System and method for concealing sensitive data on a computing device

ABSTRACT

A computer-implemented method may hide sensitive information, such as sensitive information relating to auto, home, life, or renters insurance, banking, and/or vehicle loans. In one aspect, the method may commence or execute an eavesdropper detection functionality or application. The method may also detect an unauthorized viewer or eavesdropper is viewing, or potentially viewing, a display screen associated with the mobile device for more than a threshold duration of at least one second, determine that sensitive or confidential information is being displayed or about to be displayed, on the display screen, and prevent the unauthorized viewer or eavesdropper from viewing the sensitive or confidential information via the display screen to facilitate hiding sensitive or confidential information.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of and claims priority to U.S. patentapplication Ser. No. 15/864,842, entitled “System And Method ForConcealing Sensitive Data On A Computing Device” and filed Jan. 8, 2018,which is a continuation of and claims priority to U.S. patentapplication Ser. No. 14/833,275 filed on Aug. 24, 2015, entitled “SystemAnd Method For Concealing Sensitive Data On A Computing Device,” whichclaims priority to and the benefit of U.S. Provisional PatentApplication No. 62/067,333, entitled “System And Method For ConcealingSensitive Data On A Computing Device,” filed on Oct. 22, 2014; U.S.Provisional Patent Application No. 62/072,231, entitled “System AndMethod For Concealing Sensitive Data On A Computing Device,” filed onOct. 29, 2014; U.S. Provisional Patent Application No. 62/192,338,entitled “System And Method For Concealing Sensitive Data On A ComputingDevice,” filed on Jul. 14, 2015; and U.S. Provisional Patent ApplicationNo. 62/196,685, entitled “System And Method For Concealing SensitiveData On A Computing Device,” filed on Jul. 24, 2015, the disclosure ofeach of which is hereby incorporated by reference in its entirety.

FIELD OF THE INVENTION

The present disclosure generally relates to a system and method fordetermining when sensitive data is displayed within a viewport of adisplay of a computing device, detecting a biometric identifier of auser of the computing device, detecting a second biometric identifiernot associated with the user of the computing device and obscuring thesensitive data displayed within the viewport of the display.

BACKGROUND

The background description provided herein is for the purpose ofgenerally presenting the context of the disclosure. Work of thepresently named inventors, to the extent it is described in thisbackground section, as well as aspects of the description that may nototherwise qualify as prior art at the time of filing, are neitherexpressly nor impliedly admitted as prior art against the presentdisclosure.

An increasing amount of sensitive data is displayed on mobile devices,such as banking information, e-mail, insurance account information, etc.Combined with the increasing screens sizes of mobile computing devices,it may be possible for a malicious party to look over someone's shoulder(or otherwise eavesdrop), and view sensitive data displayed within theviewport, or viewing region, of the display of a computing device.Although many applications that display sensitive data authenticate auser via a password and user name, these traditional authenticationtechniques may not prevent others from viewing sensitive data from adistance.

SUMMARY

The present embodiments may dynamically conceal sensitive and/or privatedata displayed on a display of a computing device. One or more dataitems may be graphically or visually represented in an applicationexecuting on the computing device. A biometric detection service mayutilize a camera on the computing device, such as a front facing camera,and may detect when a person other than the user is looking at thedevice. In one aspect, concealing the sensitive data may prevent aperson, such as a malicious third party, from viewing sensitive datadisplayed on the computing device.

In one aspect, a computer-implemented method of hiding sensitiveinformation may be provided. The method may include (1) commencing orexecuting, via a computer network and/or one or more processors, aneavesdropper detection functionality or application, and/or (2)detecting, by the one or more processors, an unauthorized viewer oreavesdropper is viewing, or potentially viewing, a display screenassociated with the computing device for more than a threshold durationof at least one second. The method may include (3) determining, by theone or more processors, that sensitive or confidential information isbeing displayed or about to be displayed, on the display screen, and/or(4) preventing, by the one or more processors, the unauthorized vieweror eavesdropper from viewing the sensitive or confidential informationvia the display screen to facilitate hiding sensitive or confidentialinformation. The method may include notifying the user of the potentialeavesdropping, and/or may provide recommendations to alleviate tosecurity concerns or issues. The method may include additional, fewer,or alternate actions, including those discussed elsewhere herein.

In another aspect, a mobile device for hiding sensitive information maybe provided. The mobile device may include a processor configured to (1)commence or execute an eavesdropper detection functionality orapplication; (2) detect an unauthorized viewer or eavesdropper isviewing, or potentially viewing, a display screen associated with themobile device for more than a threshold duration of at least one second;(3) determine that sensitive or confidential information is beingdisplayed or about to be displayed, on the display screen; and/or (4)prevent the unauthorized viewer or eavesdropper from viewing thesensitive or confidential information via the display screen tofacilitate hiding sensitive or confidential information. The mobiledevice may include additional, fewer, or alternate actions, includingthose discussed elsewhere herein.

In yet another aspect, a non-transitory computer-readable memory storinginstructions thereon may be provided. The instructions, when executed byone or more processors, may cause the one or more processors to)commence or execute an eavesdropper detection functionality orapplication; (2) detect an unauthorized viewer or eavesdropper isviewing, or potentially viewing, a display screen associated with themobile device for more than a threshold duration of at least one second;(3) determine that sensitive or confidential information is beingdisplayed or about to be displayed, on the display screen; and/or (4)prevent the unauthorized viewer or eavesdropper from viewing thesensitive or confidential information via the display screen tofacilitate hiding sensitive or confidential information. Thenon-transitory computer-readable memory may include additional, fewer,or alternate instructions, including those discussed elsewhere herein.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a simplified and exemplary block diagram of a system forconcealing sensitive data;

FIG. 2 is a flow chart illustrating an exemplary method for displayingand concealing sensitive data;

FIG. 3A is an exemplary sensitive data application displaying sensitiveuser data within a viewport of a display of a computing device;

FIG. 3B is an exemplary sensitive data application obscuring sensitiveuser data displayed within a viewport of a display of a computingdevice;

FIG. 4 is a flow chart illustrating an exemplary method for creating abiometric fingerprint associated with a user;

FIG. 5 is a flow chart illustrating an exemplary method for defining adata category as sensitive;

FIG. 6 is an exemplary architecture of a computing device.

FIG. 7 is a flow chart illustrating an exemplary method for enhancingdata security;

FIG. 8 is a flow chart illustrating an exemplary method of enhancingdata or information security;

FIG. 9 is a flow chart illustrating an exemplary method for displaying apotential eavesdropper;

FIG. 10 illustrates an exemplary computer system to detect eavesdroppersand transmit push notifications to a user's smart watch; and

FIG. 11 is a flow chart illustrating an exemplary method for hidingsensitive information including when no one is looking at the displayscreen.

The figures depict a preferred embodiment of the present invention forpurposes of illustration only. One of ordinary skill in the art willreadily recognize from the following discussion that alternativeembodiments of the structures and methods illustrated herein may beemployed without departing from the principles of the inventiondescribed herein.

DETAILED DESCRIPTION

A system and method may relate, inter alia, to concealing sensitive datadisplayed within a viewport of a display of a client computing device.Sensitive data may include social security numbers, account numbers,passwords, user names, credit card numbers, names, dates, phone numbers,addresses, identification numbers, birth dates, education/traininginformation, salary, financial information, health records, ethnicity,credit rating, birth place, tax return information, citizenship,disability/veteran status, pending lawsuits, worker's compensationclaims, age, and/or e-mail address. Sensitive data may also includebank, trading, or financial account information, such as an accountbalance, account number, transaction history, etc. Sensitive data mayfurther include insurance account information, such as an accountnumber, policy details, transaction history, premiums, discounts, rates,contact information, coverages, deductibles, vehicle information, VINs(Vehicle Identification Numbers), beneficiaries or family members, etc.In some aspects, sensitive data may not be limited to text-basedinformation, and/or may also include images, videos, audio, etc.

In one aspect, the present embodiments may utilize a camera (and/or oneor more other sensors), such as a front facing camera of a computingdevice, and/or one or more biometric recognition techniques (or sensors)to determine if someone other than the user of the computing device islooking at the display of the client computing device. A biometricdetection service, application, and/or functionality may be initiatedupon detection that sensitive user data is being displayed within aviewport of the display of the computing device. Exemplary biometricrecognition techniques may include facial recognition, eye recognition,etc. If the biometric service, application, and/or functionality detectsa second biometric identifier, such as a biometric identifier belongingto someone other than the user, the sensitive user data displayed withinthe viewport of the computing device may be obscured, blurred, ormasked. The biometric detection service, application, and/orfunctionality (or related computer-implemented instructions) may beterminated when sensitive data is no longer displayed. In this manner,the biometric service, application, and/or functionality may detect theprimary user, and may obscure confidential and/or sensitive data upondetecting another pair of eyes and/or face viewing the display of thecomputing device, but may also preserve battery life when sensitive datais no longer displayed.

As an example, a user may be sitting at a crowded airport while checkingbank account information. A second person may stand behind the user andbe able to see the display of the computing device. Upon detecting thatsensitive data is displayed within the viewport of the computing device,the biometric recognition service, application, and/or functionality maybe initialized. Upon detecting that the second person is viewing thedisplay of the computing device, the sensitive user data may be blurredor masked.

By blurring or masking sensitive user data upon detecting that thesecond person is viewing the display, the present embodimentsadvantageously may enhance electronic data security. Moreover, thepresent embodiments may reduce the risk that an eavesdropper has accessto a user's sensitive data, thereby decreasing the number of occurrencesof identity theft, credit card fraud, etc.

In one aspect, the present embodiments may further include capturing adigital image using the camera of the computing device upon detectingthat someone other than the user is viewing the display. The digitalimage may be captured and/or displayed in real-time or at least nearreal time and may be a still image or video. The digital image may alsoinclude the sensitive data displayed within the viewport of the displayat the time of detection.

The present embodiments may provide one or more methods for determiningsensitive data. In one aspect, certain data items may be flagged asconfidential, sensitive, etc. The data items may be flagged by a user, aprogrammer of an application, etc. In one aspect, a server may send anotification to the computing device indicating that sensitive data isdisplayed.

In one aspect, the computing device may be associated with more than oneuser. One or more biometric “fingerprints” may be created and used toidentify each user. Upon detecting that a new user is using the device,user credentials may be requested to further authenticate the seconduser.

I. Exemplary Concealing of Sensitive Data

In one aspect, a system and method may be provided that display andobscure sensitive data. The present embodiments may include recognizingwhen sensitive data is displayed within a viewport of a display of acomputing device; starting a biometric detection service, application,and/or functionality; and/or detecting a first biometric identifierbelonging to the user of the computing device. Furthermore, someembodiments may detect a second biometric identifier belonging tosomeone other than the user of the computing device. Some embodimentsmay also obscure the sensitive data displayed within the viewport of thecomputing device upon detecting the second biometric identifier. In someaspects, the system and method may also capture a digital image upondetection of the second biometric indicator, and/or include thesensitive data displayed within the viewport of the computing device inthe digital image. In some aspects, the biometric detection service maybe ended when sensitive data is no longer displayed within the viewportof the display.

The present embodiments may also provide one or more techniques toclassify certain data as “sensitive.” For example, in some aspects aprogrammer of an application may classify certain portions of theapplication (such as data fields, specific data, certain tabs, or otherareas, etc.) as sensitive data. In addition to the programmer definedsensitive data, the system and method may also allow a user of theapplication to classify data as sensitive. For example, the system andmethod may allow the user to select certain data, data fields or otherportions of an application and designate data displayed in thoseportions as “sensitive data.”

The system and method may still further associate one or more users withan account and/or computing device. For example a “biometricfingerprint” may be registered for a user authorized to access sensitivedata. The system and method may detect a biometric identifier andcompare the biometric identifier to the biometric fingerprint to allowthe user to view the sensitive data. In some aspects, a “biometricfingerprint” may be registered for an unauthorized user. Accordingly, ifa biometric identifier is matched to the unauthorized biometricfingerprint, any sensitive data displayed within the viewport of thedisplay may be obscured.

