Systems and methods of transforming electronic content

ABSTRACT

Exemplary embodiments are directed to systems and methods of transforming electronic content. Exemplary embodiments can electronically capture or receive a first electronic content and a second electronic content with a first electronic device. Exemplary embodiments can execute an assignment function to designate the first electronic content as a hidden electronic content and to designate the second electronic content as a cover electronic content. Exemplary embodiments can execute an encryption function that receives as input the hidden electronic content and the cover electronic content, and that outputs an encrypted electronic content and a decryption key. The encrypted electronic content can overlay the cover electronic content over the hidden electronic content such that, prior to decryption, only the cover electronic content is viewable at a location of a graphical user interface.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application claims the benefit of a U.S. Provisional PatentApplication No. 62/170,900, which was filed on Jun. 4, 2015. The entirecontent of the foregoing provisional application is incorporated hereinby reference.

TECHNICAL FIELD

The present disclosure relates to systems and methods of transformingelectronic content and, in particular, to systems and methods ofencrypting electronic content to provide confidential saving and/orsharing of the electronic content.

BACKGROUND

Photographs and videos have been used historically to capture stillimages and dynamic content. With the advent of portable electronicdevices, such as smart phones or tablets, sharing of captured image andvideo content (and text messages) has increased significantly. Sharingof content through portable electronic devices has also resulted inincreased privacy concerns, including privacy regarding content storedon a user's own device and privacy regarding control of what happenswith content shared to another user, such as a friend.

Thus, a need exists for systems and methods of transforming electroniccontent on a device that provides security for content saved on thedevice and/or shared with other users. A further need exits for systemsand methods of transforming electronic content to permit confidentialsaving and/or sharing of the electronic content. These and other needsare addressed by the systems and methods of transforming electroniccontent of the present disclosure.

SUMMARY

In accordance with embodiments of the present disclosure, exemplarymethods of transforming electronic content are provided. The methodsinclude electronically capturing or receiving a first electronic contentand a second electronic content with a first electronic device, e.g., acomputer, a smart phone, a tablet, or the like. The methods furtherinclude programmatically executing an assignment function with anassignment engine to designate the first electronic content as a hiddenelectronic content and to designate the second electronic content as acover electronic content. The methods include programmatically executingan encryption function with an encryption engine that receives as inputthe hidden electronic content and the cover electronic content, and thatoutputs an encrypted electronic content and a decryption key. Theencrypted electronic content can overlay the cover electronic contentover the hidden electronic content such that, prior to decryption, onlythe cover electronic content is viewable at a location of a graphicaluser interface (GUI), e.g., at the first electronic device, the secondelectronic device, or both. The location of the GUI can be, for example,a camera roll located on the first and/or second electronic device.

The first electronic content and the second electronic content can be atleast one of, e.g., a photograph, a video, text, combinations thereof,or the like. In some embodiments, the first and second electroniccontent can be the same type of content. In some embodiments, the firstand second electronic content are not the same type of content. Themethods include programmatically executing a transmission function witha transmission engine to transmit the encrypted electronic content andthe decryption key to a second electronic device. The second electronicdevice can include a GUI.

The methods include programmatically executing on the second electronicdevice a decryption function with a decryption engine that receives asinput the encrypted electronic content and a decryption key, and thatoutputs the hidden electronic content to the GUI of the secondelectronic device. In some embodiments, the methods includeprogrammatically executed on the first electronic device a decryptionfunction with a decryption engine that receives as input the encryptedelectronic content and the decryption key, and that outputs the hiddenelectronic content to a second location of the GUI of the firstelectronic device.

In some embodiments, executing the decryption function to output thehidden electronic content can include providing a physical input from auser on the GUI of the second electronic device, e.g., through a touchscreen of the GUI, with an input device, or the like. In someembodiments, the physical input from the user can include a touch andhold at a single point of the GUI. In some embodiments, the physicalinput from the user can include a touch and a hold at four or moredifferent points on the GUI. The physical input from the user canprevent the user from capturing a snapshot or screenshot of the GUIshowing the hidden electronic content.

The methods include storing the encrypted electronic content in anelectronic content database associated with the first electronic device.The encrypted electronic content can be viewable on the GUI of the firstelectronic device at a second location, e.g., through an applicationinterface of the disclosed system.

In some embodiments, the methods can include programmatically executinga distribution rights function with a distribution rights engine toassign one or more distribution rights to the encrypted electroniccontent. The methods can include programmatically executing thetransmission function with the transmission engine to transmit theencrypted content to the second electronic device, the distributionrights limiting or preventing distribution of the encrypted electroniccontent from the second electronic device to a third electronic device.

In some embodiments, the methods can include programmatically executinga viewing rights function with a viewing rights engine to assign one ormore viewing rights to the encrypted electronic content. The viewingrights can designate at least one of a time limit for viewing theencrypted electronic content, or a number of permitted views of theencrypted electronic content. In some embodiments, the methods caninclude programmatically executing a viewing rights function with aviewing rights engine to assign a download preference to the encryptedelectronic content. The download preference can indicate whether therecipient of the encrypted electronic content can download the encryptedelectronic content to the recipient's electronic device. The viewingrights can be selected by the user prior to encryption such that theviewing rights are incorporated directly into the encrypted electroniccontent.

In some embodiments, the methods can include programmatically executinga self-destruct function with a self-destruct engine upon reaching atleast one of the time limit, or the number of permitted views assignedto the encrypted electronic content by the viewing rights function. Theself-destruct function can include removing or altering the decryptionkey associated with the encrypted electronic content to preventdecryption of the encrypted electronic content. Executing theself-destruct function can permanently prevent viewing the hiddenelectronic content via the GUI, while permitting viewing of the coverelectronic content via the GUI. In some embodiments, the self-destructfunction can automatically delete or erase all data associated with theencrypted electronic content (e.g., both the hidden electronic contentand the cover electronic content) from the electronic device.

In accordance with embodiments of the present disclosure, exemplarynon-transitory computer-readable medium storing instructions areprovided that are executable by a processing device. Execution of theinstructions by the processing device can cause the processing device toelectronically capture or receive a first electronic content and asecond electronic content with a first electronic device. Execution ofthe instructions by the processing device can cause the processingdevice to programmatically execute an assignment function with anassignment engine to designate the first electronic content as a hiddenelectronic content and to designate the second electronic content as acover electronic content. Execution of the instructions by theprocessing device can cause the processing device to programmaticallyexecute an encryption function with an encryption function that receivesas input the hidden electronic content and the cover electronic content,and that outputs an encrypted electronic content and a decryption key.The encrypted electronic content can overlay the cover electroniccontent over the hidden electronic content such that, prior todecryption, only the cover electronic content is viewable at a locationon a GUI.

Execution of the instructions by the processing device can cause theprocessing device to programmatically execute a transmission functionwith a transmission engine to transmit the encrypted electronic contentand the decryption key to a second electronic device. The secondelectronic device can include a GUI. Execution of the instructions bythe processing device (e.g., of the first electronic device and/or thesecond electronic device) can cause the processing device toprogrammatically execute a decryption function with a decryption enginethat receives as input the encrypted electronic content and thedecryption key, and that outputs the hidden electronic content.

In some embodiments, execution of the instructions by the processingdevice can cause the processing device to programmatically execute adistribution rights function with a distribution rights engine to assigndistribution rights to the encrypted electronic content. Execution ofthe instructions by the processing device can cause the processingdevice to programmatically execute a transmission function with atransmission engine to transmit the encrypted electronic content to asecond electronic device, the distribution rights limiting or preventingdistribution of the encrypted electronic content from the secondelectronic device to a third electronic device.

In some embodiments, execution of the instructions by the processingdevice can cause the processing device to programmatically execute aviewing rights function with a viewing rights engine to assign viewingrights to the encrypted electronic content. The viewing rights can atleast one of designate a time limit for viewing the encrypted electroniccontent, or designate a number of permitted views of the encryptedelectronic content. In some embodiments, execution of the instructionsby the processing device can cause the processing device to execute aself-destruct function upon at least one of reaching the time limit, orreaching the number of permitted views. The self-destruction functioncan remove or alter the decryption key associated with the encryptedelectronic content to prevent decryption of the encrypted electroniccontent.

In accordance with embodiments of the present disclosure, exemplarysystems of transforming electronic content are provided. The systemsinclude a first electronic device and a second electronic device. Thefirst electronic device can include a first GUI, a first non-transitorycomputer-readable medium, and a first processing device. The secondelectronic device can include a second GUI, a second non-transitorycomputer-readable medium, and a second processing device. The firstprocessing device of the first electronic device can be configured toprogrammatically execute instructions stored in the first non-transitorycomputer-readable medium to electronically capture or receive a firstelectronic content and a second electronic content with the firstelectronic device. The first processing device of the first electronicdevice can be configured to execute instructions stored in the firstnon-transitory computer-readable medium to programmatically execute anassignment function with an assignment engine to designate the firstelectronic content as a hidden electronic content and to designate thesecond electronic content as a cover electronic content.

The first processing device of the first electronic device can beconfigured to execute instructions stored in the first non-transitorycomputer-readable medium to programmatically execute an encryptionfunction with an encryption engine that receives as input the hiddenelectronic content and the cover electronic content, and that outputs anencrypted electronic content and a decryption key. The encryptedelectronic content can overlay the cover electronic content over thehidden electronic content such that, prior to decryption, only the coverelectronic content is visible. The first processing device of the firstelectronic device can be configured to execute instructions stored inthe first non-transitory computer-readable medium to programmaticallyexecute a transmission function with a transmission engine to transmitthe encrypted electronic content and the decryption key to the secondelectronic device.

The second processing device of the second electronic device can beconfigured to execute instructions stored in the second non-transitorycomputer-readable medium to electronically receive the encryptedelectronic content and the decryption key from the first electronicdevice. The second processing device of the second electronic device canbe configured to execute instructions stored in the secondnon-transitory computer-readable medium to programmatically execute adecryption function with a decryption engine that receives as input theencrypted electronic content and the decryption key, and that outputsthe hidden electronic content.

The first processing device of the first electronic device can beconfigured to execute instructions stored in the first non-transitorycomputer-readable medium to programmatically execute a distributionrights function with a distribution rights engine to assign distributionrights to the encrypted electronic content. The distribution rights canlimit or prevent distribution of the encrypted electronic content fromthe second electronic device to a third electronic device. The firstprocessing device of the first electronic device can be configured toexecute instructions stored in the first non-transitorycomputer-readable medium to programmatically execute a viewing rightsfunction with a viewing rights engine to assign viewing rights to theencrypted electronic content. The viewing rights at least one ofdesignate a time limit for viewing the encrypted electronic content, ordesignate a number of permitted views of the encrypted electroniccontent.

