23. The method of claim 12, furthercomprising distinguishing the camera from an authorized device.
 24. Anon-transitory computer-readable medium having instructions storedthereon for execution by a processing circuit, the instructionscomprising: instructions for interfacing with an electronic mediadisplay device having a screen for visual content; instructions forobtaining information from a sensor, wherein the information correspondsto the environment around the electronic media display device;instructions for analyzing the information to determine a presence of acamera and whether the camera can resolve any displayed content; andinstructions for editing the displayed content in response to the camerabeing able to resolve the displayed content.
 25. The non-transitorycomputer-readable medium of claim 24, wherein the instructions foranalyzing the information include instructions to determine anorientation of the camera.
 26. The non-transitory computer-readablemedium of claim 25, wherein the orientation of the camera comprises anangle between an imaging direction of the camera and a line of sightfrom the camera to the electronic media display device.
 27. Thenon-transitory computer-readable medium of claim 24, further comprisinginstructions for determining a distance of the camera from the screenbased on the information
 28. The non-transitory computer-readable mediumof claim 24, wherein the electronic media display device includes acomputer terminal.
 29. The non-transitory computer-readable medium ofclaim 24, wherein the electronic media display device includes a medicaldevice.
 30. The non-transitory computer-readable medium of claim 24,wherein the electronic media display device includes an automated tellermachine.
 31. The non-transitory computer-readable medium of claim 24,further comprising instructions for determining a visibility envelope ofthe electronic media display device, and wherein analyzing theinformation to determine the presence of the camera depends on thevisibility envelope.
 32. The non-transitory computer-readable medium ofclaim 31, wherein the visibility envelope is determined using abrightness of the screen.
 33. The non-transitory computer-readablemedium of claim 31, wherein the visibility envelope is determined usingexternally provided information characterizing the visual performance ofthe screen.
 34. The non-transitory computer-readable medium of claim 31,wherein the visibility envelope is determined using informationconcerning the displayed content.
 35. The non-transitorycomputer-readable medium of claim 31, wherein the visibility envelope isbased on an ability to resolve the displayed content.