II. Exemplary System Architecture

FIG. 1 illustrates various aspects of an exemplary architecture forconcealing sensitive data on a computing device 100. The high-levelarchitecture includes both hardware and software applications, as wellas various data communications channels for communicating data betweenthe various hardware and software components. The system for receivingsensitive data on the computing device 100 may include various softwareand hardware components or modules that may employ one or more methodsdescribed herein. The various modules may be implemented ascomputer-readable storage memories containing computer-readableinstructions (i.e., software) for execution by a processor of the systemfor concealing sensitive data on the computing device 100.

A. Exemplary Front End Components

The system for concealing sensitive data on the computing device 100 mayinclude front end components, including a computing device 102 that mayexecute instructions for executing an application, displaying sensitiveuser data, etc. The computing device 102 may be a personal computer,smart phone, tablet computer, notebook, netbook, laptop, phablet, smartwatch, wearable electronics, or other suitable computing device ormobile device. In some aspects, the computing device need not beportable, as it is envisioned that the techniques described herein maybe used with an automated teller machine (ATM), desktop computers inpublic places, etc. Those of ordinary skill in the art will recognizethat the present system may be used in a dedicated application, a webapplication, a combination thereof, etc. The computing device 102 mayalso include one or more cameras 104, such as a front facing camera,rear facing camera, a combination thereof, sensors, etc.

In some aspects, the computing device 102 may include a networktransceiver 106 for connecting to a computer network 110, such as theInternet or other type of suitable network (e.g., local area network(LAN), a metropolitan area network (MAN), a wide area network (WAN), amobile, a wired or wireless network, a private network, a virtualprivate network, etc.). The computing device 102 may connect to back endcomponents 112 via the computer network 110, such as via wired orwireless communication, including radio frequency (RF) communication.

While the example system 100 includes one computing device 102, anynumber of computing devices may be included in the example system 100such that two or more computing devices may communicate with each otherto conceal sensitive data. For example, a first computing device, suchas a user's smart phone may capture a digital image of a potentialeavesdropper upon detection of the second biometric identifier. Thefirst computing device may communicate with a second computing device,such as a user's smart watch or other wearable device to display thecaptured digital image on the user's smart watch.

In some embodiments, the first and second computing devices maycommunicate with each other over a short range communication network,such as Bluetooth, Wi-Fi Direct, wired or wireless Universal Serial Bus(USB), Near Field Communication (NFC), ZigBee, LAN, or any othersuitable short range communication network. In this manner, the smartwatch may act as a rear-view mirror for the user, and the user may seethe other person(s), looking at the screen. In other embodiments, thefirst computing device may display the captured digital image on aportion of the user interface of the first computing device, such as theupper right, upper left, lower right, or lower left corner of the userinterface.

B. Exemplary Back End Components

The back end components 112 may include a server 114 that may includeone or more computer-executable instructions 116 for determining whensensitive data is being accessed, transmitted, displayed, etc. The backend components 112 may further include one or more databases 118. Eachdatabase 118 may include a data storage device, such as random-accessmemory (RAM), hard disk drive (HDD), flash memory, flash memory such asa solid state drive (SSD), etc. The back end components may communicatewith each other through a communication network 120, such as a localarea network or other type of suitable network (e.g., the Internet, ametropolitan area network (MAN), a wide area network (WAN), a mobile, awired or wireless network, a private network, a virtual private network,etc.).

The exemplary system 100 shown in FIG. 1 may include additional, fewer,or alternate components, including those discussed elsewhere herein.

III. Exemplary Flow Chart for Displaying and Concealing Sensitive Data

FIG. 2 is a high level flow chart of an exemplary method, routine orprocess 200 for concealing sensitive data on a computing device. A user,such a customer of an insurance company, a customer of a bankingcompany, a holder of an insurance policy and/or bank account, abeneficiary of an insurance policy and/or bank account, a claimant, aninsurance agent associated with the company or some other employee orindependent contractor affiliated with the company, may use a clientdevice, such as the computing device 102 illustrated in FIG. 1, toaccess a program that accesses sensitive data. For example, the programmay be for banking, finance, insurance, etc. The company program may bea native application, a web application hosted on one or more servers,such as the server 114, described in reference to FIG. 1, a combinationof the two, etc.

The user may enter an input, via a mouse click, touch press, keyboardclick, etc., representing one or more user credentials and the one ormore user credentials may be received at the computing device (block202). For example, the user credentials may be a customer nameassociated with a company account, a user name of the customer account,etc. In some embodiments, the user may be a customer entering a useraccount credential. In some embodiments, one or more processors of thecomputing device may also execute an instruction to verify the customeraccount credentials via the use of a password or other verificationtechnique. The computing device may further transmit the receivedcustomer account identification and/or verification information to asecond computing device, such as an authentication server, forauthentication.

Once a user has logged into the application, a processor of thecomputing device may execute an instruction to determine if a sensitivedata flag has been triggered (block 204). Generally speaking, thesensitive data flag indicates that sensitive user data is being, orabout to be, displayed within a viewport of the display of the computingdevice. For example, the user may have requested an account balance,transaction number, contact information, etc.

There are numerous examples of how the sensitive data flag may betriggered. In some aspects, the sensitive data flag may be triggeredwhen the processor determines that sensitive data is being, or about tobe, displayed within a viewport of a display of the computing device. Insome aspects, the sensitive data flag may be triggered when theprocessor determines that a user has accessed a sensitive data portionof an application, such as a transaction history tab or policy detailsportion. A portion of an application (or functionality) may be definedas sensitive by someone creating the application (or functionality), maybe specified by the user, etc. In still further aspects, the processorof the computing device may receive an indication that the sensitivedata flag has been triggered. The indication may originate from a secondcomputing device, such as a third party server, company server, etc. Forexample, a user using a web application may enter a user input selectingan account information tab and the request may be sent from thecomputing device to a remotely located company server, such as theserver 114 described in reference to FIG. 1. The company server maydetermine that the user has requested sensitive information, and/ortransmit an indication to the computing device that sensitive data hasbeen accessed and/or requested, and will be displayed within a viewportof the display of the computing device.

The processor may further execute an instruction to initiate a biometricdetection service or functionality (block 206). In some embodiments, theprocessor may execute the instruction to initiate the biometricdetection service or functionality in response to detecting thatsensitive data is being, or about to be, displayed within the viewportof the display of the computing device. The processor may also executean instruction to detect a first biometric identifier belonging to theuser of the computing device (block 208). For example, the processor mayexecute an instruction to utilize one or more of the cameras (or othersensors) of the computing device (such as the camera 108 described inreference to FIG. 1) and one or more biometric identification techniquesto identify the user. Exemplary biometric identifiers may include facialrecognition, eye recognition, etc. Numerous biometric identificationtechniques are known in the art, and those of ordinary skill in the artwill recognize that any combination of these techniques may be used toidentify the user. In some embodiments, a biometric fingerprint for theuser may already be preregistered, and associated with the user accountand/or computing device. Creating and using digital biometricfingerprints is discussed in further detail below, in reference to FIGS.4 and 5.

Once the user has been identified, the biometric identification service,application, or functionality may be used to determine if aneavesdropper or someone other than the user of the computing device islooking at the display of the computer device. The processor may furtherexecute an instruction to detect a biometric identifier identifying thenon-user of the computing device (block 210). For example, a processorexecuting the biometric detection service may utilize the front facingcamera of the computing device to determine if a second person isstanding behind the primary user of the computing device. If theprocessor executing the instruction determines that a second biometricidentifier is detected, (YES branch of block 210), the processor mayfurther execute an instruction to obscure the sensitive data within theviewport of the display of the computing device (block 212). Forexample, the sensitive data may be obscured by blurring, or otherwisemasking, the appearance of the sensitive data, blacking it out, nolonger displaying the sensitive data, etc.

In some aspects, the processor may further execute an instruction todetermine if the non-user of the computing device is looking at thedisplay of the computing device. If the processor executing theinstruction determines that a second biometric identifier is notdetected, (NO branch of block 208), the processor may further execute aninstruction to display the sensitive data within the viewport of thedisplay of the computing device (block 214). Accordingly, the sensitivedata may only be obscured if the non-user is looking at the display ofthe computing device. The exemplary method 200 may include additional,fewer, or alternate actions, including those discussed elsewhere herein.

In some aspects, the processor may further execute an instruction tocapture a digital image upon detecting the second biometric identifier.The digital image may be captured using, for example, the front facingcamera of the computing device. The digital image may further includethe sensitive data displayed within a viewport of the display of thecomputing device at the time of detecting the second biometricidentifier. In this manner, the user of the computing device may seewhat sensitive data may have been viewed by the non-user and takeappropriate precautions.

In some aspects, the processor may further execute an instruction todetermine when the sensitive data flag is no longer triggered and/orsensitive data is no longer displayed within the viewport of the displayof the computing device. In response, the processor may end thebiometric detection service, application, or functionality from runningor executing, either locally or remotely. In some aspects, the computingdevice may receive an indication from a second computing device, such asthe server 114 described in reference to FIG. 1, that the sensitive dataflag is no longer triggered.

Also in some aspects, the processor may execute an instruction todetermine that no one is looking at the display of the computing device.For example, the processor may execute an instruction to utilize one ormore of the cameras (or other sensors) of the computing device (such asthe camera 108 described in reference to FIG. 1) and one or morebiometric identification techniques to identify that no one is lookingat the display. If no one is looking at the display, the processor mayexecute an instruction to obscure the sensitive data within the viewportof the display of the computing device. For example, the sensitive datamay be obscured by blurring, or otherwise masking, the appearance of thesensitive data, blacking it out, no longer displaying the sensitivedata, etc.

IV. Exemplary User Interface and Related Functionality

In one aspect, a user interface for viewing and concealing sensitiveuser data may be provided. FIG. 3A illustrates an exemplary viewport ofa display of a computing device executing an exemplary sensitive dataapplication 300. The sensitive data application 300 may includegraphically depicting and/or visually presenting various types of datawithin the viewport of the display, such as sensitive data items andnon-sensitive data items. The sensitive data application 300 may includegraphically depicting and/or visually presenting other types of data aswell. The unified product page may include additional, less, oralternate functionality, including functionality discussed elsewhereherein.

The user interface may provide or facilitate the input, and/or viewing,of many features of the system and method for concealing sensitive datadiscussed herein. A number of the exemplary user interface features andfunctionalities are discussed below.

A. Exemplary Displaying Sensitive Data Functionality

The exemplary sensitive data application 300 illustrated in FIG. 3A isan insurance company application for viewing data items concerning aninsurance policy. However, it will be recognized that techniquesdescribed herein may be applicable to other types of sensitive dataapplication. As illustrated in FIG. 3A, the sensitive data application300 may display data items for an insurance policy including the insuredparty's name, a policy number, a year, make model and VIN of a vehicle,an insurance agent, a contract phone number, the effective dates of thepolicy, and/or details concerning the specific coverage, premium, rates,discounts, and/ro deductibles of the insurance policy. One or more ofthese data items may be classified as sensitive data items 302. Forexample, a developer of the application may flag certain data items,such as VIN number and policy as sensitive, and/or a user of theapplication or functionality may select one or more types of data items,such as insured party and phone number, to be sensitive, etc. Of course,these are only examples, and any combination of data items may beclassified as sensitive.

In any case, as described above, a processor may execute an instructionto determine if any sensitive data is being, or about to be, displayedwithin a viewport of a display of the computing device. Upon determiningthat sensitive data is being, or about to be, displayed within aviewport of the display, the processor may execute an instruction toinitiate a biometric detection service, application, or functionality,and/or detect a biometric identifier identifying the user of thecomputing device. The processor may further detect a biometricidentifier identifying a second person within the range of the camera ofthe computing device, and/or execute an instruction to obscure thesensitive data within the viewport of the display of the computingdevice.