The second processing device of the second electronic device can beconfigured to execute instructions stored in the second non-transitorycomputer-readable medium to programmatically execute a self-destructfunction upon at least one of reaching the time limit, or reaching thenumber of permitted views. The self-destruction function can remove oralter the decryption key associated with the encrypted electroniccontent to prevent decryption of the encrypted electronic content.

In accordance with embodiments of the present disclosure, exemplarymethods of transforming electronic content are provided. The methodsinclude electronically capturing or receiving a first electronic contentand a second electronic content with a first electronic device. Themethods include programmatically executing an assignment function withan assignment engine to designate the first electronic content as ahidden electronic content and to designate the second electronic contentas a cover electronic content. The methods include programmaticallyexecuting an encryption function with an encryption engine that receivesas input the hidden electronic content and the cover electronic content,and that outputs an encrypted electronic content and a decryption key.The encrypted electronic content can overlay the cover electroniccontent over the hidden electronic content such that prior to decryptiononly the cover electronic content is visible.

The methods include programmatically executing a transmission functionwith a transmission engine to transmit the encrypted electronic contentand the decryption key to a second electronic device. The secondelectronic device can include a GUI. The methods includeprogrammatically executing a decryption function with a decryptionengine on the second electronic device that receives as input theencrypted electronic content and the decryption key, and that outputsthe hidden electronic content. Executing the decryption function on thesecond electronic device can include providing a physical input from auser at four or more different points on the GUI.

In some embodiments, the methods can include programmatically executinga distribution rights function with a distribution rights engine toassign distribution rights to the encrypted electronic content. Thedistribution rights can limit or prevent distribution of the encryptedelectronic content from the second electronic device to a thirdelectronic device, e.g., from a second user to a third user. In someembodiments, the methods can include programmatically executing aviewing rights function with a viewing rights engine to assign viewingrights to the encrypted electronic content. The viewing rights can atleast one of designate a time limit for viewing the encrypted electroniccontent, or designate a number of permitted views of the encryptedelectronic content.

In some embodiments, the methods can include programmatically executinga self-destruction function with a self-destruct engine upon at leastone of reaching the time limit, or reaching the number of permittedviews. The self-destruction function can remove or alter the decryptionkey associated with the encrypted electronic content to preventdecryption of the encrypted electronic content.

In accordance with embodiments of the present disclosure, exemplarynon-transitory computer-readable medium storing instructions that areexecutable by a processing device are provided. Execution of theinstructions by the processing device can cause the processing device toelectronically capture or receive a first electronic content and asecond electronic content with the first electronic device. Execution ofthe instructions by the processing device can cause the processingdevice to programmatically execute an assignment function with anassignment engine to designate the first electronic content as a hiddenelectronic content and to designate the second electronic content as acover electronic content. Execution of the instructions by theprocessing device can cause the processing device to programmaticallyexecute an encryption function with an encryption engine that receivesas input the hidden electronic content and the cover electronic content,and that outputs an encrypted electronic content and a decryption key.The encrypted electronic content can overlay the cover electroniccontent over the hidden electronic content such that, prior todecryption, only the cover electronic content is viewable or visible.

Execution of the instructions by the processing device can cause theprocessing device to programmatically transmit the encrypted electroniccontent and the decryption key to a second electronic device. The secondelectronic device can include a GUI. Execution of the instructions bythe processing device can cause the processing device toprogrammatically execute a decryption function with a decryption engineon the second electronic device that receives as input the encryptedelectronic content and the decryption key, and that outputs the hiddenelectronic content. Executing the decryption function on the secondelectronic device can include providing a physical input from a user atfour or more different points on the GUI.

In some embodiments, execution of the instructions by the processingdevice can cause the processing device to programmatically execute adistribution rights function with a distribution rights engine to assigndistribution rights to the encrypted electronic content. Thedistribution rights can limit or prevent distribution of the encryptedelectronic content from the second electronic device to a thirdelectronic device. In some embodiments, execution of the instructions bythe processing device can cause the processing device toprogrammatically execute a viewing rights function with a viewing rightsengine to assign viewing rights to the encrypted electronic content. Theviewing rights at least one of designate a time limit for viewing theencrypted electronic content, or designate a number of permitted viewsof the encrypted electronic content.

In some embodiments, execution of the instructions by the processingdevice can cause the processing device to programmatically execute aself-destruct function with a self-destruct engine upon at least one ofreaching the time limit, or reaching the number of permitted views. Theself-destruct function can remove or alter the decryption key associatedwith the encrypted electronic content to prevent decryption of theencrypted electronic content.

In accordance with embodiments of the present disclosure, exemplarysystems of transforming electronic content are provided. The systemsinclude a first electronic device and a second electronic device. Thefirst electronic device can include a first GUI, a first non-transitorycomputer-readable medium, and a first processing device. The secondelectronic device can include a second GUI, a second non-transitorycomputer-readable medium, and a second processing device.

The processing device of the first electronic device can be configuredto execute instructions stored in the first non-transitorycomputer-readable medium to electronically capture or receive a firstelectronic content and a second electronic content with the firstelectronic device. The processing device of the first electronic devicecan be configured to execute instructions stored in the firstnon-transitory computer-readable medium to programmatically execute anassignment function with an assignment engine to designate the firstelectronic content as a hidden electronic content and to designate thesecond electronic content as a cover electronic content.

The processing device of the first electronic device can be configuredto execute instructions stored in the first non-transitorycomputer-readable medium to programmatically execute an encryptionfunction with an encryption engine that receives as input the hiddenelectronic content and the cover electronic content, and that outputs anencrypted electronic content and a decryption key. The encryptedelectronic content can overlay the cover electronic content over thehidden electronic content such that, prior to decryption, only the coverelectronic content is visible. The processing device of the firstelectronic device can be configured to execute instructions stored inthe first non-transitory computer-readable medium to programmaticallyexecute a transmission function with a transmission engine to transmitthe encrypted electronic content and the decryption key to a secondelectronic device. The second electronic device can include a GUI.

The second processing device of the second electronic device can beconfigured to execute instructions stored in the second non-transitorycomputer-readable medium to electronically receive the encryptedelectronic content and the decryption key from the first electronicdevice. The second processing device of the second electronic device canbe configured to execute instructions stored in the secondnon-transitory computer-readable medium to programmatically execute adecryption function with a decryption engine on the second electronicdevice that receives as input the encrypted electronic content and thedecryption key, and that outputs the hidden electronic content.Executing the decryption function on the second electronic device caninclude providing a physical input from a user at four or more differentpoints on the second GUI.

The processing device of the first electronic device can be configuredto execute instructions stored in the first non-transitorycomputer-readable medium to programmatically execute a distributionrights function with a distribution rights engine to assign distributionrights to the encrypted electronic content. The distribution rights canlimit or prevent distribution of the encrypted electronic content fromthe second electronic device to a third electronic device. Theprocessing device of the first electronic device can be configured toexecute instructions stored in the first non-transitorycomputer-readable medium to programmatically execute a viewing rightsfunction with a viewing rights engine to assign viewing rights to theencrypted electronic content. The viewing rights at least one ofdesignate a time limit for viewing the encrypted electronic content, ordesignate a number of permitted views of the encrypted electroniccontent.

The second processing device of the second electronic device can beconfigured to execute instructions stored in the second non-transitorycomputer-readable medium to programmatically execute a self-destructfunction with a self-destruct engine upon at least one of reaching thetime limit, or reaching the number of permitted views. Theself-destruction function can remove or alter the decryption keyassociated with the encrypted electronic content to prevent decryptionof the encrypted electronic content.

Any combination and/or permutation of embodiments is envisioned. Otherobjects and features will become apparent from the following detaileddescription considered in conjunction with the accompanying drawings. Itis to be understood, however, that the drawings are designed as anillustration only and not as a definition of the limits of the presentdisclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

To assist those of skill in the art in making and using the disclosedsystems and methods of transforming electronic content, reference ismade to the accompanying figures, wherein:

FIG. 1 is a block diagram of an electronic content transformation systemin accordance with exemplary embodiments of the present disclosure.

FIG. 2 is a block diagram of a first electronic device of an electroniccontent transformation system in accordance with exemplary embodimentsof the present disclosure.

FIG. 3 is a block diagram of an electronic content database of a firstelectronic device in accordance with embodiments of the presentdisclosure.

FIG. 4 is a block diagram of a second electronic device of an electroniccontent transformation system in accordance with exemplary embodimentsof the present disclosure.

FIG. 5 is a block diagram of an electronic content database of a secondelectronic device in accordance with embodiments of the presentdisclosure.

FIG. 6 is a block diagram of an assignment engine of a first electronicdevice in accordance with embodiments of the present disclosure.

FIG. 7 is a block diagram of an encryption engine of a first electronicdevice in accordance with embodiments of the present disclosure.

FIG. 8 is a block diagram of a decryption engine of a first electronicdevice in accordance with embodiments of the present disclosure.

FIG. 9 is a block diagram of a viewing rights engine of a firstelectronic device in accordance with embodiments of the presentdisclosure.

FIG. 10 is a block diagram of a decryption engine of a second electronicdevice in accordance with embodiments of the present disclosure.

FIG. 11 is a block diagram of a self-destruct engine of a secondelectronic device in accordance with embodiments of the presentdisclosure.

FIG. 12 is a block diagram of a computing device configured to implementembodiments of an electronic content transformation system in accordancewith embodiments of the present disclosure.

FIG. 13 is a block diagram of a distributed environment for implementingembodiments of an electronic content transformation system in accordancewith embodiments of the present disclosure.

FIG. 14 is a flowchart illustrating implementation of an electroniccontent transformation system in accordance with embodiments of thepresent disclosure.

FIG. 15 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows an introduction interface.

FIG. 16 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows an assignment and encryption interface.

FIG. 17 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows a settings interface.

FIG. 18 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows a settings interface.

FIG. 19 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows an assignment and encryption interface.

FIG. 20 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows an assignment and encryption interface.

FIG. 21 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows an assignment and encryption interface.

FIG. 22 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows an electronic content storage interface.

FIG. 23 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows a decryption interface.

FIG. 24 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows a decryption interface.