B. Exemplary Obscuring Sensitive Data Functionality

Turning now to FIG. 3B, several sensitive obscured data items 304 may bedisplayed within the exemplary sensitive data application 300. In theexemplary sensitive data application 300 depicted in FIG. 3B, sensitivedata categories may include policy number, insured party, phone numberand VIN. Although FIG. 3B illustrates the obscured data items 304 as“blurred” data, those of ordinary skill in the art will appreciate thatother techniques to obscure data may be used.

Numerous techniques may be used to determine what data categories areconsidered “sensitive.” For example, certain data fields may beclassified as “sensitive” by the developer of the application. In someaspects, a user may have the ability to classify certain data items as“sensitive.” The user may make use an input device, such as a touchscreen, keyboard, mouse, to identify certain data categories to beclassified as “sensitive.” In one example, the user may long press ortouch a certain data field to indicate that the data displayed in thedata field is sensitive data.

V. Exemplary Flow Chart for Creating a Biometric Fingerprint Associatedwith a User

In some aspects, it may be beneficial to create one or more “biometricfingerprints” defining one or more biometric identifiers for eachauthorized user of the user account. For example, the biometricfingerprint may define a user's face, eye or eyes, hair color, hairstyle, facial features, teeth or jaw structure, nose, ears, etc. Whenattempting to access sensitive data, the biometric detection service,application, or functionality may detect a biometric identifierbelonging to the current user of the computing device, and then comparethe biometric identifier of the current user to the biometricfingerprint of authorized users. If the biometric identifier of thecurrent user matches a biometric fingerprint belonging to an authorizeduser, sensitive data may be displayed on the screen.

FIG. 4 is a high level flow chart of an exemplary method, routine orprocess 400 for creating a biometric fingerprint associated with a user.A user, such as a customer of the company, a holder of an insurancepolicy of the company, etc., may use a client device, such as thecomputing device 102 illustrated in FIG. 1 to access a company program.The company program may be a native application, a web application, acombination of the two, etc. and/or include or provide the functionalitydiscussed herein. The company program and/or the functionality describedherein may be locally or remotely stored, such as stored locally on thecomputing or mobile device 102 or stored remotely on a remote server orprocessor 112.

The processor of the server may receive one or more user credentials fora user account (block 402). For example, the user credentials mayinclude a user name and password, etc. The processor may also execute aninstruction to detect a biometric identifier for a user of the useraccount (block 404). For example, the processor may execute aninstruction to use a camera device (such as the camera device 104illustrated in FIG. 1) to create one or more biometric fingerprints forthe user of the user account (block 406) and associate the biometricfingerprint with the user account (block 408). For example, thebiometric identifier may be saved with the user account credentials,and/or associated with the user account. The processor may furtherexecute an instruction to store the biometric fingerprint (block 410),such as in a memory unit. The method may include additional, fewer, oralternate actions, including those discussed elsewhere herein.

VI. Exemplary Flow Chart for Matching a Biometric Fingerprint Associatedwith a User

FIG. 5 is a high level flow chart of an exemplary method, routine orprocess 500 for creating a biometric fingerprint associated with a user.The user may enter an input, via a mouse click, touch press, keyboardclick, two or three dimensional gesture recognition, voice commands,etc., representing one or more user credentials, and the one or moreuser credentials may be received at the computing device (block 502).The processor may further receive a request to display sensitive data ona display of a computing device (block 504). As described above, thisrequest may be a variety of things. For example, the user may haverequested an account balance, transaction number, contact information,etc. In some embodiments, the processor executing the instructions mayalternatively or additionally determine that a user has accessed asensitive data portion of an application, such as a transaction historyor policy details portion, and/or determine that sensitive data is aboutto be, or currently being, displayed within the viewport of the displayof the computing device. In some aspects, the processor may also executean instruction to initiate a biometric detection service, application,or functionality in response to detecting that sensitive data is aboutto be, or currently being, displayed within the viewport of the displayof the computing device.

The processor may also execute an instruction to detect a firstbiometric identifier for a user of the computing device (block 506). Forexample, the processor may execute an instruction to utilize one or moreof the cameras of the computing device (such as the camera 104 describedin reference to FIG. 1) and one or more biometric identificationtechniques or functionalities to identify the user. Example biometricidentifiers may include facial recognition, eye recognition, facialstructure recognition, ear or nose recognition, hair or teethrecognition, etc. Numerous biometric identification techniques are knownin the art, and those of ordinary skill in the art will recognize thatany combination of these techniques may be used to identify the user.The processor may further execute an instruction to determine if thedetected biometric identifier matches one or more biometric fingerprintsassociated with the user account (block 508). For example, a biometricfingerprint may be created using the method 400 described in referenceto FIG. 4.

If the processor executing the instruction determines that the biometricidentifier matches one of the biometric fingerprints associated with theuser account (YES branch of block 508), the processor may execute aninstruction to normally display (i.e., display without concealing) thesensitive data within the viewport of the display of the computingdevice (block 5010). Conversely, if the processor executing theinstruction determines that the biometric identifier does not match anybiometric fingerprints associated with the user account (NO branch ofblock 508), the processor may execute an instruction to obscure or blursensitive data displayed within the viewport of the display of thecomputing device (block 512).

In some aspects, the processor executing the instruction(s) maydetermine that the biometric identifier matches an authorized user, butnot the user tied to the received account credentials. Accordingly, theprocessor may further execute an instruction to request a second usercredential authenticating the authorized user.

In addition to creating and matching biometric fingerprints forauthorized users of the account, the techniques described herein mayalso be used to prevent unauthorized users from accessing sensitivedata. In some aspects, a digital fingerprint for an unauthorized usermay be created from, for example, an image of an unauthorized user. Forexample, a woman may have an ex-husband who she previously sharedsensitive account data with. Although the woman may changer herpassword, it is possible that the ex-husband can guess the new password.The woman may use the method described herein to submit an image of theex-husband's face to an unauthorized user list. Accordingly, when a userattempts to view sensitive data, the biometric detection service,application, and/or functionality may detect the biometric identifier ofthe user, and/or compare it to the biometric identifiers on theunauthorized user list. If the biometric identifier matches a biometricidentifier belonging to a user on the unauthorized user list, then anysensitive data being, or about to be, displayed on the display of thecomputing device may be obscured. The method may include additional,fewer, or alternate actions, including those discussed elsewhere herein.

VII. Exemplary Computing Device

Referring now to FIG. 6, a computing device 600 may include a controller602. Exemplary computing device may include the client device 102 and/orthe server 114 illustrated in FIG. 1. The controller 602 may include aprogram memory 604, a microcontroller or a microprocessor (μP) 606, arandom-access memory (RAM) 608, and an input/output (I/O) circuit 610,all of which may be interconnected via an address/data bus 612. Theprogram memory 604 may store computer-executable instructions, which maybe executed by the microprocessor 606. In some embodiments, thecontroller 602 may also include, or otherwise be communicativelyconnected to, a database 614 or other data storage mechanism (e.g., oneor more hard disk drives, optical storage drives, solid state storagedevices, etc.). It should be appreciated that although FIG. 6 depictsonly one microprocessor 606, the controller 602 may include multiplemicroprocessors 606. Similarly, the memory 604 of the controller 602 mayinclude multiple RAMs 616 and multiple program memories 618, 618A and618B storing one or more corresponding application modules, according tothe controller's particular configuration. The computing device 600 mayalso include specific routines to be performed by the computing device600.

Although FIG. 6 depicts the I/O circuit 610 as a single block, the I/Ocircuit 610 may include a number of different types of I/O circuits (notdepicted). The RAM(s) 608, 604 and the program memories 618, 618A and/or618B may be implemented in a known form of computer storage media,including but not limited to, semiconductor memories, magneticallyreadable memories, and/or optically readable memories, for example, butdoes not include transitory media such as carrier waves.

VIII. Exemplary Concealing of Sensitive Data

In one aspect, a computer-implemented method of dynamically concealingsensitive data displayed in associated applications to a user may beprovided. The method may include (1) displaying a visual, textual, orgraphical representation of a first application on a display screenand/or user interface; (2) displaying a visual, textual, or graphicalrepresentation of a first set of data items on the display screen,wherein one or more of the data items may be classified as sensitivedata items; and/or (3) concealing the visual, textual, or graphicalrepresentation of the sensitive data items on the display screen and/oruser interface, the sensitive data items being concealed by a blurringor other suitable technique. The concealing of sensitive data displayedwithin the viewport of the display of the computing device may preventunwanted third parties, or eavesdroppers, from viewing the sensitivedata displayed. The method may also allow the user to capture a digitalimage of the onlooker, as well as the sensitive data displayed at thetime.

Noted above, the method may include concealing sensitive data displayedwithin a viewport of a display of a client device. Sensitive data mayinclude social security numbers, passwords, user names, credit cardnumbers, names, dates, phone numbers, addresses, identification numbers,birth dates, education/training information, salary, financialinformation, health records, ethnicity, credit rating, birth place, taxreturn information, citizenship, disability/veteran status, pendinglawsuits, worker's compensation claims, age, and/or e-mail address.Sensitive data may also include bank or financial account information,such as an account balance, account number, transaction history, etc.Sensitive data may further include insurance account information, suchas an account number, policy details, transaction history, premiums,contact information, vehicle information, VIN numbers, etc. In someaspects, sensitive data may not be limited to text-based information,and/or may also include images, videos, audio, etc.

The method may include displaying or presenting information regardingspecific insurance agents or other sales representatives. For instance,agent name, contact information, and/or agent website information may beprovided. Other types of customer assistance may be provided.

IX. Exemplary Method Embodiments

In one aspect, a computer-implemented method of sensitive informationsecurity may be provided. The method may include (1) determining, by oneor more processors, that confidential or sensitive information is aboutto be, or is currently being, displayed on a display screen or otherdisplay of, or associated with, a mobile or other computing device of auser; (2) collecting, by the one or more processors, image data from afront facing camera mounted on, or associated with, the mobile or othercomputing device of the user; (3) determining, by the one or moreprocessors, that a potential eavesdropper or unauthorized user isviewing the display screen or other display from computer analysis ofthe image data collected; (4) blurring or obscuring, by the one or moreprocessors, the confidential or sensitive information being displayed onthe display screen or other display when it is determined that thepotential eavesdropper or unauthorized user is viewing the displayscreen or other display; and/or (5) generating, by the one or moreprocessors, a warning to the user indicating a presence of the potentialeavesdropper or unauthorized user when (a) it is determined that thepotential eavesdropper or unauthorized user is viewing the displayscreen or other display, and (b) confidential or sensitive informationis about to be displayed, or is being displayed, on the display screenor other display to facilitate maintaining sensitive information secure.The method may include additional, fewer, or alternate actions,including those discussed elsewhere herein.

For instance, determining, by the one or more processors, that thepotential eavesdropper or unauthorized user is viewing the displayscreen or other display from computer analysis of the image datacollected may be accomplished by the one or more processors (i)determining that two people (or two sets of eyes) are currently lookingat the display screen or other display, and/or (ii) determining that oneof the people is not an owner or authorized user of the mobile or othercomputing device. Additionally or alternatively, determining, by the oneor more processors, that the potential eavesdropper or unauthorized useris viewing the display screen or other display from computer analysis ofthe image data collected may be accomplished by the one or moreprocessors (i) determining that two sets of human eyes are currentlylooking at the display screen or other display, and/or (ii) determiningthat one of the sets of eyes do not belong to an owner or authorizeduser of the mobile or other computing device.

Further, determining, by the one or more processors, that the potentialeavesdropper or unauthorized user is viewing the display screen or otherdisplay from computer analysis of the image data collected may beaccomplished by the one or more processors (i) determining that twopeople are currently looking at the display screen or other display,and/or (ii) determining that one of the people is not an owner orauthorized user of the mobile or other computing device by using facialrecognition or eye recognition software. Also, determining, by the oneor more processors, that the potential eavesdropper or unauthorized useris viewing the display screen or other display from computer analysis ofthe image data collected may be accomplished by the one or moreprocessors determining that a person currently looking at the displayscreen or other display is not an owner or authorized user of the mobileor other computing device by using facial recognition techniques on theimage data.