FIG. 25 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows a social media interface.

FIG. 26 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows a sending interface.

FIG. 27 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows a viewing rights interface.

FIG. 28 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows a receiving interface.

FIG. 29 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows a communication interface.

FIG. 30 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows a viewing rights interface.

FIG. 31 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows a message destruction interface.

FIG. 32 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows a message destruction interface menu.

FIG. 33 is a graphical user interface window of an electronic contenttransformation system in accordance with embodiments of the presentdisclosure, which shows a message destruction interface confirmation.

DETAILED DESCRIPTION

Exemplary embodiments of the present disclosure are directed to systemsand methods of transforming electronic content on a device in a way thatprovides security for the electronic content saved on the device and/orshared with other users. The exemplary systems and methods encrypt theelectronic content such that, prior to decryption, the hidden electroniccontent is overlaid or covered by the cover electronic content. Theexemplary systems and methods further provide means for sharingelectronic content in a confidential manner and limiting distributionand/or viewing rights of the user receiving the electronic content(e.g., making the electronic content to be shared ephemeral).

FIG. 1 is a block diagram of an exemplary electronic contenttransformation system 100 (hereinafter “system 100”). The system 100 caninclude a first electronic device 102 and a second electronic device 104communicatively linked relative to each other through a communicationsnetwork, e.g., a wireless network, a wired network, or the like, shownby the dashed line. The communications network provides a means forelectronic data to be transferred between the first and secondelectronic devices 102, 104. In some embodiments, the first and secondelectronic device 102, 104 can be, e.g., a computer, a smart phone, atablet, or the like. Although illustrated as including two electronicdevices, it should be understood that the system 100 can include two ormore electronic devices.

FIG. 2 is a block diagram of the first electronic device 102 of thesystem 100. The first electronic device 102 can include an electroniccontent database 106 for storing a variety of electronic content, suchas photographs, videos, texts, combinations thereof, or the like,captured or received at the first electronic device 102. The firstelectronic device 102 can include an assignment engine 108, anencryption engine 110, a decryption engine 112, and a transmissionengine 114. In some embodiments, the first electronic device 102 caninclude a distribution rights engine 116 and a viewing rights engine118. The first electronic device 102 can include a user interface 120including a graphical user interface (GUI) 122. The GUI 122 can be usedto generate and/or view electronic content, and to implement the engines108-118 of the first electronic device 102. The engines 108-118 can beused by the first electronic device 102 to generate encrypted electroniccontent to be sent to other users and/or to store within the electroniccontent database 106.

The assignment engine 108 can programmatically execute an assignmentfunction to designate a first electronic content as the hiddenelectronic content and to designate a second electronic content as thecover electronic content. The encryption engine 110 can be used toencrypt the hidden and cover electronic content to generate an encryptedelectronic content and an associated decryption key. In someembodiments, the encryption can be via, e.g., RSA encryption, layeredencryption security (LES), or the like. The encrypted electronic contentcan include the cover electronic content overlaid to hide the hiddenelectronic content from view prior to decryption. The decryption engine112 can be used to decrypt the encrypted electronic content with theappropriate decryption key such that the hidden electronic content canbe viewed.

The transmission engine 114 can be used to transmit the encryptedelectronic content and the associated decryption key to the secondelectronic device 104. The distribution rights engine 116 can be used toassign one or more distribution rights to the encrypted electroniccontent. The distribution rights can limit or prevent distribution ofthe encrypted electronic content from the second electronic device 104to a third electronic device, e.g., distribution the encryptedelectronic content to other users. The viewing rights engine 118 can beused to assign one or more viewing rights to the encrypted electroniccontent. The viewing rights can limit, e.g., the time limit for viewingthe encrypted electronic content, the number of permitted times theencrypted electronic content can be viewed, a download limit of theencrypted electronic content to an electronic device of the recipient,combinations thereof, or the like. The operation of the engines 108-118will be discussed in greater detail below.

FIG. 3 is a block diagram of the electronic content database 106 of thefirst electronic device 102. The electronic content database 106 canelectronically store therein first electronic content 124 and secondelectronic content 126. The first and second electronic content 124, 126can be, e.g., a photograph, a video, a text, combinations thereof, orthe like. It should be understood that the electronic content database106 can store a larger number of electronic content. The first andsecond electronic content 126 can be captured by a user through anelectronic capture means of the first electronic device 102, such as acamera or a keyboard, or can be received by the first electronic device102 from another device.

The electronic content database 106 can electronically store thereinencrypted electronic content 128 and one or more decryption keys 130. Aswill be discussed in greater detail below, the encryption engine 110 ofthe first electronic device 102 can be used to generate the encryptedelectronic content 128 and the decryption key 130 associated with theencrypted electronic content 128. In particular, each decryption key 130can be generated specifically for decryption of the encrypted electroniccontent 128.

FIG. 4 is a block diagram of the second electronic device 104. Thesecond electronic device 104 can include an electronic content database132 for storing a variety of electronic content, such as photographs,videos, texts, combinations thereof, or the like, captured or receivedat the second electronic device 104. For example, the electronic contentdatabase 132 can store electronic content sent from the first electronicdevice 102. The second electronic device 104 can include a decryptionengine 134 and a transmission engine 136. In some embodiments, thesecond electronic device 104 can include a self-destruct engine 138. Thesecond electronic device 104 can include a user interface 140 includinga GUI 142. The GUI 142 can be used to generate and/or view electroniccontent, and to implement the engines 134-138 of the first electronicdevice 102.

FIG. 5 is a block diagram of the electronic content database 132 of thesecond electronic device 104. The electronic content database 132 canstore therein encrypted electronic content 144 and one or moredecryption keys 146. For example, the encrypted electronic content 144and the associated decryption key 146 can correspond to the encryptedelectronic content 132 and the decryption key 130 generated and sentfrom the first electronic device 102. In some embodiments, the encryptedelectronic content 144 and the associated decryption key 146 cancorrespond to data received from other devices/users and/or encrypteddata generated at the second electronic device 104.

It should be understood that the block diagrams of FIGS. 2-5 areprovided for illustrative purposes only. In particular, FIGS. 2-5illustrate a system 100 in which encrypted electronic content 128 isgenerated at the first electronic device 102 and sent to the secondelectronic device 104 for decryption. However, in some embodiments, thesecond electronic device 104 can also be used to generate encryptedelectronic content to be sent to the first electronic device 102. Assuch, in some embodiments, the second electronic device 104 can include(in addition to or in combination with the electronic content database132 and the engines 134-138) the electronic content database 106 and theengines 108-118 substantially similar to those of the first encryptiondevice 102 to permit the second electronic device 104 to generate andsend the encrypted electronic content to the first electronic device102. Similarly, in some embodiments, the first electronic device 102 caninclude (in addition to or in combination with the electronic contentdatabase 106 and the engines 108-118) the electronic content database132 and the engines 134-138 substantially similar to those of the secondelectronic device 104 to permit the first electronic device 102 toreceive and decrypt the encrypted electronic content sent from thesecond electronic device 104.

FIG. 6 is a block diagram of the assignment engine 108 of the firstelectronic device 102. The assignment engine 108 can programmaticallyexecute an assignment function that receives as input the firstelectronic content 124 and the second electronic content 126 and thatoutputs a hidden electronic content 148 and a cover electronic content150. In particular, the user of the first electronic device 102 can usethe assignment engine 108 to input, through the GUI 122, the firstelectronic content 124 to be designated or labeled as the hiddenelectronic content 148, i.e., the electronic content to be hidden fromview when encrypted. The user can further use the assignment engine 108to input, through the GUI 122, the second electronic content 126 to bedesignated or labeled as the cover electronic content 150, i.e., theelectronic content to overlay the hidden electronic content 148 and beviewable prior to decryption of the encrypted electronic content 128.

FIG. 7 is a block diagram of the encryption engine 110 of the firstelectronic device 102. The encryption engine 110 can programmaticallyexecute an encryption function to encrypt the hidden electronic content148 and the cover electronic content 150 such that, prior to decryption,only the cover electronic content 150 is viewable to the user and thirdparties. The encryption engine 110 can receive as input the hiddenelectronic content 148 and the cover electronic content 150, and outputsan encrypted electronic content 152 and a decryption key 154 associatedwith the encrypted electronic content 152. In some embodiments, theencryption engine 110 can optionally receive as input a decryptionpreference 151. The decryption preference 151 can be designated by theuser and can indicate whether physical input by a user is necessary toexecute a decryption function on the first and/or second electronicdevice 102, 104. The decryption preference 151 can be programmaticallyincorporated into or linked to the encrypted electronic content 152 bythe encryption engine 110. As will be discussed in greater detail below,the decryption preference 151 can act as a security measure to preventscreenshots or snapshots from being taken of the hidden electroniccontent 148 during decryption.

The encrypted electronic content 152 and the decryption key 154 can besaved in the electronic content database 106 for future access. In someembodiments, the decryption key 154 can be incorporated and/or codeddirectly into the encrypted electronic content 152 such that twoseparate files are not necessary for decryption. In some embodiments,the decryption key 154 can be a separate file from the encryptedelectronic content 152 and can be programmatically connected or tied tothe encrypted electronic content 152 such that the appropriatedecryption key 154 is used when decryption occurs.

The decryption key 154 can be uniquely generated by the encryptionengine 110 to decrypt the encrypted electronic content 152. Thus, eachencrypted electronic content 152 generated by the encryption engine 110can include a unique decryption key 154. During encryption, theencryption engine 110 can overlay the cover electronic content 150 overthe hidden electronic content 148, thereby hiding the hidden electroniccontent 148 from view at a first location of the GUI 122, 142, e.g., thecamera roll of the first and/or second electronic device 102, 104. Thus,if a user or a third party attempts to view the encrypted electroniccontent 152 on the first and/or second electronic device 102, 104 at thefirst location, only the cover electronic content 150 will be visible.

As an example, a user can select a first photograph that the user wouldlike to hide from regular view and can further select a secondphotograph as a photograph that will be viewable prior to decryption.The first photograph can thereby act as the hidden electronic content148 and the second photograph can act as the cover electronic content150. As noted above, the encryption engine 110 can encrypt the first andsecond photographs such that the cover electronic content 150 overlaysthe hidden electronic content 148 and, prior to decryption, only thecover electronic content 150 is viewable. Thus, if the user encrypts thefirst and second photographs and the resulting encrypted photograph issaved on the camera roll of the first electronic device 102, only thesecond photograph (i.e., the cover electronic content 150) will beviewable prior to decryption and the first photograph (i.e., the hiddenelectronic content 148) will not be viewable at the first location. Asimilar decryption can occur if the encrypted electronic content 152 issent to the second electronic device 104.

FIG. 8 is a block diagram of the decryption engine 112 of the firstelectronic device 102. The decryption engine 112 can be used to decryptthe encrypted electronic content 152 is saved to, e.g., the camera rollor another storage medium, on the first electronic device 102 for futureviewing. The decryption engine 112 can programmatically execute adecryption function that receives as input the encrypted electroniccontent 152 and the associated decryption key 154 generated by theencryption engine 110, and that outputs the hidden electronic content148 at a second location of the first electronic device 102, e.g., anapplication associated with the system 100.

In some embodiments, the encryption engine 110 can be used to receive asinput from the user a preference for how decryption can be activated bythe user and/or users who receive the encrypted electronic content 152.The preference for decryption can be input by the user prior toexecuting the encryption function such that the preferences can beprogrammatically tied to the encrypted electronic content 152. Thepreferences can include, for example, automatic decryption, physicalinput at a single point on the GUI, physical input at multiple points onthe GUI, or the like.

In some embodiments, opening the encrypted electronic content 152 in anapplication on the first and/or second electronic device 102, 104 canautomatically execute the decryption function to expose the hiddenelectronic content 148. In some embodiments, the encrypted electroniccontent 152 can be opened in the application associated with the system100 on the first and/or second electronic device 102, 104 and physicalinput is required from the user via the GUI 122, 152 to execute thedecryption function and expose the hidden electronic content 148.

In some embodiments, the physical input can be a touch and hold at asingle point on the GUI 122, 152. In some embodiments, the user cantouch and hold at a single point on the GUI 122, 152 and the hiddenelectronic content 148 can be exposed until the user removes thephysical input. For example, the user can touch and hold at a singlepoint on the GUI 122, 152 with one finger or an input device, such as amouse, to view the hidden electronic content 148. Lifting the finger orreleasing the mouse button can stop execution of the decryptionfunction, thereby hiding the hidden electronic content 148 behind thecover electronic content 150 until further decryption is performed.

In some embodiments, the physical input can be a touch and hold atmultiple different points on the GUI 122, 152. For example, the physicalinput can be a touch and hold at four or more different points on theGUI 122, 152. This can be accomplished on a touchscreen by using four ormore different fingers to press on the GUI 122, 152. The physical inputof multiple different points can act as a safety feature to physicallyprevent the user from generating a screenshot of the GUI 122, 152 on thefirst and/or second electronic device 102, 104. For example, on theiPhone®, a screenshot can be taken of the GUI by holding the “Home”button and simultaneously clicking the “Sleep/Wake” button, therebysaving a photo of the GUI in the camera roll. Screenshots of the GUI122, 152 can be problematic if a user on the second electronic device104 desires to capture a screenshot of the hidden electronic content 148after decryption. The physical input at multiple different points on theGUI 122, 152 can physically limit or prevent the user from providing thenecessary physical input while simultaneously depressing the necessarybuttons on the electronic device to capture the screenshot. The physicalinput requirement thereby acts as a security measure to limit or preventscreenshots during decryption.

In some embodiments, with respect to encrypted electronic content 152created on the first electronic device 102, decryption can be performedon the first electronic device 102 without time and/or viewing limits.In some embodiments, with respect to encrypted electronic content 152created on the first electronic device 102, the user can designate oneor more limitations on decryption. For example, one or more limitationscan be created to limit the rights of third parties who receive theencrypted electronic content 152 from the first electronic device 102,thereby preventing widespread distribution and/or unlimited viewing ofthe hidden electronic content 148. In some embodiments, one or morelimitations created to limit the rights of third parties who receive theencrypted electronic content 152 can be adjusted and/or applied by theuser of the first electronic device 102 at a point in time afterelectronically transmitting the encrypted electronic content 152 to thesecond electronic device 104.

In some embodiments, the distribution rights engine 116 of FIG. 2 can beprogrammatically executed to run a distribution rights function toassign one or more distribution rights to the encrypted electroniccontent 152. In some embodiments, the distribution rights function canbe executed prior to or during encryption such that the encryptedelectronic content 152 programmatically includes the distribution rightsassociated therewith. In some embodiments, the distribution rightsengine 116 can be incorporated into the encryption engine 110 such that,during encryption, the distribution rights are programmaticallyincorporated into or linked directly to the encrypted electronic content152.

In some embodiments, the distribution rights can completely prevent theencrypted electronic content 152 from being distributed by the userreceiving the encrypted electronic content 152 on the second electronicdevice 104. In some embodiments, the distribution rights can limit thenumber of times the encrypted electronic content 152 can be distributedby the user receiving the encrypted electronic content 152 on the secondelectronic device 104. For example, the distribution rights can limitthe user to one, two, three, or the like, times the encrypted electroniccontent 152 can be distributed to other users and/or other electronicdevices from the second electronic device 104. In some embodiments, whenthe user distributes the encrypted electronic content 152 from thesecond electronic device 104, the distribution rights can prevent otherusers from further distributing the encrypted electronic content 152.

In some embodiments, the distribution rights can limit the total numberof times the encrypted electronic content 152 can be distributed. Forexample, the distribution rights can limit the total number of times theencrypted electronic content 152 can be distributed to one, two, three,or the like, limiting each user to a single distribution. Thus, if thetotal number of distributions allowed is set to two, the user receivingthe encrypted electronic content 152 on the second electronic device 104can distribute the encrypted electronic content 152 to a third user(i.e., a first distribution), and the third user can distribute theencrypted electronic content 152 to a fourth user (i.e., a seconddistribution). However, the distribution rights can prevent the fourthuser from further distribution the encrypted electronic content 152.

In some embodiments, in addition to or in combination with thedistribution rights, one or more viewing rights can be assigned to theencrypted electronic content 152 by programmatically executing a viewingrights function with the viewing rights engine 118. FIG. 9 is a blockdiagram of the operation of the viewing rights engine 118. The viewingrights engine 118 can receive as input one or more viewing rightspreferences 156 and outputs, e.g., a time limit 158 for viewing thehidden electronic content 148, a number of permitted views 160 of thehidden electronic content 148, a download limit 161 indicating whetherthe recipient can download the encrypted electronic content 152 to theelectronic device of the recipient, combinations thereof, or the like.In some embodiments, the viewing rights can be assigned to the encryptedelectronic content 152 after encryption has occurred at the encryptionengine 110. In some embodiments, the viewing rights engine 118 can beincorporated into the encryption engine 110 such that the viewing rightsare designated prior to encryption and, during encryption, the viewingrights are programmatically incorporated into or linked directly to theencrypted electronic content 152. In some embodiments, the viewingrights preferences 156 can apply only to the user receiving theencrypted electronic content 152 on the second electronic device 104,and do not apply to the user who generated the encrypted electroniccontent 152 on the first electronic device 102. Thus, the encryptedelectronic content 152 can be decrypted without limitations on theelectronic device on which the encrypted electronic content 152 wascreated. In some embodiments, the viewing rights preferences 156 can beadjusted and/or applied to the encrypted electronic content 152 afterthe encrypted electronic content 152 has been electronically transmittedfrom the first electronic device 102 to the second electronic device104.

For example, the time limit 158 can limit the time period in which thehidden electronic content 148 can be viewed, i.e., the time period inwhich the encrypted electronic content 152 can be decrypted. In someembodiments, the time limit 158 can be, e.g., seconds, minutes, hours,days, weeks, months, years, or the like. For example, the usergenerating the encrypted electronic content 152 on the first electronicdevice 102 can designate a viewing rights preference 156 to include atime limit 158 of five minutes. The encrypted electronic content 152 canbe transmitted to the second electronic device 104 via the transmissionengine 114. The time limit 158 can apply and begin to run after the userhas decrypted the encrypted electronic content 152 on the secondelectronic device 104 for the first time. Thus, from the first point ofdecryption of the encrypted electronic content 148 on the secondelectronic device 104, the time period designated in the time limit 158can begin to count down. A similar limit can apply if the distributionrights allow for further distribution of the encrypted electroniccontent 152. In some embodiments, the time limit 158 and/or thedistribution rights can be adjusted and/or applied by the user of thefirst electronic device 102 after the encrypted electronic content 152has been electronically transmitted to the second electronic device 104.

As a further example, the permitted views 160 can limit the number ofpermitted times the hidden electronic content 148 can be viewed, i.e.,the number of permitted times the encrypted electronic content 152 canbe decrypted. The permitted views 160 can be directly input by the usergenerating the encrypted electronic content 152 and can be, e.g., oneview, two views, three views, four views, five views, or the like. Forexample, the user generating the encrypted electronic content 152 on thefirst electronic device 102 can designate a viewing rights preference156 to include a permitted views 160 of three views. The encryptedelectronic content 152 can be transmitted to the second electronicdevice 104 via the transmission engine 114. The permitted views 160 canapply from the first decryption of the encrypted electronic content 152on the second electronic device 104 and can count down until the numberof permitted views 160 has been reached. A similar limit can apply ifthe distribution rights allow for further distribution of the encryptedelectronic content 152. In some embodiments, the permitted views 160 canbe adjusted and/or applied by the user of the first electronic device102 after the encrypted electronic content 152 has been electronicallytransmitted to the second electronic device 104.

As a further example, the download limit 161 can limit the ability ofthe recipient of the encrypted electronic content 152 to download theencrypted electronic content 152 to a storage database of the secondelectronic device 104. The download limit 161 can be directly input bythe user generating the encrypted electronic content 152 and can be aright to download or no right to download the encrypted electroniccontent 152. The encrypted electronic content 152 can be transmitted tothe second electronic device 104 via the transmission engine 114. Thedownload limit 161 can apply upon receipt of the encrypted electroniccontent 152 at the second electronic device 104. For example, if thedownload limit 161 does not allow the user to download the encryptedelectronic content 152 to the second electronic device 104, the optionto download the encrypted electronic content 152 will not appear or willbe grayed out in the user interface. As a further example, if thedownload limit 161 does allow the user to download the encryptedelectronic content 152 to the second electronic device 104, the optionto download the encrypted electronic content 152 can appear as a buttonin the user interface. The user can thereby actuate the button to savethe encrypted electronic content 152 in, e.g., the camera roll, or thelike, of the second electronic device 104. The encrypted electroniccontent 152 can appear as the cover electronic content 150 in the savedlocation prior to decryption. In some embodiments, the download limit161 can be adjusted and/or applied by the user of the first electronicdevice 102 after the encrypted electronic content 152 has beenelectronically transmitted to the second electronic device 104.