Additionally or alternatively, determining, by the one or moreprocessors, that the potential eavesdropper or unauthorized user isviewing the display screen or other display from computer analysis ofthe image data collected may be accomplished by the one or moreprocessors determining that a person currently looking at the displayscreen or other display is not an owner or authorized user of the mobileor other computing device by using eye recognition techniques on theimage data.

In one aspect, the mobile or other computing device may only look for aneavesdropper when confidential or sensitive information is beingdisplayed. As a result, battery power of the mobile or other computingdevice may be saved.

In another aspect, the mobile or other computing device may only lookfor an eavesdropper when the user travels to a website or webpage with alarge amount of data or content that is, or may include confidential orsensitive information. For instance, when the user travels to a websiteof their bank, stock or futures broker, or insurance provider, themobile or other computing device may look for eavesdroppers, and if oneis detected, such as by using the techniques disclosed herein, a warningmay be issued to the user and/or any confidential or sensitive may beblurred or otherwise obscured when displayed.

X. Exemplary Non-Transitory Media

In another embodiment, a computer readable storage medium comprisingnon-transitory computer readable instructions stored thereon forconcealing sensitive personal data being, or about to be, displayedwithin a viewport of a display of a computing device may be provided.The instructions when executed on one or more processors, may cause theone or more processors to: (1) determine that a sensitive data flag hasbeen triggered, wherein the sensitive data flag indicates that sensitiveuser data is being, or about to be, displayed within a viewport of thecomputing device; (2) initiate a biometric detection service in responseto determining that the sensitive data flag has been triggered, (3)detect a first biometric identifier belonging to the user of thecomputing device; (4) detect a second biometric identifier belonging toan eavesdropper, potential eavesdropper, or someone other than the userof the computing device; and/or (5) obscure the sensitive user datadisplayed within the viewport of the computing device. The instructionsmay further cause the one or more processors to: receive an indicationthat the sensitive data flag has been triggered, wherein the indicationoriginates from a second computing device. The instructions may furthercause the one or more processors to: create a biometric fingerprint forthe user of the computing device; and determine that the first biometricidentifier matches the biometric fingerprint. The instructions mayfurther cause the one or more processors to: cause a camera to capture adigital image upon detection of the second biometric indicator andincluding the sensitive data being, or about to be, displayed within theviewport of the computing device in the digital image. The instructionsmay further cause the one or more processors to: receive a userselection defining one or more sensitive user data categories; and/ordetermine that the second biometric identifier matches a biometricfingerprint of an unauthorized user. The computer readable storagemedium comprising non-transitory computer readable instructions maydirect the one or more processors to perform additional, less, oralternate functionality, including that discussed elsewhere herein.

XI. Exemplary Method of Enhancing Data Security

FIG. 7 illustrates an exemplary computer-implemented method of enhancingdata security 700. The method 700 may include determining that a user isdirecting a computing device to wirelessly or virtually visit afinancial or insurance-related website 702; starting an eavesdroppingdetection functionality or application 704; detecting an unauthorizedviewer or eavesdropper is looking at a display 706; determining thatsensitive or confidential information is being displayed, or about to bedisplayed, on the display 708; blurring or masking (any and/or only)sensitive or confidential information that is being displayed on thedisplay 710; removing or preventing only the sensitive or confidentialinformation from being displayed on the display 712; preventing internetaccess to the website, and/or directing the user to a secondary websitewhere limited or no confidential information is allowed to be displayed714; sending a warning to the authorized user or computer owner of thepotential eavesdropper 716; and/or directing other remedial orcorrective actions 718. The foregoing functionality may be accomplishedvia one or more local processors associated with a computing device, oneor more remote processors (such as remote processors associated with afinancial services and/or insurance provider), an eavesdroppingdetection application or functionality, and/or any combination thereof.The method may include additional, fewer, or alternate actions,including those discussed elsewhere herein.

The method 700 may include determining that a user is directing acomputing device to a financial or insurance-related website 702. When auser activates an internet search engine or directs the computing deviceto access a website, such as a website associated with a bank, financialor trading account, or insurance provider, that activity may be flaggedas a trigger (such as by one or more local or remote processors).Additionally or alternatively, when the computing device accesses orarrives at a landing page associated with a bank, financial servicesprovider, and/or insurance provider, that activity may be flagged as atrigger or triggering event.

The method 700 may include starting an eavesdropping detectionfunctionality or application 704. For instance, the computing device maystart the eavesdropping detection functionality or application when atrigger or triggering event is detected or otherwise determined, suchthose discussed elsewhere herein. The triggering events may includeaccessing various websites, turning on the computing device or startingvarious functionality or applications, entering various modes ofcomputing device operation (such as a traveling mode, “not at home”mode, “not at work” mode, or a roaming mode), GPS or otherlocation-based functionality, and/or other triggers.

The method 700 may include detecting an unauthorized viewer oreavesdropper is looking at a display 706, such as discussed elsewhereherein. For instance, the eavesdropping detection functionality orapplication may direct one or more cameras or other sensors (such asthermal imaging sensors) to gather and collect image data, such as imagedata containing information of persons looking at, or potentiallyviewing, a display screen or other display associated with the computingdevice. If two or more people appear to be viewing or facing the displayscreen or other display of the computing device for (i) too long a time,or (ii) too much within a given time period, one or more local or remoteprocessors (and/or the eavesdropping detection functionality orapplication) may determine that an eavesdropper, or potentialeavesdropper, is viewing (or potentially viewing) the display screen orother display.

The method 700 may include determining that sensitive or confidentialinformation is being displayed, or about to be displayed, on the display(such as a display screen or other type of display) 708, as discussedelsewhere herein. For instance, one or more local or remote processors(and/or the eavesdropping detection functionality or application) maylook for certain fields to be filled in by the user on the displayscreen, such as fields associated with the words or terms “accountnumber” or “home address.” Such information being displayed, or about tobe displayed (such as on a webpage associated with an insurance customeror insurance provider, insurance application, and/or request for aninsurance quote), may be flagged as sensitive or confidentialinformation and/or information that should be prevented from beingdisplayed and/or be masked if it is to be displayed.

The method 700 may include blurring or masking sensitive or confidentialinformation that is being displayed on the display 710, as discussedelsewhere herein. For instance, one or more local or remote processors(and/or the eavesdropping detection functionality or application) maydirect or control the sensitive or confidential information identified(and only the sensitive or confidential information) being blurred ormasked once it is displayed, or about to be displayed, on a displayscreen or other display associated with the computing device.

The method 700 may include removing or preventing sensitive orconfidential information from being displayed on the display 712.Additionally or alternatively to blurring or masking information, one ormore local or remote processors (and/or the eavesdropping detectionfunctionality or application) may remove sensitive or confidentialinformation (and only the sensitive or confidential information) frombeing displayed on the display, and/or prevent the sensitive orconfidential information from being displayed on the display in thefirst place (i.e., before it is displayed on the display in the firstinstance).

The method 700 may include preventing internet access to the website,and/or directing the user to a secondary website where limited or noconfidential information is allowed to be displayed 714. For instance,one or more local or remote processors (and/or the eavesdroppingdetection functionality or application) may determine that the websitetrying to be accessed by the user, such as a website associated with abank, financial services provider, and/or insurance provider, may beassociated with displaying sensitive or confidential information. Assuch, the one or more local or remote processors (and/or theeavesdropping detection functionality or application) may prevent theuser from accessing that website (such as when an actual or potentialeavesdropper is detected).

Additionally or alternatively, the one or more local or remoteprocessors (and/or the eavesdropping detection functionality orapplication) may direct the user to a secondary website associated withthe bank, financial services provider, insurance provider, etc. Thesecondary (or limited information) website may only display limited orno sensitive or confidential information.

The method 700 may include sending a warning to the authorized user orcomputer owner of the potential eavesdropper 716. For instance, the oneor more local or remote processors (and/or the eavesdropping detectionfunctionality or application) may generate a warning indicating thepresence of an actual or potential eavesdropper, and/or that sensitiveor confidential information is about to be, or is being, displayed.

The method 700 may include directing other remedial or correctiveactions 718. For instance, once it is determined that a potentialeavesdropper has been detected, and/or that sensitive or confidentialwas displayed or about to be displayed (and/or requested to bedisplayed), the one or more local or remote processors (and/or theeavesdropping detection functionality or application) may limit accessto the website, limit changes to account information, limit access toaccount monies, require a username or password reset, and/or preventaccess to other or related websites or accounts until corrective actionis taken by the authorized user or owner of the computing device toensure security of their information and/or accounts.

XII. Another Exemplary Method of Enhancing Data Security

FIG. 8 illustrates a computer-implemented method of enhancing data orinformation security 800. The method 800 may include detecting atriggering event (either locally or remotely) to turn on (i) aneavesdropping functionality, and/or (ii) a user-facing camera 802;turning on the eavesdropping functionality and/or user-facing camera,and recording image data 804; analyzing the image data locally and/orremotely to detect an unauthorized viewer or potential eavesdropper isviewing (or potentially viewing) a display 806; determining thatsensitive or confidential information is being, or about to be,displayed 808; directing corrective actions, locally and/or remotely, tobe taken to enhance security 810; sending a warning to an authorizeduser or owner of the computing device that a potential eavesdropperexists 812; and/or directing other corrective or remedial actions 814.The method 800 may include additional, fewer, or alternative actions,including those discussed elsewhere herein.

The method 800 may include detecting a triggering event (either locallyor remotely) to turn on an eavesdropping functionality and/or auser-facing camera 802. The triggering events may include thosediscussed elsewhere herein. For instance, one or more processors maydetermine that the computing device is traveling (such as from GPSdata), at an airport, away from work, and/or away from home. The one ormore processors may then place the computing device into a traveling,airport mode, “not at work” mode, and/or “not at home” mode,respectively, during which the eavesdropping functionality and/or auser-facing camera may be turned on. After which, the method 800 mayinclude turning on the eavesdropping functionality and/or user-facingcamera, and recording image data 804.

The method 800 may include analyzing the image data locally and/orremotely to detect an unauthorized view or potential eavesdropper isviewing, or potentially viewing, a display 806. For instance, the imagedata may analyzed by one or more processors using facial recognition,eye recognition, or facial feature recognition techniques.

The method 800 may include determining that sensitive or confidentialinformation is being, or about to be, displayed 808. For instance, theone or more processors may identify that information to be displayed ona display includes account or address information, or other numeric orpersonal information.

The method 800 may include directing corrective actions, locally and/orremotely, to be taken to enhance security 810. For instance, the methodmay include (i) blurring any and all sensitive or confidentialinformation that is being, or about to be displayed, on the display810A; (ii) removing or preventing any sensitive or confidentialinformation from being displayed 810B; and/or (iii) preventing the useror computing device from accessing a specific website (that may displaysensitive or confidential information) and/or direct a user to secondarywebsite that does not display sensitive or confidential information.

The method 800 may include sending a warning to an authorized user orowner of the computing device to a potential eavesdropper exists 812.For instance, a warning may be displayed on the display to warn or alertthe user of potential danger. The method 800 may also include directingother corrective or remedial actions 814, such as those discussed withrespect to FIG. 7.

XIII. Exemplary Hiding of Sensitive Information

In one aspect, a computer-implemented method of hiding sensitiveinformation may be provided. The method may include (1) commencing orexecuting, via one or more processors, an eavesdropper detectionfunctionality or application; (2) detecting, via the one or moreprocessors (and/or the eavesdropper detection functionality orapplication), an unauthorized viewer or eavesdropper is viewing orpotentially viewing, a display screen, such as a display screenassociated with a computing device; (3) determining, via the one or moreprocessors (and/or the eavesdropper detection functionality orapplication), that sensitive or confidential information is beingdisplayed, and/or about to be displayed, on the display screen; and/or(4) preventing, via the one or more processors (and/or the eavesdropperdetection functionality or application), the unauthorized viewer oreavesdropper from viewing the sensitive or confidential information viathe display screen to facilitate hiding sensitive or confidentialinformation and/or maintaining secrecy thereof. The method may includeadditional, fewer, or alternate actions, including those discussedelsewhere herein.

For instance, preventing, via the one or more processors, theunauthorized viewer or eavesdropper from viewing or potentially viewingthe sensitive or confidential information via the display screen may beaccomplished by the one or more processors (and/or the eavesdropperdetection functionality or application): (a) blurring or masking onlythe sensitive or confidential information that is being displayed, orabout to being displayed, on the display screen (while leavingnon-sensitive or non-confidential information un-blurred or un-masked);(b) removing (or taking down) only the sensitive or confidentialinformation from being displayed on the display screen (while leavingnon-sensitive or non-confidential information un-blurred or un-masked);(c) preventing any sensitive or confidential information (and only thesensitive or confidential information) that is about to be displayed onthe display screen from being displayed (i) before it is displayed, (ii)at all, or (iii) otherwise in the first place; and/or (d) generating awarning (or communication) to an authorized user or owner of thecomputing device that an eavesdropper or unauthorized user is viewing,or potentially viewing, the display screen, and displaying the warningon the display to the authorized user or owner.

Detecting, via the one or more processors, an unauthorized viewer oreavesdropper is viewing, or potentially viewing, the display screen mayinclude: taking or capturing one or more images via a camera mounted onthe computing device, such as under the direction or control of (i) theone or more processors, and/or (ii) the eavesdropper detectionfunctionality or application; and/or analyzing the one or more images,or associated image data, via (i) the one or more processors, and/or(ii) the eavesdropper detection functionality or application todetermine that a potential eavesdropper or unauthorized user is viewing(or potentially viewing or looking at) the display screen, such as byusing facial recognition, eye recognition, and/or facial featurerecognition techniques.

Detecting, via the one or more processors, that the unauthorized vieweror eavesdropper is viewing or potentially viewing the display screen mayinclude: (A) taking or capturing one or more images via a camera mountedon the computing device, such as under the direction or control of the(i) one or more processors, and/or (ii) eavesdropper detectionfunctionality or application; and/or analyzing the one or more images,or associated image data, via the (i) one or more processors, and/or(ii) eavesdropper detection functionality or application to determinecharacteristics of a person that is looking at, viewing, or potentiallyviewing the display screen, such as by using facial recognition, eyerecognition, and/or other facial feature recognition techniques; (B)comparing the characteristics of the person with facial, eye, and/orother facial characteristics of the authorized user or owner todetermine whether the person is the authorized user or owner, or apotential eavesdropper (e.g., no match=potential eavesdropper;match=authorized user or owner); and/or (C) blurring any (and/or only)sensitive or confidential information when it is determined that thepotential eavesdropper is viewing, or potentially viewing, the displayscreen.

The one or more processors may be local to the computing device (such asmounted internally within the computing device), and/or the eavesdropperdetection functionality or application may be stored in a non-transitorymemory unit or computer-readable medium associated with, or mountedwithin or internal to, the computing device. Additionally oralternatively, the one or more processors may be remote to the computingdevice, such as being associated with a remote processor or server inwireless communication with the computing device, and/or theeavesdropper detection functionality or application may be stored in anon-transitory memory unit or computer-readable medium associated with,or mounted within, the remote processor or server.

The method may include determining, via the one or more processors, thata user is accessing the internet or other wireless communicationnetwork, and/or is directing the computing device to a websiteassociated with a bank, financial services provider, and/or insuranceprovider before (or alternatively after) commencing or executing, viathe one or more processors, an eavesdropper detection functionality orapplication.

Preventing, via the one or more processors, the unauthorized viewer oreavesdropper from viewing, or potentially viewing, the sensitive orconfidential information via the display screen may be accomplished bythe one or more processors (and/or the eavesdropper detectionfunctionality or application): (i) preventing internet access to thewebsite; and/or (ii) directing the user to a secondary websiteassociated with the bank, financial services provider, and/or insuranceprovider where only limited, or even no, confidential or sensitiveinformation may be displayed and/or accessed.

XIV. Exemplary Enhancing Information Security

In one aspect, a computer-implemented method of enhancing data securitymay be provided. The method may include (1) turning on or commencing,via one or more local or remote processors, (i) an eavesdroppingdetection functionality or application, and/or (ii) a user-facing cameraassociated with, or mounted on, a computing device when a trigger eventis detected by the one or more local or remote processors; (2) directingor controlling, via the one or more local or remote processors (and/orthe eavesdropping detection functionality or application), theuser-facing camera to gather, collect, or otherwise take images or imagedata; (3) analyzing, via the one or more local or remote processors(and/or the eavesdropping detection functionality or application), theimages or image data to detect that an eavesdropper or unauthorized useris viewing, or potentially viewing, a display of the computing device;(4) determining, via the one or more local or remote processors (and/orthe eavesdropping detection functionality or application), thatsensitive or confidential information is being displayed, or about to bedisplayed, on the display; and/or (5) directing one or more correctiveor remedial actions, via the one or more local or remote processors(and/or the eavesdropping detection functionality or application), when(i) the eavesdropper or unauthorized user is viewing, or potentiallyviewing, the display, and/or (ii) the sensitive or confidentialinformation is being displayed, or about to be displayed, on the displayto enhance security of the sensitive or confidential information. Themethod may include additional, fewer, or alternate functionality,including that discussed elsewhere herein.

For instance, the trigger event that is detected by the one or morelocal or remote processors may include: (a) user-selected operations,input, and/or functionality, such as turning on a travel or airportmode; (b) the one or more local or remote processors automaticallydetermining that the computing device is traveling or otherwise notwithin its normal area of travel or at its normal location (e.g., aresidence or place of work), such as by using coordinates from a GPS(Global Positioning System) unit mounted on, or within, the computingdevice; and/or (c) accessing a landing page or other webpage associatedwith a financial services provider or insurance provider.

The eavesdropper detection functionality may be triggered, and/or thecamera turned on, by: (a) functionality that is triggered or governed bycomputing device location; and/or (b) functionality that is triggered byinternet or wireless communication network activity, such as accessing alanding page or other webpage associated with a specific website, afinancial services provider, or an insurance provider.

Analyzing, via the one or more local or remote processors (and/or theeavesdropping detection functionality or application), the images orimage data to detect an eavesdropper or unauthorized user is viewing, orpotentially viewing, a display of the computing device may include theone or more local or remote processors (and/or the eavesdroppingdetection functionality or application) analyzing the images or imagedata to detect that (a) two or more pair of eyes are looking at, orprimarily or potentially looking at, the display for a given amount oftime or a temporal threshold; (b) two or more pair of eyes are lookingat, potentially looking at, or substantially or approximately looking atthe display for a given amount of time or a temporal threshold; (c) twoor more pair of heads are looking in the direction of, or primarilylooking in the direction of, the display for a given amount of time or atemporal threshold; and/or (d) two or more pair of heads are looking inthe direction of, primarily looking in the direction of, orsubstantially or approximately looking in the direction of the displayfor a given amount of time or a temporal threshold (such as 15 or 30seconds).

Directing the one or more corrective or remedial actions, via the one ormore local or remote processors (and/or the eavesdropping detectionfunctionality or application), may include (a) blurring or masking all(and/or only) sensitive or confidential information from being displayedon any and all portions of the display (i.e., remove any sensitive orconfidential information from being displayed anywhere or on any webpageof the display); (b) preventing the computing device from accessing agiven website associated with a bank, financial services provider, orinsurance provider; (c) removing any (and/or only) sensitive orconfidential information that is being displayed and/or preventing thecomputing device from displaying any sensitive or confidentialinformation until it is determined that the eavesdropper or unauthorizeduser is no longer viewing, or potentially viewing, the display (such asfor a temporal threshold of 60 seconds or longer); and/or (d) generatinga warning to an authorized user of the computing device and displayingthe warning on the display.

XV. Exemplary Method for Displaying a Potential Eavesdropper

FIG. 9 illustrates an exemplary computer-implemented method 900 fordisplaying a potential eavesdropper. The method may be executed on thecomputing device 102, as shown in FIG. 1. In some embodiments, themethod 900 may be implemented in a set of instructions stored on anon-transitory computer-readable memory and executable on one or moreprocessors of the computing device 102. In other embodiments, the method900 may be performed by a combination of multiple computing devices 102,such as a smart phone and a smart watch which are in communication witheach other.

The method 900 may include turning on eavesdropping detectionfunctionality and/or a user facing camera 902; capturing image(s) ofpeople viewing a display screen 904; analyzing the image(s) to detect aneavesdropper is looking at a display 906; transmitting the image(s) to asecond computing device, such as a smart watch 908; displaying theimage(s) on the second computing device 910; and transmittinginstructions to provide an alert to the user of a potential eavesdropperon the second computing device 912. The method may include additional,fewer, or alternate actions, including those discussed elsewhere herein.

At block 902, a first computing device, such as a smart phone may turnon eavesdropping detection functionality and/or a user facing camera.For instance, the first computing device may start the eavesdroppingdetection functionality and/or user facing camera when a trigger ortriggering event is detected or otherwise determined, such as thosediscussed elsewhere herein. The triggering events may include accessingvarious websites, turning on the computing device or starting variousfunctionality or applications, entering various modes of computingdevice operation (such as a traveling mode, “not at home” mode, “not atwork” mode, or a roaming mode), GPS or other location-basedfunctionality, and/or other triggers.

Then at block 904, the first computing device (and/or the eavesdroppingdetection functionality) may direct one or more cameras or other sensors(such as thermal imaging sensors) to gather and collect image data, suchas one or more digital images containing information of persons lookingat, or potentially viewing, a display screen or other display associatedwith the first computing device. The first computing device may analyzethe digital image(s) to detect an eavesdropper looking at a display,such as discussed elsewhere herein (block 906). For example, if two ormore people appear to be viewing or facing the display screen or otherdisplay of the computing device for (i) too long a time, or (ii) toomuch within a given time period, the first computing device (and/or theeavesdropping detection functionality) may determine that aneavesdropper, or potential eavesdropper, is viewing (or potentiallyviewing) the display screen or other display.

In some embodiments, the eavesdropping detection functionality maycompare biometric identifiers for each of two or more people who appearto be viewing or facing the display screen to determine if the detectedbiometric identifiers match one or more biometric fingerprintsassociated with the user account. Example biometric identifiers mayinclude facial recognition, eye recognition, facial structurerecognition, ear or nose recognition, hair or teeth recognition, etc.The biometric identifiers may also be compared to biometric fingerprintsassociated with unauthorized users.

If a biometric identifier for one of the people does not match thebiometric fingerprints associated with the user account and/or thebiometric identifier matches a biometric fingerprint associated with anunauthorized user, the person may be identified as an eavesdropper orpotential eavesdropper.

As a result, the first computing device may transmit the digitalimage(s) to a second computing device (block 908), such as a smartwatch. The digital image(s) may be transmitted via a short rangecommunication network, such as Bluetooth, Wi-Fi Direct, wired orwireless USB, NFC, ZigBee, LAN, or any other suitable short rangecommunication network. In this manner, the second computing device maydisplay the digital image(s) (block 910) for the user to see, acting asa rear-view mirror for the user. In some embodiments, the digitalimage(s) may display the eavesdropper or potential eavesdropper withoutdisplaying the user. For example, each digital image may be filtered toremove the portion of the digital image which contains the user. Thenthe filtered digital image(s) may be transmitted to the second computingdevice.