The second electronic device 104 can include a self-destruct engine 138that can be programmatically executed to alter, remove or destroy thedecryption key 154 associated with the encrypted electronic content 152upon reaching the limit of the viewing rights preferences 156. Forexample, if the time limit 158 for viewing and/or the number ofpermitted views 160 of the hidden electronic content 148 has beenreached, the self-destruct engine 138 can be executed to alter, removeor destroy the decryption key 154 such that the encrypted electroniccontent 152 can no longer be decrypted, leaving only the coverelectronic content 150 as viewable to users. In some embodiments, theself-destruct engine 138 can automatically delete or erase all dataassociated with the encrypted electronic content 152 (e.g., the hiddenelectronic content 148, the cover electronic content 150, and thedecryption key 154) from the second electronic device 104, therebypreventing viewing of any data associated with the encrypted electroniccontent 152. In some embodiments, the self-destruct engine 138 can beused remotely by the user of the first electronic device 102 to alter,remove or destroy one or more portions of the encrypted electroniccontent 152 transmitted to the second electronic device 104 at a pointin time after the encrypted electronic content 152 has been transmittedto the second electronic device 104.

In some embodiments, the viewing rights preference 156 can include boththe time limit 158 and the permitted views 160. In such embodiments, theself-destruct engine 138 can be executed to alter, remove or destroy thedecryption key 154 upon reaching a limit of one of the viewing rightspreference 156. For example, the time limit 158 can be designated asthirty minutes and the permitted views 160 can be designated as fiveviews. If the user has decrypted the encrypted electronic content 152five times to view the hidden electronic content 148 before the thirtyminute limitation has been reached, the self-destruct engine 138 can beexecuted after the fifth decryption. Thus, an attempt to decrypt theencrypted electronic content 152 a sixth time before the thirty minutelimitation has been reached will result in viewing only the coverelectronic content 150 and the hidden electronic content 148 can bepermanently hidden from view.

As noted above, the transmission engine 114 of the first electronicdevice 102 can be programmatically executed to transmit the encryptedelectronic content 152 and the decryption key 154 to the secondelectronic device 104 via, e.g., a communications network. The secondelectronic device 104 also includes the transmission engine 136 that canbe configured to receive the encrypted electronic content 152 and thedecryption key 154. In some embodiments, the encrypted electroniccontent 152 and the decryption key 154 can be saved in the electroniccontent database 132 of the second electronic device 104. For example,the encrypted electronic content 152 can be saved in the camera roll ofthe second electronic device 104. Prior to decryption, only the coverelectronic content 150 can be viewable on the second electronic device104.

The encrypted electronic content 152 can programmatically includetherein the decryption preference 151, one or more distribution rights,and/or one or more viewing rights designated by the user generating theencrypted electronic content 152 on the first electronic device 102.Upon receipt of the encrypted electronic content 152 at the secondelectronic device 104, the user can be notified via the GUI 142 of thepreferences or limitations associated with the encrypted electroniccontent 152. For example, the user can be notified of the requirementfor physical input at multiple points on the GUI 142 to decrypt theencrypted electronic content 152, the time limits for viewing the hiddenelectronic content 148, the number of permitted views of the hiddenelectronic content 148, combinations thereof, or the like.

FIG. 10 is a block diagram of the decryption engine 134 of the secondelectronic device 104. The decryption engine 134 can functionsubstantially similarly to the decryption engine 112 of the firstelectronic device 102. In particular, the decryption engine 134 can beprogrammatically executed to receive as input the encrypted electroniccontent 152 and the associated decryption key 154 received from thefirst electronic device 102, and outputs the hidden electronic content148. The decryption engine 134 can take into account the decryptionpreference 151, one or more distribution rights, and/or one or moreviewing rights associated with the encrypted electronic content 152 whendecrypting the encrypted electronic content 152. For example, thedecryption engine 134 can keep count of the time limit and/or the numberof views associated with the hidden electronic content 148.

FIG. 11 is a block diagram of the self-destruct engine 138 of the secondelectronic device 104. The self-destruct engine 138 can programmaticallyexecute a self-destruct function to alter, remove and/or destroy 162 thedecryption key 154 associated with the encrypted electronic content 152,thereby preventing subsequent decryption of the encrypted electroniccontent 152 and permanently hiding the hidden electronic content 148,leaving only the cover electronic content 150 as viewable on the secondelectronic device 104.

The self-destruct engine 138 can receive as input the time limit 158and/or the permitted views 160 limitation associated with the encryptedelectronic content 152. The self-destruct engine 138 and/or thedecryption engine 134 can keep track of a counter related to the timelimit 158 and/or permitted views 160 to ensure that neither limit hasbeen reached. Upon reaching one of the limits, the self-destruct engine138 can be executed to alter, remove and/or destroy 162 the decryptionkey 154, preventing subsequent decryption of the encrypted electroniccontent 152. Although the user may be able to distribute the encryptedelectronic content 152 to other users and/or other electronic devices,the encrypted electronic content 152 is distributed with the altered,removed and/or destroyed 162 decryption key 154, thereby preventingother users from decrypting the encrypted electronic content 152. Thehidden electronic content 148 can therefore be permanently hidden fromview, providing a safety or privacy feature for the user originating theencrypted electronic content 152.

FIG. 12 is a block diagram of a computing device 200 configured toimplement embodiments of the system 100 in accordance with embodimentsof the present disclosure. In some embodiments, the computing device 200can represent the first and/or second electronic device 102, 104. Thecomputing device 200 includes one or more non-transitorycomputer-readable media for storing one or more computer-executableinstructions or software for implementing exemplary embodiments. Thenon-transitory computer-readable media may include, but are not limitedto, one or more types of hardware memory, non-transitory tangible media(for example, one or more magnetic storage disks, one or more opticaldisks, one or more flash drives), and the like. For example, memory 206included in the computing device 200 may store computer-readable andcomputer-executable instructions or software for implementing exemplaryembodiments of the present disclosure (e.g., the one or more engines108-118 of the first electronic device 102, one or more engines 134-138of the second electronic device 104, combinations thereof, or the like).The computing device 200 also includes configurable and/or programmableprocessor 202 and associated core 204, and optionally, one or moreadditional configurable and/or programmable processor(s) 202′ andassociated core(s) 204′ (for example, in the case of computer systemshaving multiple processors/cores), for executing computer-readable andcomputer-executable instructions or software stored in the memory 206and other programs for controlling system hardware. Processor 202 andprocessor(s) 202′ may each be a single core processor or multiple core(204 and 204′) processor.

Virtualization may be employed in the computing device 200 so thatinfrastructure and resources in the computing device may be shareddynamically. A virtual machine 214 may be provided to handle a processrunning on multiple processors so that the process appears to be usingonly one computing resource rather than multiple computing resources.Multiple virtual machines may also be used with one processor.

Memory 206 may include a computer system memory or random access memory,such as DRAM, SRAM, EDO RAM, and the like. Memory 206 may include othertypes of memory as well, or combinations thereof.

A user may interact with the computing device 200 through a visualdisplay device 218, such as a computer monitor or a smart phone screen,which may display one or more user interfaces 220 that may be providedin accordance with exemplary embodiments (e.g., the user interface 120with the GUI 122, the user interface 140 with the GUI 142, or the like).The computing device 200 may include other I/O devices for receivinginput from a user, for example, a keyboard or any suitable multi-pointtouch interface 208 (e.g., a touch screen), a pointing device 210 (e.g.,a mouse), or the like. The keyboard 208 and the pointing device 210 maybe coupled to the visual display device 218. The computing device 200may include other suitable conventional I/O peripherals.

The computing device 200 may also include one or more storage devices224, such as a hard-drive, CD-ROM, or other computer readable media, forstoring data and computer-readable instructions and/or software thatimplement exemplary embodiments of the system 100 described herein.Exemplary storage device 224 may also store one or more databases 226for storing any suitable information required to implement exemplaryembodiments. For example, exemplary storage device 224 can store one ormore databases 226 for storing information, such as data stored withinthe electronic content database 106 and/or the electronic contentdatabase 132, and computer-readable instructions and/or software thatimplement exemplary embodiments described herein. The databases 226 maybe updated by manually or automatically at any suitable time to add,delete, and/or update one or more items in the databases 226.

The computing device 200 can include a network interface 212 configuredto interface via one or more network devices 222 with one or morenetworks, for example, Local Area Network (LAN), Wide Area Network (WAN)or the Internet through a variety of connections including, but notlimited to, standard telephone lines, LAN or WAN links (for example,802.11, T1, T3, 56 kb, X.25), broadband connections (for example, ISDN,Frame Relay, ATM), wireless connections, controller area network (CAN),or some combination of any or all of the above. The network interface212 may include a built-in network adapter, network interface card,PCMCIA network card, card bus network adapter, wireless network adapter,USB network adapter, modem or any other device suitable for interfacingthe computing device 200 to any type of network capable of communicationand performing the operations described herein. Moreover, the computingdevice 200 may be any computer system, such as a workstation, desktopcomputer, server, laptop, handheld computer, tablet computer (e.g., theiPad™ tablet computer), mobile computing or communication device (e.g.,the iPhone™ communication device), or other form of computing ortelecommunications device that is capable of communication and that hassufficient processor power and memory capacity to perform the operationsdescribed herein.

The computing device 200 may run any operating system 216, such as anyof the versions of the Microsoft® Windows® operating systems, thedifferent releases of the Unix and Linux operating systems, any versionof the MacOS® for Macintosh computers, any embedded operating system,any real-time operating system, any open source operating system, anyproprietary operating system, or any other operating system capable ofrunning on the computing device and performing the operations describedherein. In exemplary embodiments, the operating system 216 may be run innative mode or emulated mode. In an exemplary embodiment, the operatingsystem 216 may be run on one or more cloud machine instances.