Also in some embodiments, the first computing device may display thedigital image(s) on a portion of the user interface of the firstcomputing device, such as the upper right, upper left, lower right, orlower left corner of the user interface. For example, the digitalimage(s) may be displayed in the upper right corner of the userinterface overlaying data items (e.g., for an insurance policy) whichare displayed within the viewport of the user interface. Furthermore,each digital image may be a still image or video, and may be displayedon a portion of the user interface and/or transmitted to the secondcomputing device in real-time or at least near-time. Advantageously, theuser may see real-time or near real-time video/images of the peoplelooking at her screen.

When the digital image(s) is/are transmitted from the first computingdevice to the second computing device, the first computing device mayalso transmit instructions for the second computing device to provide analert to the user notifying her that an image of the potentialeavesdropper is being displayed on the second computing device (block912). For example, the second computing device may provide an audiblealert to the user such as ringtone, a beeping sound, etc., the secondcomputing device may provide a haptic alert to the user, and/or thesecond computing device may provide a visual alert to the user, such asa push notification.

In some embodiments, when the image of the potential eavesdropper isdisplayed on one or both of the first and second computing devices, theuser may perform a gesture based action on the computing device whichdisplays the image, such as a swipe gesture to ignore the image of thepotential eavesdropper and remove the image from the display. When theuser performs this action, she may be prompted to indicate whether thepotential eavesdropper should be ignored temporarily or if the potentialeavesdropper should be permanently ignored and/or she may be prompted torequest that the eavesdropping detection functionality be turned off. Ifthe user indicates that the potential eavesdropper should be permanentlyignored, for example by clicking on and/or touch-selecting a usercontrol, the eavesdropping detection functionality may add the biometricidentifier for the potential eavesdropper as a biometric fingerprintassociated with authorized users.

For example, if the potential eavesdropper is the user's brother, theuser may perform a swipe gesture indicating that the image should beignored and she may further indicate, via a user control, that the imageshould be ignored permanently. As a result, the biometric identifier forthe brother may be stored as a biometric fingerprint associated withauthorized users in the user account.

XVI. Exemplary Displaying a Potential Eavesdropper

In one aspect, a computer-implemented method for displaying potentialeavesdroppers when hiding sensitive information may be provided. Themethod may include (1) commencing (via one or more processors in a firstcomputing device) an eavesdropping detection functionality in responseto detecting a trigger event; (2) directing (via the one or moreprocessors in the first computing device) a camera mounted on the firstcomputing device to capture one or more images including one or morepersons looking at or potentially viewing a display screen on the firstcomputing device; (3) analyzing (via the one or more processors in thefirst computing device) the one or more images to detect an unauthorizedviewer or eavesdropper is viewing, or potentially viewing, the displayscreen on the first computing device; and/or (4) transmitting (via theone or more processors in the first computing device and/or wired orwireless communication and/or data transmission) the one or more imageswhich include the unauthorized viewer or the eavesdropper to a secondcomputing device to be displayed to a user on the second computingdevice. The method may include additional, fewer, or alternativeactions, including those discussed elsewhere herein.

For instance, the method may include transmitting (via the one or moreprocessors in the first computing device and/or wired or wirelesscommunication and/or data transmission) instructions to the secondcomputing device to provide an alert to the user that one or more imagesof the unauthorized viewer or the eavesdropper are being displayed onthe second computing device. Moreover, in response to receiving agesture by the user on the display of the second computing device, themethod may include creating (via the one or more processors in the firstcomputing device) a biometric fingerprint associated with authorizedusers based upon a biometric identifier for the unauthorized viewer oreavesdropper. Additionally, in response to receiving a gesture by theuser on the display of the second computing device, the method mayinclude turning off (via the one or more processors in the firstcomputing device) the eavesdropping detection functionality.

Furthermore, the method may include displaying (via the one or moreprocessors in the first computing device) the one or more images whichinclude the unauthorized viewer or eavesdropper on a portion of thedisplay screen on the first computing device. The method may alsoinclude displaying (via the one or more processors in the firstcomputing device) one or more data items on a viewport of the displayscreen on the first computing device. The one or more images whichinclude the unauthorized viewer or eavesdropper may be displayedoverlaying at least a portion of the viewport. Also, the one or moreimages may be transmitted to the second computing device in real-time.

XVII. Exemplary Smart Watch Functionality

In one aspect, a front facing camera may detect other faces or eyeswithin the camera's view or line of sight, such as a front facing cameramounted on a laptop, tablet, phablet, smart phone, or other mobiledevice. If the user also has a smart watch, what the camera is seeingmay be displayed on the smart watch face or display. In other words, thesmart watch may act as a rearview mirror of sorts and/or displayseavesdroppers situated or located behind (or over the shoulder of) theuser.

A mobile device, such as laptop or tablet, may include facial detectionand/or facial recognition software or computer instructions (and otherfunctionality as discussed herein). The mobile device may be able torecognize authorized users and unauthorized users of the mobile device.The mobile device may be in wireless communication or data transmissionwith the mobile device owner's smart watch, such as via Bluetooth orother wireless communication techniques.

If an unauthorized or unrecognized user's eyes or face is detected bythe mobile device (e.g., laptop or tablet), a notification may be pushedto the user's smart watch. After which, the user may be aware of theeavesdropper and take precautions, or alternatively ignore thenotification if the potential eavesdropper is someone the user knows,but the mobile does not recognize as of yet (e.g., her face hasn't beenphotographed and stored in a local memory of the mobile device as ofyet). In the latter case, the user may opt to add the potentialeavesdropper identified (and/or picture thereof) to a list of known“friendlies” or authorized users, such as by pressing an icon displayedon the mobile device or smart watch.

FIG. 10 illustrates an exemplary computer system to detect eavesdroppersand transmit push notifications to a user's smart watch 1000. Thecomputer system may include a mobile device (such as a laptop 1002 ortablet 1004) in wireless communication 1012, 1018 with a smart watch1006, such as via Bluetooth techniques. The laptop 1002 and tablet 1004may each include a display screen 1008, 1014 and front facing camera(not shown).

The laptop 1002 and tablet 1004 may each include a window 1010, 1016,such as a pop-up window, for displaying notifications that a potentialeavesdropper has been detected using the camera and facial/eyerecognition and/or detection techniques. The techniques may includefunctionality that recognizes authorized users and/or detectsunrecognized or presently unauthorized users.

When the laptop 1002 or tablet 1004 detects an unauthorized orunrecognized person (such as by comparing images of her face or eyeswith a list of images of faces or eyes of authorized users stored in alocal memory), the laptop 1002 or tablet 1004 may push a notification tothe smart watch 1006. For instance, an audible or visual notificationmay be sent to the smart watch 1006. In one embodiment, the smart watch1006 display screen 1020 may display an image of the unauthorized orunrecognized person captured by the front facing camera mounted on thelaptop 1002 or tablet 1004. Additionally or alternatively, the smartwatch 1006 display screen 1020 may display a streaming video of theunauthorized or unrecognized person captured by the front facing cameramounted on the laptop 1002 or tablet 1004 (to function as a rear viewmirror and potentially allow the user to eavesdrop on the eavesdropper.As a result, the user can learn whether or not the potentialeavesdropper is a threat without the potential eavesdropper knowingthey've been detected).

A notification/message may also be pushed from the laptop 1002 or tablet1004 to the smart watch 1006 asking the user if they would like to addthe image of the unauthorized or unrecognized person to a list of imagesassociated with authorized users of the devices 1002, 1004, and/or 1006.

XVIII. Exemplary Mobile Device & Smart Watch

In one aspect, a mobile device (associated with a user) for displayingpotential eavesdroppers when hiding sensitive information may beprovided. The mobile device may include a processor configured to: (1)commence an eavesdropping detection functionality in response todetecting a trigger event; (2) direct a camera mounted on the mobiledevice to capture one or more images including one or more personslooking at or potentially viewing a display screen on the mobile device;(3) analyze the one or more images to detect an unauthorized viewer oreavesdropper is viewing, or potentially viewing, the display screen onthe mobile device; (4) generate a push notification message indicativeof potential eavesdropping; and/or (5) transmit from a mobile devicetransceiver the push notification message to a smart watch alsoassociated with the user to alert the user that a potential eavesdroppermay be viewing their mobile device display screen. The mobile device andsmart watch may include additional, less, or alternate functionality,including that discussed elsewhere herein.

For instance, the push notification message may include the one or moreimages which include the unauthorized viewer or the eavesdropper tofacilitate the images being displayed on the user's smart watch. Themobile device may be configured to, in response to receiving a gestureby the user on the display of the smart watch, create a biometricfingerprint associated with authorized users based upon a biometricidentifier for the unauthorized viewer or eavesdropper. The mobiledevice may be configured to, in response to receiving a gesture by theuser on the display of the smart watch, turn off the eavesdroppingdetection functionality. The mobile device may be configured to displayone or more data items on a viewport of the display screen, wherein theone or more images which include the unauthorized viewer or eavesdroppermay be displayed overlaying at least a portion of the viewport. The oneor more images may be transmitted to the smart watch in real-time anddisplayed on the smart watch display.

In another aspect, a computer system for detecting and displayingpotential eavesdroppers, such as when displaying or hiding sensitiveinformation on a mobile device display screen, may be provided. Thecomputer system may include a mobile device having a processor, memory,front facing camera, a transceiver, and a display screen; and a smartwatch having a processor, memory, a transceiver, and a display screen.The mobile device processor may be configured to (i) direct the frontfacing camera to acquire one or more images; (ii) detect a face or eyesof a potential eavesdropper in the one or more images (such as byexecuting facial or eye recognition techniques or instructions stored inthe memory); (iii) compare the one or more images of the potentialeavesdropper with a list of images of authorized users of the mobiledevice to confirm that the potential eavesdropper is an unrecognized orunauthorized user of the mobile device; and/or (iv) when an unrecognizedor unauthorized user of the mobile device has been identified within theimages by the processor, generate an electronic notification indicativeof potential eavesdropping and transmit the electronic notification viawireless communication and/or data transmission using the transceiver tothe transceiver of the smart watch. The smart watch may be configured toreceive the electronic notification via the smart watch transceiver fromthe mobile device transceiver and display the electronic notification onthe smart watch display screen to alert the user of potentialeavesdropping of information being displayed on the mobile device viathe smart watch.

The computer system may include additional, less, or alternatefunctionality, including that discussed elsewhere herein. For instance,the electronic notification may include one or more images, or streamingvideo, of the potential eavesdropper that was captured by the mobiledevice's camera and is displayed on the smart watch display insubstantially real time. The electronic notification may allow the userto add an image of the potential eavesdropper to a list of images ofknown or authorized users stored in a memory unit of the mobile device.The mobile device may be configured to, in response to receiving agesture by the user on the display of the smart watch, turn off theeavesdropping detection functionality.

XIX. Exemplary Method for Hiding Sensitive Information Including when NoOne is Looking at the Display Screen

In some embodiments, the computing device may determine that no one islooking at the display of the computing device, and as a result, mayblur or obscure the viewport of the display. FIG. 11 illustrates anexemplary computer-implemented method 1100 for hiding sensitiveinformation including when zero faces are detected. The method may beexecuted on the computing device 102, as shown in FIG. 1. In someembodiments, the method 1100 may be implemented in a set of instructionsstored on a non-transitory computer-readable memory and executable onone or more processors of the computing device 102.

The method 1100 may include receiving login credentials for a useraccount 1102; turning on eavesdropping detection functionality and/or auser facing camera 1104; receiving a request to display sensitiveinformation 1106; determining that zero or two or more people arelooking at the display 1108; and/or blurring or masking the sensitive orconfidential information that is being displayed 1110. The method mayinclude additional, fewer, or alternate actions, including thosediscussed elsewhere herein.

A user, such a customer of an insurance company, a customer of a bankingcompany, a holder of an insurance policy and/or bank account, abeneficiary of an insurance policy and/or bank account, a claimant, aninsurance agent associated with the company or some other employee orindependent contractor affiliated with the company, may use a clientdevice, such as the computing device 102 illustrated in FIG. 1, toaccess a program that accesses sensitive data. For example, the programmay be for banking, finance, insurance, etc. The company program may bea native application, a web application hosted on one or more servers,such as the server 114, described in reference to FIG. 1, a combinationof the two, etc.

The user may enter an input, via a mouse click, touch press, keyboardclick, etc., representing one or more login credentials and the one ormore login credentials may be received at the computing device, forexample, to log in to an application which displays sensitive data(block 1102). For example, the login credentials may be a customer nameassociated with a company account, a user name of the customer account,etc. In some embodiments, the user may be a customer entering a useraccount credential. In some embodiments, the computing device may alsoverify the login credentials via the use of a password or otherverification technique. The computing device may further transmit thereceived customer account identification and/or verification informationto a second computing device, such as an authentication server, forauthentication.

At block 1104, the computing device may turn on eavesdropping detectionfunctionality and/or a user facing camera. For instance, the computingdevice may start the eavesdropping detection functionality and/or userfacing camera when a trigger or triggering event is detected orotherwise determined, such as those discussed elsewhere herein. Thetriggering events may include accessing various websites, turning on thecomputing device or starting various functionality or applications,entering various modes of computing device operation (such as atraveling mode, “not at home” mode, “not at work” mode, or a roamingmode), GPS or other location-based functionality, and/or other triggers.

Then, at block 1106, the computing device may receive a request todisplay sensitive data on a display of the computing device. Asdescribed above, this request may be a variety of things. For example,the user may have requested an account balance, transaction number,contact information, etc. In some embodiments, the computing device mayalternatively or additionally determine that a user has accessed asensitive data portion of an application, such as a transaction historyor policy details portion, and/or determine that sensitive data is aboutto be, or currently being, displayed within the viewport of the displayof the computing device.

The computing device may direct one or more cameras or other sensors(such as thermal imaging sensors) to gather and collect image data, suchas a digital image containing information of persons looking at, orpotentially viewing, a display screen or other display associated withthe computing device. At block 1108, the computing device may analyzethe digital image to detect whether zero or two or more people areviewing or facing the display screen. For instance, the image data maybe analyzed by the computing device using facial recognition, eyerecognition, or facial feature recognition techniques.

If two or more people appear to be viewing or facing the display screenor other display of the computing device for (i) too long a time, or(ii) too much within a given time period, the computing device (and/orthe eavesdropping detection functionality) may determine that aneavesdropper, or potential eavesdropper, is viewing (or potentiallyviewing) the display screen or other display. Moreover, if no one isviewing or facing the display screen, the computing device (and/or theeavesdropping detection functionality) may determine that the user isnot looking at the sensitive data and that the sensitive data should beblurred or masked while the user is not looking.

When zero or two or more people are viewing or facing the displayscreen, the computing device may blur or mask the sensitive data orconfidential information within the viewport of the display of thecomputing device (block 1110). In some embodiments, the sensitive dataor confidential information may be blurred or masked immediately upondetecting that zero people are viewing or facing the display screen. Forexample, if the user looks away from the display screen momentarily, thesensitive data or confidential information may be blurred immediately toreduce the risk of a potential eavesdropper viewing the sensitive dataor confidential information. Then when the user looks back at thedisplay screen, as detected by the eavesdropping detectionfunctionality, the sensitive data or confidential information may berevealed to the user.

If zero people are viewing or facing the display screen for more than apredetermined amount of time (e.g., ten minutes), the computing devicemay automatically log the user out of the application from which she isviewing sensitive data or confidential information. For example, thecomputing device may remove the login credentials which were entered bythe user to log in to the application.

Additionally, the computing device may continuously collect/analyzeimage data to determine the amount of users viewing or facing thedisplay screen when sensitive data is being displayed within theviewport of the display. In other embodiments, the computing device maycollect/analyze image data at predetermined time intervals (e.g., everyminute, every two minutes, etc.). When zero people are viewing or facingthe display screen at a first time and the computing device determinesat a second time (e.g., two minutes later) that one person is viewing orfacing the display screen (as detected by the eavesdropping detectionfunctionality using facial recognition, eye recognition, or facialfeature recognition techniques), the computing device may verify thatthe person viewing or facing the display screen at the second time isthe user. For example, the computing device may verify that the personviewing or facing the display screen at the second time is the user bydetecting a biometric identifier for the person. The biometricidentifier may include facial recognition, eye recognition, facialstructure recognition, eye or nose recognition, hair or teethrecognition, etc. Numerous biometric identification techniques are knownin the art, and those of ordinary skill in the art will recognize thatany combination of these techniques may be used to identify the person.

The biometric identifier for the person viewing or facing the displayscreen at the second time may be compared to a biometric fingerprint forthe user. For example, the biometric fingerprint may define a user'sface, eye or eyes, hair color, hair style, facial features, teeth or jawstructure, nose, ears, etc. If the biometric identifier of the personviewing or facing the display screen at the second time matches abiometric fingerprint belonging to the user, the sensitive data may berevealed on the display screen. On the other hand, if the biometricidentifier does not match the biometric fingerprint, the computingdevice may continue to blur or mask the sensitive data or confidentialinformation within the viewport of the display. The method may includeadditional, fewer, or alternate actions, including those discussedelsewhere herein.

XX. Exemplary Hiding of Sensitive Information Including when No One isLooking at the Display Screen

In one aspect, a computer-implemented method for hiding sensitiveinformation including when no one is looking at the display screen maybe provided. The method may include (1) determining, via one or moreprocessors (and/or the eavesdropper detection functionality orapplication), that confidential or sensitive information is beingdisplayed on a display screen of a computing device of a user; (2)collecting, via the one or more processors (and/or the eavesdropperdetection functionality or application), image data from a front facingcamera in communication with the computing device of the user; (3)determining, via the one or more processors (and/or the eavesdropperdetection functionality or application), that zero or two or more peopleare viewing the display screen from computer analysis of the collectedimage data: and/or (4) blurring or obscuring, via the one or moreprocessors (and/or the eavesdropper detection functionality orapplication), the confidential or sensitive information being displayedon the display screen when it is determined that the zero or two or morepeople are viewing the display screen.

For instance, when zero people are viewing the display screen, themethod may include blurring or obscuring, via the one or moreprocessors, the confidential or sensitive information immediately upondetermining that zero people are viewing the display screen; and/or whenmore than a predetermined amount of time passes after the one or moreprocessors determine that zero people are viewing the display screen,automatically removing, via the one or more processors, logincredentials of the user for an application which includes theconfidential or sensitive information.

Furthermore, after determining that zero people are viewing the displayscreen at a first time, the method may include collecting, via the oneor more processors, second image data from the front facing camera at asecond time; determining, via the one or more processors, that oneperson is viewing the display screen at the second time based upon thesecond image data; and/or verifying, via the one or more processors,that the person viewing the display screen at the second time is theuser.

Verifying that the person viewing the display screen at the second timeis the user may include detecting, via the one or more processors, abiometric identifier belonging to the person viewing the display screen;and/or comparing, via the one or more processors, the biometricidentifier to a biometric fingerprint for the user.

When the biometric identifier matches the biometric fingerprint basedupon the comparison, the method may further include revealing, via theone or more processors, the confidential or sensitive information beingdisplayed on the display screen. On the other hand, when the biometricidentifier does not match the biometric fingerprint based upon thecomparison, the method may include further blurring or obscuring, viathe one or more processors, the confidential or sensitive information.

In another aspect, a computing or mobile device configured to hidesensitive information when no one, including the user, is looking at adisplay screen may be provided. The computing or mobile device mayinclude one or more processors configured to: (1) determine thatconfidential or sensitive information is being displayed on a displayscreen of the computing or mobile device of a user; (2) collect imagedata from a front facing camera in communication with, or mounted on,the computing or mobile device of the user; (3) determine that zero, ortwo or more, people are viewing the display screen from computeranalysis of the collected image data; and/or (4) blur or obscure theconfidential or sensitive information being displayed on the displayscreen when it is determined that the zero or two or more people areviewing the display screen to facilitate protecting confidential orsensitive information from eavesdroppers. The computing or mobile devicemay include additional, less, or alternate functionality, including thatdiscussed elsewhere herein.

For instance, when zero people are viewing the display screen, the oneor more processors further: blur or obscure the confidential orsensitive information immediately upon determining that zero people areviewing the display screen; and/or when more than a predetermined amountof time passes after the one or more processors determine that zeropeople are viewing the display screen, automatically remove logincredentials of the user for an application which includes theconfidential or sensitive information. After determining that zeropeople are viewing the display screen at a first time: the one or moreprocessors may collect second image data from the front facing camera ata second time; determine that one person is viewing the display screenat the second time based on the second image data; and/or verify thatthe person viewing the display screen at the second time is the user.

Verifying that the person viewing the display screen at the second timeis the user includes, the one or more processors: detecting a biometricidentifier belonging to the person viewing the display screen: and/orcomparing the biometric identifier to a biometric fingerprint for theuser. When the biometric identifier matches the biometric fingerprintbased upon the comparison, the one or more processors may reveal theconfidential or sensitive information being displayed on the displayscreen. And when the biometric identifier does not match the biometricfingerprint based upon the comparison, the one or more processors mayblur or obscure the confidential or sensitive information.

XXI. Additional Considerations

The following additional considerations apply to the foregoingdiscussion. Throughout this specification, plural instances mayimplement functions, components, operations, or structures described asa single instance. Although individual functions and instructions of oneor more methods are illustrated and described as separate operations,one or more of the individual operations may be performed concurrently,and nothing requires that the operations be performed in the orderillustrated. Structures and functionality presented as separatecomponents in example configurations may be implemented as a combinedstructure or component. Similarly, structures and functionalitypresented as a single component may be implemented as separatecomponents. These and other variations, modifications, additions, andimprovements fall within the scope of the subject matter herein.

The methods described in this application may include one or morefunctions or routines in the form of non-transitory computer-executableinstructions that are stored in a tangible computer-readable storagemedium and executed using a processor of a computing device (e.g., thecomputing device 104, the server 112, or any combination of computingdevices within the system 100). The routines may be included as part ofany of the modules described in relation to FIG. 1 or 2 or as part of amodule that is external to the system illustrated by FIGS. 1 and 2. Forexample, the methods may be part of a browser application or anapplication running on the computing device 104 as a plug-in or othermodule of the browser application. Further, the methods may be employedas “software-as-a-service” to provide a computing device 104 with accessto the quote system 110.

Additionally, certain embodiments are described herein as includinglogic or a number of functions, components, modules, blocks, ormechanisms. Functions may constitute either software modules (e.g.,non-transitory code stored on a tangible machine-readable storagemedium) or hardware modules. A hardware module is a tangible unitcapable of performing certain operations and may be configured orarranged in a certain manner. In example embodiments, one or morecomputer systems (e.g., a standalone, client or server computer system)or one or more hardware modules of a computer system (e.g., a processoror a group of processors) may be configured by software (e.g., anapplication or application portion) as a hardware module that operatesto perform certain operations as described herein.

In various embodiments, a hardware module may be implementedmechanically or electronically. For example, a hardware module maycomprise dedicated circuitry or logic that is permanently configured(e.g., as a special-purpose processor, such as a field programmable gatearray (FPGA) or an application-specific integrated circuit (ASIC) toperform certain functions. A hardware module may also compriseprogrammable logic or circuitry (e.g., as encompassed within ageneral-purpose processor or other programmable processor) that istemporarily configured by software to perform certain operations. Itwill be appreciated that the decision to implement a hardware modulemechanically, in dedicated and permanently configured circuitry, or intemporarily configured circuitry (e.g., configured by software) may bedriven by cost and time considerations.

Accordingly, the term hardware should be understood to encompass atangible entity, be that an entity that is physically constructed,permanently configured (e.g., hardwired), or temporarily configured(e.g., programmed) to operate in a certain manner or to perform certainoperations described herein. Considering embodiments in which hardwaremodules are temporarily configured (e.g., programmed), each of thehardware modules need not be configured or instantiated at any oneinstance in time. For example, where the hardware modules comprise ageneral-purpose processor configured using software, the general-purposeprocessor may be configured as respective different hardware modules atdifferent times. Software may accordingly configure a processor, forexample, to constitute a particular hardware module at one instance oftime and to constitute a different hardware module at a differentinstance of time.