FIG. 13 is a block diagram of a distributed environment 250 forimplementing embodiments of the system 100 in accordance withembodiments of the present disclosure. The environment 250 can includeone or more servers 252-256 operatively coupled to one or more userinterfaces 258, 260, and databases 262-266, via a communication network268, which can be any network over which information can be transmittedbetween devices communicatively coupled to the network. For example, thecommunication network 268 can be the Internet, Intranet, virtual privatenetwork (VPN), wide area network (WAN), local area network (LAN),wireless network, wired network, and the like. The environment 250 caninclude repositories or database devices 262-266, which can beoperatively coupled to the server(s) 252-256, as well as to userinterfaces 258, 260, via the communications network 268. In exemplaryembodiments, the server(s) 252-256, user interfaces 258, 260, anddatabase devices 262-266 can be implemented as computing devices (e.g.,computing device 200). Those skilled in the art will recognize that thedatabase devices 262-266 can be incorporated into one or more of theservers 252-256 such that one or more of the servers 252-256 can includethe databases 262-266.

In some embodiments, the database 262 can store information relating toone or more parts of the electronic content database 106. In someembodiments, the database 264 can store information relating to one ormore parts of the electronic content database 132. In some embodiments,one or more parts of the electronic content database 106, 132 can bedistributed over the databases 262-266.

In some embodiments, the servers 252-256 can be configured to implementone or more components of the system 100. In some embodiments, theserver 252 can be configured to implement one or more components of thesystem 100. In some embodiments, the server 254 can be configured toimplement one or more engines 270 of the first electronic device 102. Insome embodiments, the server 256 can be configured to implement one ormore engines 272 of the second electronic device 104. In someembodiments, the user interfaces 258, 260 (e.g., user interface 120,user interface 140, or the like) include a graphical user interface 274,276 (e.g., GUI 122, GUI 142, or the like) for presenting information tothe user.

FIG. 14 is a flowchart illustrating an exemplary process 300 of thesystem 100 in accordance with embodiments of the present disclosure. Tobegin, at step 302, first electronic content and second electroniccontent can be electronically captured and/or received at the firstelectronic device. At step 304, an assignment function can be executedwith an assignment engine to designate the first electronic content asthe hidden electronic content and to designate the second electroniccontent as the cover electronic content. At step 306, an encryptionfunction can be executed with an encryption engine to receive as inputthe hidden electronic content and the cover electronic content, andoutput the encrypted electronic content and the decryption keyassociated with the encrypted electronic content.

In some embodiments, at step 308, a decryption preference can optionallybe input and associated with the encrypted electronic content. As notedabove, the decryption preference can require a physical input from auser for executing the decryption function. In some embodiments, at step310, a distribution rights function can optionally be executed with adistribution rights engine to assign one or more distribution rights tothe encrypted electronic content. As noted above, the distributionrights can prevent or limit further distribution of the receivedencrypted electronic content from the second electronic device. In someembodiments, at step 312, a viewing rights function can optionally beexecuted with a viewing rights function to assign one or more viewingrights to the encrypted electronic content. As noted above, the viewingrights can set limits regarding viewing time and/or number of permittingviews of the hidden electronic content. Although shown as occurringafter the encryption step 306, in some embodiments, steps 308-312 canoccur prior to the encryption step 306 and the input decryptionpreference, distribution rights, viewing rights, or combinationsthereof, can be incorporated directly into the encrypted electroniccontent during the encryption step 306.

At step 314, a transmission function can be executed with a transmissionengine to transmit the encrypted electronic content and the decryptionkey (and any associated preferences or limits/rights) to the secondelectronic device. At step 316, a decryption function can be executedwith a decryption engine on the second electronic device that receivesas input the encrypted electronic content and the decryption key, andthat outputs the hidden electronic content. The hidden electroniccontent can be viewed only during the decryption process (e.g., whilethe user provides the physical input to the GUI) and, upon stopping thedecryption process (e.g., when the user removes the necessary physicalinput to the GUI), the hidden electronic content can again be overlaidwith the cover electronic content. In some embodiments, at step 318, aself-destruct function can optionally be executed with a self-destructengine upon reaching one of the viewing rights limits to destroy, alterand/or remove the decryption key, thereby preventing further decryptionof the encrypted electronic content.

FIG. 15 shows an exemplary graphical user interface window 550 of thesystem 100 in accordance with embodiments of the present disclosure. Inparticular, the window 550 shows an introduction or home interface onthe first electronic device 102 for the system 100. The introductioninterface provides selections for various actions that can be takenthrough the system 100. The first electronic device 102 is representedby the structure 352. The window 550 can include a title 552, e.g.,DATCHAT™. The window 550 can include a cancel button 554. Selecting thecancel button 554 can return the user to a home screen of the firstelectronic device 102.

The window 550 can include a local save button 556, a direct messagebutton 558, and an e-mail/message button 560. Selecting and actuatingthe local save button 556 can lead to an interface for selecting thefirst and second electronic content 124, 126, encrypting the first andsecond electronic content 124, 126 to generate the encrypted electroniccontent 152, and saving the encrypted electronic content 152 locally onthe first electronic device 102. For example, the local save button 556allows the user to save the encrypted electronic content 152 in a cameraroll on the first electronic device 102 such that, prior to decryption,the encrypted electronic content 152 appears only as the coverelectronic content 150 in the camera roll.

Selecting and actuating the direct message button 558 can lead to aninterface for selecting the first and second electronic content 124,126, encrypting the first and second electronic content 124, 126 togenerate the encrypted electronic content 152, and sending the encryptedelectronic content 152 to the second electronic device 104 via amessaging interface within the application (e.g., system 100).

Selecting and actuating the e-mail/message button 560 can lead to aninterface for selecting the first and second electronic content 124,126, encrypting the first and second electronic content 124, 126 togenerate the encrypted electronic content 152, and sending the encryptedelectronic content 152 to the second electronic device 104 via amessaging interface external to the application (e.g., an e-mailinterface, iMessage, or the like). Thus, different options are providedfor saving and/or transmitting the encrypted electronic content 152.

FIG. 16 shows an exemplary graphical user interface window 600 of thesystem 100 in accordance with embodiments of the present disclosure. Inparticular, the window 600 shows an assignment and encryption interfaceon the first electronic device 102 for assigning the first and secondelectronic content 124, 126 as the hidden and cover electronic content148, 150, respectively, via the assignment engine 108. The firstelectronic device 102 is represented by the structure 352. The window600 can include a title 552 and a back button 356. The back button 356can be actuated to return to the introduction screen at window 550. Thewindow 600 can include a first selection section 360 and a secondselection section 362 for selecting or capturing the first and secondelectronic content 124, 126, respectively. The functionality of thefirst and second selection sections 360, 362 will be discussed ingreater detail below with respect to FIGS. 19-21.

The window 600 can include a text button 602 and an encryption settingsbutton 604. Selection and actuation of the text button 602 can present awindow and an input interface (e.g., a text section 372 with anelectronic input interface 374 of FIG. 19) that can be used to input analphanumeric text message to be sent with the encrypted electroniccontent 152. The user can therefore optionally include a message withthe encrypted electronic content 152. In some embodiments, the messagecan be encrypted with the encrypted electronic content 152 such that,prior to decryption, the message is hidden from view.

Selection and actuation of the encryption settings button 604 canpresent an interface on the first electronic device 102 for inputtingand varying the settings for the encryption process, such as viewingrights, distribution rights, decryption options, combinations thereof,or the like. Thus, a user can customize the encryption settings for eachencrypted electronic content 152 being saved and/or sent from the firstelectronic device 102.

FIGS. 17 and 18 show an exemplary graphical user interface window 650 ofthe system 100 in accordance with embodiments of the present disclosure.In particular, the window 650 shows an encryption settings interface onthe first electronic device 102 for indicating settings for encryptingthe first and second electronic content 124, 126 via the encryptionengine 110. The window 650 can be accessed by selecting the encryptionsettings button 604 at the window 600 (see FIG. 16).

The window 650 can include the title 552 and a cancel button 652.Actuating the cancel button 652 returns the user to the introductioninterface of the window 600. The window 650 can include a recipientsection 654 in which recipients for the encrypted electronic content 152can be selected and/or where additional electronic devices can beinvited to join the system 100. For example, the recipient section 654can include a friends section 656 that includes contacts that are partof the system 100 and can receive the encrypted electronic content 152of their respective electronic devices. In some embodiments, therecipient section 654 can include a search window 658 in whichalphanumeric text can be input to search the list of contacts in thefriends section 656, thereby narrowing the list to the desired contacts.In some embodiments, the search window 658 can be used to searchcontacts on the first electronic device 102 and button 660 can be usedto add the desired contact to the friends section 656, thereby allowingthe user to send the encrypted electronic content 152 to the contact.

The recipient section 654 can include an invites section 662. Theinvites section 662 can include a list of contacts that the user of thefirst electronic device 102 has invited to join the system 100. Aninvitation can be sent to the contact requesting the contact to join thesystem 100. While the invitation is pending, the contact name can appearin the invites section 662. For example, FIG. 17 shows one contact inthe invites section 662, while FIG. 18 shows two contacts in the invitessection 662. When the contact joins the system 100, the contact name canautomatically move from the invites section 662 to the friends section656. In some embodiments, a password button 664 can be actuated toassociate a unique password with each invitee in the invites section662, requiring the invitee to enter the password to join the system 100.In some embodiments, the password button 664 can associate a uniquepassword with the invitee, thereby requiring the contact to input theunique password into the system 100 to allow decryption. Each invitee orcontact can have a button 666 associated with the name. Actuating thebutton 666 allows the user of the first electronic device 102 tounfriend or cancel the invitation of the contact, thereby removing thecontact from the network associated with the user on the system 100.

The window 650 can further include an encryption settings section 668.The encryption settings section 668 can include a viewing rights section670 and a decryption preference section 672. The viewing rights section670 can include actuators 674, 676 that can be used to increase ordecrease the number of times the encrypted electronic content 152 can beviewed. For example, although the viewing rights section 670 indicatesthat the encrypted electronic content 152 can be viewed four times, theactuator 674 can be used to increase the number of permitted views andthe actuator 676 can be used to decrease the number of permitted viewsto the desired value.

In some embodiments, the viewing rights section 670 can include asection for increasing or decreasing the amount of time permitted forviewing the encrypted electronic content 152. For example, the viewingrights section 670 can include actuators substantially similar to theactuators 674, 676 for increasing or decreasing the amount of timepermitted for viewing the encrypted electronic content 152.

In some embodiments, the encryption settings section 668 can include asection for selecting or limiting distribution rights of the encryptedelectronic content 152. For example, the section can include actuatorsthat increase or decrease the number of times the encrypted electroniccontent 152 can be distributed after being sent to the recipient.