Hardware and software modules may provide information to, and receiveinformation from, other hardware and/or software modules. Accordingly,the described hardware modules may be regarded as being communicativelycoupled. Where multiple of such hardware or software modules existcontemporaneously, communications may be achieved through signaltransmission (e.g., over appropriate circuits and buses) that connectthe hardware or software modules. In embodiments in which multiplehardware modules or software are configured or instantiated at differenttimes, communications between such hardware or software modules may beachieved, for example, through the storage and retrieval of informationin memory structures to which the multiple hardware or software moduleshave access. For example, one hardware or software module may perform anoperation and store the output of that operation in a memory device towhich it is communicatively coupled. A further hardware or softwaremodule may then, at a later time, access the memory device to retrieveand process the stored output. Hardware and software modules may alsoinitiate communications with input or output devices, and may operate ona resource (e.g., a collection of information).

The various operations of example functions and methods described hereinmay be performed, at least partially, by one or more processors that aretemporarily configured (e.g., by software) or permanently configured toperform the relevant operations. Whether temporarily or permanentlyconfigured, such processors may constitute processor-implemented modulesthat operate to perform one or more operations or functions. The modulesreferred to herein may, in some example embodiments, compriseprocessor-implemented modules.

Similarly, the methods or functions described herein may be at leastpartially processor-implemented. For example, at least some of thefunctions of a method may be performed by one or processors orprocessor-implemented hardware modules. The performance of certain ofthe functions may be distributed among the one or more processors, notonly residing within a single machine, but deployed across a number ofmachines. In some example embodiments, the processor or processors maybe located in a single location (e.g., within a home environment, anoffice environment or as a server farm), while in other embodiments theprocessors may be distributed across a number of locations.

The one or more processors may also operate to support performance ofthe relevant operations in a “cloud computing” environment or as a“software as a service” (SaaS). For example, at least some of thefunctions may be performed by a group of computers (as examples ofmachines including processors), these operations being accessible via anetwork (e.g., the Internet) and via one or more appropriate interfaces(e.g., application program interfaces (APIs).

The performance of certain of the operations may be distributed amongthe one or more processors, not only residing within a single machine,but deployed across a number of machines. In some example embodiments,the one or more processors or processor-implemented modules may belocated in a single geographic location (e.g., within a homeenvironment, an office environment, or a server farm). In other exampleembodiments, the one or more processors or processor-implemented modulesmay be distributed across a number of geographic locations.

Still further, the figures depict preferred embodiments of a computersystem 100 for purposes of illustration only. One of ordinary skill inthe art will readily recognize from the following discussion thatalternative embodiments of the structures and methods illustrated hereinmay be employed without departing from the principles described herein.

Although the text sets forth a detailed description of numerousdifferent embodiments, it should be understood that the legal scope ofthe description is defined by the words of the claims set forth at theend of this patent. The detailed description is to be construed asexemplary only and does not describe every possible embodiment sincedescribing every possible embodiment would be impractical, if notimpossible. Numerous alternative embodiments may be implemented, usingeither current technology or technology developed after the filing dateof this patent, which would still fall within the scope of the claims.

Upon reading this disclosure, those of skill in the art will appreciatestill additional alternative structural and functional designs forsystem and method for concealing sensitive data on a computing device.Thus, while particular embodiments and applications have beenillustrated and described, it is to be understood that the disclosedembodiments are not limited to the precise construction and componentsdisclosed herein. Various modifications, changes and variations, whichwill be apparent to those skilled in the art, may be made in thearrangement, operation and details of the method and apparatus disclosedherein without departing from the spirit and scope defined in theappended claims.

To the extent that any meaning or definition of a term in this documentconflicts with any meaning or definition of the same term in a documentincorporated by reference, the meaning or definition assigned to thatterm in this document shall govern. The detailed description is to beconstrued as exemplary only and does not describe every possibleembodiment since describing every possible embodiment would beimpractical, if not impossible. Numerous alternative embodiments couldbe implemented, using either current technology or technology developedafter the filing date of this patent, which would still fall within thescope of the claims.

While particular embodiments of the present invention have beenillustrated and described, it would be obvious to those skilled in theart that various other changes and modifications can be made withoutdeparting from the spirit and scope of the invention. It is thereforeintended to cover in the appended claims all such changes andmodifications that are within the scope of this invention.

The patent claims at the end of this patent application are not intendedto be construed under 35 U.S.C. § 112(f) unless traditionalmeans-plus-function language is expressly recited, such as “means for”or “step for” language being explicitly recited in the claim(s).

What is claimed is:
 1. A computer-implemented method of hiding sensitiveinformation, the method comprising: executing, via one or moreprocessors in a computing device, an eavesdropper detection application;detecting, via the one or more processors, an unauthorized eavesdropperis viewing a display screen associated with the computing device formore than a threshold duration of at least one second; determining, viathe one or more processors, that sensitive or confidential informationis being displayed, or about to be displayed, on the display screen; andpreventing, via the one or more processors, the unauthorizedeavesdropper from viewing the sensitive or confidential information viathe display screen to facilitate hiding sensitive or confidentialinformation.
 2. The computer-implemented method of claim 1, whereinpreventing, via the one or more processors, the unauthorizedeavesdropper from viewing the sensitive or confidential information viathe display screen is accomplished by the one or more processors:blurring or masking the sensitive or confidential information that isbeing displayed, or about to being displayed, on the display screen. 3.The computer-implemented method of claim 1, wherein preventing, via theone or more processors, the unauthorized eavesdropper from viewing thesensitive or confidential information via the display screen isaccomplished by the one or more processors: removing the sensitive orconfidential information from being displayed on the display screen. 4.The computer-implemented method of claim 1, wherein preventing, via theone or more processors, the unauthorized eavesdropper from viewing thesensitive or confidential information via the display screen isaccomplished by the one or more processors: preventing any sensitive orconfidential information that is about to be displayed on the displayscreen from being displayed.
 5. The computer-implemented method of claim1, wherein preventing, via the one or more processors, the unauthorizedeavesdropper from viewing the sensitive or confidential information viathe display screen is accomplished by the one or more processors:generating a warning to an authorized user or owner of the computingdevice that an eavesdropper is viewing the display screen, anddisplaying the warning on the display screen to the authorized user orowner.
 6. The computer-implemented method of claim 1, wherein detecting,via the one or more processors, that the unauthorized eavesdropper isviewing the display screen includes: taking or capturing one or moreimages via a camera mounted on the computing device; and analyzing theone or more images, or associated image data, via (i) the one or moreprocessors, or (ii) the eavesdropper detection application to determinethat the unauthorized eavesdropper is viewing the display screen.
 7. Thecomputer-implemented method of claim 1, wherein detecting, via the oneor more processors, that the unauthorized eavesdropper is viewing thedisplay screen includes: taking or capturing one or more images via acamera mounted on the computing device; analyzing the one or moreimages, or associated image data, via the (i) one or more processors, or(ii) the eavesdropper detection application to determine characteristicsof a person that is looking at or viewing the display screen; comparingthe characteristics of the person with facial, eye, or other facialcharacteristics of the authorized user or owner to determine whether theperson is the authorized user or owner, or a potential eavesdropper; andblurring any sensitive or confidential information when it is determinedthat the potential eavesdropper is viewing the display screen.
 8. Thecomputer-implemented method of claim 1, the method comprising:determining, via the one or more processors, that a user is accessingthe internet or another wireless communication network, and is directingthe computing device to a website associated with a bank, financialservices provider, or insurance provider before or after executing, viathe one or more processors, the eavesdropper detection application. 9.The computer-implemented method of claim 8, wherein preventing, via theone or more processors, the unauthorized eavesdropper from viewing thesensitive or confidential information via the display screen isaccomplished by the one or more processors: (i) preventing internetaccess to the website; or (ii) directing the user to a secondary websiteassociated with the bank, financial services provider, or insuranceprovider where at most limited confidential or sensitive information isdisplayed or accessed.
 10. A mobile device for hiding sensitiveinformation, the mobile device comprising a processor configured to:execute an eavesdropper detection application; detect an eavesdropper isviewing a display screen associated with the mobile device for more thana threshold duration of at least one second; determine that sensitive orconfidential information is being displayed, or about to be displayed,on the display screen; and prevent the eavesdropper from viewing thesensitive or confidential information via the display screen tofacilitate hiding sensitive or confidential information.
 11. The mobiledevice of claim 10, wherein to prevent the eavesdropper from viewing thesensitive or confidential information via the display screen, theprocessor is configured to: blur or mask the sensitive or confidentialinformation that is being displayed, or about to being displayed, on thedisplay screen.
 12. The mobile device of claim 10, wherein to preventthe eavesdropper from viewing the sensitive or confidential informationvia the display screen, the processor is configured to: remove thesensitive or confidential information from being displayed on thedisplay screen.
 13. The mobile device of claim 10, wherein to preventthe eavesdropper from viewing the sensitive or confidential informationvia the display screen, the processor is configured to: prevent anysensitive or confidential information that is about to be displayed onthe display screen from being displayed.
 14. The mobile device of claim10, wherein to prevent the eavesdropper from viewing the sensitive orconfidential information via the display screen, the processor isconfigured to: generate a warning to an authorized user or owner of themobile device that an eavesdropper is viewing the display screen, anddisplay the warning on the display screen to the authorized user orowner.
 15. The mobile device of claim 10, wherein to detect theeavesdropper is viewing the display screen, the processor is configuredto: take or capture one or more images via a camera mounted on themobile device; and analyze the one or more images, or associated imagedata to determine that the eavesdropper is viewing the display screen.16. The mobile device of claim 10, wherein to detect the eavesdropper isviewing the display screen, the processor is configured to: take orcapture one or more images via a camera mounted on the mobile device;analyze the one or more images, or associated image data to determinecharacteristics of a person that is looking at or viewing the displayscreen; compare the characteristics of the person with facial, eye, orother facial characteristics of the authorized user or owner todetermine whether the person is the authorized user or owner, or apotential eavesdropper; and blur any sensitive or confidentialinformation when it is determined that the potential eavesdropper isviewing the display screen.
 17. The mobile device of claim 10, whereinthe processor is further configured to: determine that a user isaccessing the internet or another wireless communication network, and isdirecting the mobile device to a website associated with a bank,financial services provider, or insurance provider.
 18. The mobiledevice of claim 17, wherein to prevent the eavesdropper from viewing thesensitive or confidential information via the display screen, theprocessor is configured to: (i) prevent internet access to the website;or (ii) direct the user to a secondary website associated with the bank,financial services provider, or insurance provider where at most limitedconfidential or sensitive information is displayed or accessed.
 19. Anon-transitory computer-readable memory storing thereon instructionsthat, when executed by one or more processors, cause the one or moreprocessors to: execute an eavesdropper detection application; detect aneavesdropper is viewing a display screen associated with a computingdevice for more than a threshold duration of at least one second;determine that sensitive or confidential information is being displayed,or about to be displayed, on the display screen; and prevent theeavesdropper from viewing the sensitive or confidential information viathe display screen to facilitate hiding sensitive or confidentialinformation.
 20. The computer-readable memory of claim 19, wherein toprevent the eavesdropper from viewing the sensitive or confidentialinformation via the display screen, the instructions cause the one ormore processors to: (a) blur or mask the sensitive or confidentialinformation that is being displayed, or about to being displayed, on thedisplay screen; (b) remove the sensitive or confidential informationfrom being displayed on the display screen; (c) prevent any sensitive orconfidential information that is about to be displayed on the displayscreen from being displayed; or (d) generate a warning to an authorizeduser or owner of the computing device that an eavesdropper is viewingthe display screen, and display the warning on the display screen to theauthorized user or owner.