In some embodiments, the encryption settings section 668 can include asection for selecting whether or not the recipient of the encryptedelectronic content 152 can download the encrypted electronic content 152to the recipient's electronic device. For example, the recipient can beallowed to download the encrypted electronic content 152 to the secondelectronic device 104. However, the viewing rights, distribution rights,and decryption methods can remain associated with the encryptedelectronic content 152 after being downloaded to the second electronicdevice 104. Although shown as being selected prior to transmitting theencrypted electronic content 152, in some embodiments and as will bediscussed in greater detail below, the system can include options toallow the user to adjust and/or apply the encryption settings of theencrypted electronic content 152 after the encrypted electronic content152 has been transmitted to another electronic device.

The decryption preference section 672 can include be depressed to switchbetween a “Standard” decryption mode (e.g., FIG. 17) and an “Advanced”decryption mode (e.g., FIG. 18). For example, tapping the decryptionpreference section 672 can switch between the “Standard” and “Advanced”decryption modes. The “Standard” decryption mode can correspond todecryption being actuated by tapping/touching and holding a single pointof the graphical user interface. The “Advanced” decryption mode cancorrespond to decryption being actuated by tapping/touching and holdingfour or more different points of the graphical user interface. Addedsecurity to the decryption process can thereby set prior to encryptionto prevent the recipient from taking a screenshot of the hiddenelectronic content 148 after decryption.

Once the user has set one or both of the viewing rights and decryptionmethod options, the continue button 678 can be actuated to save theencryption settings and return the user to an interface that allowsselection and assignment of the first and second electronic content 124,126 as the hidden and cover electronic content 148, 150. The viewingrights, distribution rights, download rights, and decryption methods cantherefore be encrypted directly into the encrypted electronic content152 and/or the decryption key 154.

If the encrypted electronic content 152 is saved locally on the firstelectronic device 102, the user can open the encrypted electroniccontent 152 in the system 100 to adjust the encryption settings at afuture time. For example, the user can use one set of encryptionsettings when sending the encrypted electronic content 152 to a firstcontact, and can subsequently change the encryption settings prior tosending the encrypted electronic content 152 to a second contact. Thenew encryption settings can be encrypted into the encrypted electroniccontent 152 prior to sending the encrypted electronic content 152 to thesecond contact.

FIGS. 19-21 show an exemplary graphical user interface window 350 of thesystem 100 in accordance with embodiments of the present disclosure. Inparticular, the window 350 shows an assignment and encryption interfaceon the first electronic device 102 for assigning the first and secondelectronic content 124, 126 as the hidden and cover electronic content148, 150, respectively, via the assignment engine 108. The firstelectronic device 102 is represented by the structure 352 in FIG. 19.The window 350 can include a title 354, e.g., CAMRAFLAGE™. The window350 can include a back button 356 and an encrypt button 358. The backbutton 356 can be actuated to return to an opening or introductionscreen (e.g., window 550 of FIG. 15) of the application. The encryptbutton 358 can be actuated to execute the encryption engine 110 togenerate the encrypted electronic content 152.

As shown in FIG. 19, the encrypt button 358 can be grayed out, i.e.,cannot be actuated, until at least the second electronic content 126 tobe designated as the cover electronic content 150 has been selected,thereby preventing a false start for the encryption process. Inparticular, in some embodiments, the system 100 can be used to encryptonly one electronic content, e.g., the second electronic content 126, toinclude distribution rights and/or viewing rights, without including ahidden electronic content 148 below the cover electronic content 150.Thus, only the cover electronic content 150 can be encrypted to includethe distribution rights and/or viewing rights prior to sending theencrypted electronic content 152 to the second electronic device 104.

The window 350 can include a first selection section 360 and a secondselection section 362. The first selection section 360 can be used toselect or capture the first electronic content 124 to be designated asthe secret or hidden electronic content 148. The second selectionsection 362 can be used to select or capture the second electroniccontent 126 to be designated as the cover electronic content 150. Eachof the first and second selection sections 360, 362 can include animport button 364, 366 and a shoot or capture button 368, 370. Theimport buttons 364, 366 can be actuated to open an existing storage onthe first electronic device 102 that contains electronic content savedtherein. For example, actuating the import button 364, 366 can presentthe camera roll on the first electronic device 102 allowing the user toselect one electronic content to use as the first electronic content124. The capture buttons 368, 370 can be actuated to open a contentcapturing mechanism, e.g., a camera, on the first electronic device 102to permit the user to capture a new electronic content via the contentcapturing mechanism.

The first and second electronic content 124, 126 can thereby be selectedor captured by the user. Upon selecting or capturing the firstelectronic content 124 at the first selection section 360, theassignment engine 108 can designate the first electronic content 124 asthe hidden electronic content 148 (see FIG. 20). In particular, FIG. 20shows a photograph 376 selected as the first electronic content 124.Upon selecting or capturing the second electronic content 126 at thesecond selection section 362, the assignment engine 108 can designatethe second electronic content 126 as the cover electronic content 150(see FIG. 21). In particular, FIG. 21 shows a photograph 378 selected asthe second electronic content 126. In some embodiments, the secondselection section 362 can be used to select an one or more emoji to actas the cover electronic content 150 to cover all or portions of thehidden electronic content 148. The import and capture buttons 364-370can remain superimposed over the respective photographs 376, 378 suchthat the user can use the import and capture buttons 364-370 to changethe selections of the photographs 376, 378 prior to encryption.

Although illustrated as using two photographs 376, 378, it should beunderstood that different types of electronic content can be used incombination. For example, the first electronic content 124 can be aphotograph and the second electronic content 126 can be a photograph,video or text. As a further example, the first electronic content 124can be a video and the second electronic content 126 can be aphotograph, video or text. As a further example, the first electroniccontent 124 can be a photograph, video or text and the second electroniccontent 126 can be a video. Thus, different combinations of electroniccontent can be used in the selection of the first and second electroniccontent 124, 126.

In some embodiments, the window 350 can include a text section 372 thatcan be used to input an alphanumeric text message to be sent with theencrypted electronic content 152. The window 350 can include anelectronic input interface 374, e.g., a keyboard, for generating thealphanumeric text message in the text section 372. The user cantherefore optionally include a message 380 with the encrypted electroniccontent 152 (see FIG. 21).

After the desired selections have been made in the window 350, theencrypt button 358 can be actuated to execute the encryption engine 110to generate the encrypted electronic content 152. As noted above, theencryption engine 110 encrypts the first and second electronic content124, 126 to generate the encrypted electronic content 152, and furtherincorporates the viewing rights, distribution rights, download rights,decryption preference, combinations thereof, or the like, into theencrypted electronic content 152. After encryption, any type ofmessaging interface can be used to share the encrypted electroniccontent 152 with others, e.g., iMessage®, short message service (SMS),e-mail, a messaging interface incorporated into the system 100, or thelike.

FIG. 22 shows an exemplary graphical user interface window 400 of thesystem 100 in accordance with embodiments of the present disclosure. Inparticular, the window 400 shows an electronic content storage interface(e.g., the electronic content database 106, the electronic contentdatabase 132, or the like) on either the first or second electronicdevice 102, 104 represented by the structure 402. For example, afterencryption, the encrypted electronic content 152 can be saved to theelectronic content database 106 of the first electronic device 102and/or can be sent via a communications network to the second electronicdevice 102. The encrypted electronic content 152 can be saved by therecipient in the electronic content database 132 (e.g., an electroniccamera roll) on the second electronic device 104.

As an example, the interface of FIG. 22 shows an electronic camera rollof the second electronic device. The camera roll includes a plurality ofelectronic content 404 stored therein. The electronic content 404 canrepresent unencrypted, regular electronic content that does not includea hidden electronic content 148. FIG. 22 further shows the encryptedelectronic content 152 saved to in the camera roll with the otherelectronic content 404. In the encrypted state, the encrypted electroniccontent 152 appears as only the cover electronic content 150 and thereis no indication that there is a hidden electronic content 148 hiddenbelow the cover electronic content 150. The encrypted electronic content152 can therefore be saved among other electronic content 404 and keptin plain site without fear of undesired viewing of the hidden electroniccontent 148. The window 400 can be used to browse a variety of foldersand sub-folders to view electronic content saved on the device until thedesired encrypted electronic content 152 is located.

The user can select the encrypted electronic content 152 from the cameraroll for introduction into a decryption interface to execute thedecryption function and view the hidden electronic content 148. Inparticular, the encrypted electronic content 152 can only be decryptedto expose the hidden electronic content 148 in the decryption interface.In contrast, opening or viewing the encrypted electronic content 152 ina regular electronic content viewer on the electronic device only allowsviewing of the cover electronic content 150 without showing the hiddenelectronic content 148.

FIG. 23 shows an exemplary graphical user interface window 450 of thesystem 100 in accordance with embodiments of the present disclosure. Inparticular, the window 450 shows a decryption interface of the firstand/or second electronic device 102, 104 in which the selected encryptedelectronic content 152 can be decrypted. Similar to the window 350, thewindow 450 can include a title 354 and a back button 356 for returningto an opening or introduction window. Prior to decryption, the window450 shows only the cover electronic content 150 (i.e., photograph 378)of the encrypted electronic content 152.

The window 450 can include a section 452 showing the selected encryptedelectronic content 152 for decryption. The window 450 can include abutton 454 that can be actuated to return to the window 400 to select adifferent encrypted electronic content 152 for decryption. The window450 can include an instruction section 456 providing instructions to theuser regarding actuation of the decryption engine 112, 134. For example,the instruction section 456 of FIG. 23 indicates that decryption can beinitiated by tapping and holding the photograph, e.g., a physical inputat one point on the GUI. If the user generating the encrypted electroniccontent 152 indicated a different decryption preference 151 (e.g., the“Advanced” decryption setting), the instruction section 456 couldindicate the specific decryption instructions, e.g., tap and hold thephotograph at four different points on the GUI. In some embodiments, thewindow 450 can include a section providing the time limit 158 and/orpermitted views 160 associated with the encrypted electronic content152.

In some embodiments, access to the interfaces associated with the system100 can be password protected. For example, when downloading theapplication associated with the system 100 onto the device, the user canbe prompted to create an account including at least a username andpassword. In some embodiments, one password or passcode can be enteredat a log-in interface to permit decryption of the encrypted electroniccontent 152 via the window 450. In some embodiments, the system 100 canbe protected by a double code system. For example, one password orpasscode can permit decryption of the encrypted electronic content 152,while a second “decoy” passcode can allow encryption of the encryptedelectronic content 152 while decryption of the encrypted electroniccontent 152 results in only the cover electronic content 150 beingviewable. The system 100 can thereby be secretly used to view the hiddenelectronic content 148 with the use of the first password or passcode,while creating an appearance of no hidden electronic content 148 whenthe second “decoy” passcode is used. In some embodiments, the system 100can include an emergency self-destruct passcode that can be used at thelog-in interface to destroy all decryption keys associated withencrypted electronic content 152 stored on the device.

FIG. 24 shows the window 450 in a decrypted mode or configuration. Inparticular, when a user performs the instructions provided in theinstruction section 456, the decryption engine 112, 134 can be executedto expose the hidden electronic content 148 (i.e., photograph 376).During decryption, the message 380 (if any) associated with the hiddenelectronic content 148 can also be shown. In some embodiments, duringdecryption, the area surrounding the section 452 and the message 380 canbe grayed out to focus the attention of the user on the hiddenelectronic content 148.

FIG. 24 further shows a first notification 458 and a second notification460. The first notification 458 indicates the permitted views 160associated with the encrypted electronic content 152 and the secondnotification 460 indicates the time limit 158 associated with theencrypted electronic content 152. For example, the permitted views 160shown in FIG. 24 is a maximum of three times and the first notification458 indicates that the current viewing of the hidden electronic content148 counts as one out of three times. As a further example, the timelimit 158 shown in FIG. 24 is until Feb. 15, 2015.

Thus, with reference to the permitted views 160, if the user decryptsand exposes the hidden electronic content 148 three times, theself-destruct engine 138 can destroy, alter and/or remove the decryptionkey 154 such that the encrypted electronic content 152 can no longer bedecrypted to expose the hidden electronic content 148. Similarly, withreference to the time limit 158, the self-destruct engine 138 candestroy, alter and/or remove the decryption key 154 upon the datereaching Feb. 15, 2015. As noted above, the first of the time limit 158and the permitted views 160 reached by the user causes the self-destructengine 138 to be executed. For example, if the user has only decryptedthe encrypted electronic content 152 once and the date has reached Feb.15, 2015, the self-destruct engine 138 is executed due to the time limit158 viewing rights and the hidden electronic content 148 can no longerbe viewed.

In some embodiments, the system 100 can include a video scramblingengine incorporated therein. For example, the video scrambling enginecan be incorporated into the encryption engine 110 such that the videoscrambling process occurs during encryption of the video content. Thevideo scrambling engine can strip the indexing data associated withvideos sent through the system 100 such that data from the temporarystorage of the device cannot be obtained to view the video after theself-destruct engine 138 has been executed. In some embodiments, thevideo scrambling engine can strip the indexing data associated with thevideo sent while the recipient is watching the video.

In some embodiments, the system 100 can be used with an electronic oronline dating platform such that encrypted and self-destructingmessages, photographs and/or videos can be shared, thereby providing ahigher level of security for online dating. In some embodiments, thesystem 100 can include a social media interface associated therewith asshown by the graphical user interface window 500 of FIG. 25. The window500 can be viewed at the GUI 122, 142 of the first and/or secondelectronic devices 102, 104 as represented by the structure 502. Thewindow 500 can include a title 504 of the social media interface. Thewindow 500 can include an interactive page 506 in which one or moreencrypted electronic content can be anonymously posted and shared withother participants of the social media interface. For example, the page506 includes encrypted electronic content 508. Each encrypted electroniccontent 508 can include a time stamp 510 indicating a duration of timesince the encrypted electronic content 508 was posted on the page 506.

Each encrypted electronic content 508 can further include a notification512 indicating the time until the encrypted electronic content 508 willself-destruct. For example, the self-destruct engine 138 canautomatically remove the encrypted electronic content 508 from the page506 when the time for self-destruction is reached. In some embodiments,the encrypted electronic content 508 can be manually self-destructed andremoved from the page 506 by the user who initially posted the encryptedelectronic content 508.

Each encrypted electronic content 508 can also include a comment section514 in which other users can comment on and/or “like” the encryptedelectronic content 508. In some embodiments, the comment section 514 canbe used in an anonymous manner. In some embodiments, the content of thecomment section 514 can affect the position and/or the self-destructstatus of the encrypted electronic content 508. For example, if thecomment section 514 includes a large amount of “likes”, the encryptedelectronic content 508 can be moved to a higher position on the page506. As a further example, if the comment section 514 includes a largeamount of “dislikes”, the encrypted electronic content 508 can be set toself-destruct and be removed from the page 506 in a quicker period oftime.

In some embodiments, the window 500 can include a commands section 516.The first command 518 can provide access to a camera of the electronicdevice to create electronic content in the form of a photograph. Thesecond command 520 can provide access to a camera of the electronicdevice to create electronic content in the form of a video. The thirdcommand 522 can provide access to a chat or messaging inbox, allowingthe user to access messages sent from contacts and/or send messages tocontacts. The fourth command 524 allows the user to add new friends orcontacts. The fifth command 526 provides access to the interfacesdiscussed above for accessing and decrypting hidden electronic contentstored locally on the electronic device (e.g., in the camera roll).

FIG. 26 shows an exemplary graphical user interface window 700 of thesystem 100 in accordance with embodiments of the present disclosure. Inparticular, the window 700 shows a sending interface for selectingsettings prior to sending the encrypted electronic content 152 on eitherthe first or second electronic device 102, 104 represented by thestructure 702. The window 700 generally includes a communication section704 that displays the content to be send to another electronic device,such as the encrypted electronic content 152 and/or a message 380 typedin a text section 372. The communication section 704 can display anongoing conversation between two electronic devices over an extendedperiod of time.

In some embodiments, the sending interface window 700 can include aviewing rights section 706 and a decryption preference section 708 suchthat the user can set the desired security settings prior to sending theencrypted electronic content 152. In some embodiments, the window 700can be used to adjust the security settings for the encrypted electroniccontent 152 after the encrypted electronic content 152 has already beensent to another electronic device. For example, the encrypted electroniccontent 152 can be stored in the camera roll window 400 of an electronicdevice as shown in FIG. 22 with the original security settings chosen bythe user. The user can select the encrypted electronic content 152 fromthe camera roll window 400 through the sending interface window 700. Thecommunication section 704 can indicate the number of views 710 of theencrypted electronic content 152 and the time period 712 since theencrypted electronic content 152 was originally sent. To adjust thenumber of permitted views, the user can select the viewing rightssection 706. To adjust the level of security desired, the user canselect the decryption preference section 708. As shown in FIG. 26, thesecurity setting is set to “four fingers”. After the desired settingshave been selected, the user can actuate the send button 714 to send theencrypted electronic content 152 to another electronic device.

FIG. 27 shows an exemplary graphical user interface window 720 of thesystem 100 in accordance with embodiments of the present disclosure. Inparticular, the window 720 shows a viewing right interface for selectingthe number of views allowed of the encrypted electronic content 152 tobe sent to another electronic device. The window 720 includes aselection section 722 that allows the user to select the desired numberof views of the encrypted electronic content 152. As shown in FIG. 27,the user can select an unlimited number of views or can set apredetermined numerical limit to the number of views of the encryptedelectronic content 152.

FIG. 28 shows an exemplary graphical user interface window 730 of thesystem 100 in accordance with embodiments of the present disclosure. Inparticular, the window 730 shows a receiving interface on an electronicdevice that receives the encrypted electronic content 152. The window730 includes an instruction section 734 that explains that the encryptedelectronic content 152 was sent in with a security level and explainshow the encrypted electronic content 152 is to be decrypted. Based onthe advanced “four finger” decryption preference selected in FIG. 26,the instruction section 734 states that for decryption, the user musthold three corners while tapping a fourth corner of the screen of theelectronic device. Three corners of the window 730 include markers 736indicating where the user must hold or depress the fingers, and onecorner of the window 730 includes a marker 738 where the user must tapthe corner with a finger. The advanced decryption setting reduces theopportunity for the user viewing the encrypted electronic content 152 totake a screenshot of the encrypted electronic content 152 after it hasbeen decrypted. In some embodiments, if a user decrypting the encryptedelectronic content 152 attempts to take a screenshot during thedecryption process, an automatic notification can be transmitted to thesender of the encrypted electronic content 152 indicating the attempt.This notification allows the sender of the encrypted electronic content152 to perform certain actions described below to ensure security of theencrypted electronic content 152.

FIG. 29 shows an exemplary graphical user interface window 740 of thesystem 100 in accordance with embodiments of the present disclosure. Inparticular, the window 740 shows a communication interface for adjustingencryption settings of encrypted electronic content 152 after it hasbeen transmitted to another electronic device. In particular, the usercan initially apply a certain set of encryption settings to theencrypted electronic content 152 and transmit the encrypted electroniccontent 152 to another electronic device and, at a later time, canadjust the encryption settings of the already sent encrypted electroniccontent 152 via the window 740.

Thus, while the sent encrypted electronic content 152 can initially beephemeral (e.g., have limited viewing rights, advanced decryptionsettings, or the like), the user who initially sent the encryptedelectronic content 152 can adjust the security settings at a later timeto change the encrypted electronic content 152 to regular or permanentelectronic content (e.g., without viewing rights, decryptionrequirements, or the like). It should be understood that a similarchange in security settings can be made when the content was originallysent as regular or permanent electronic content, and the user decides tochange the electronic content to ephemeral at a later time. In someembodiments, swiping on the encrypted electronic content 152 and/or amessage 742 associated with the encrypted electronic content 152 in thecommunication section 704 opens a menu 744 in which the user can eitherdelete 746 the content or open a submenu for managing permitted views748.

FIG. 30 shows an exemplary graphical user interface window 750 of thesystem 100 in accordance with embodiments of the present disclosure. Inparticular, the window 750 shows a viewing rights interface opened afterthe encrypted electronic content 152 has been sent to another electronicdevice. In the window 750, the selection section 722 can be used toadjust the allowed number of permitted views of the encrypted electroniccontent 152. For example, the allowed number of permitted views can beadjusted from unlimited to a specific numerical value, or from aspecific numerical value to unlimited. Thus, the viewing rights can beadjusted after the encrypted electronic content 152 has been transmittedto another electronic device. A similar adjustment can be made in adecryption preference menu, allowing the user to adjust the decryptionsetting after the encrypted electronic content 152 has been transmittedto another electronic device.

In some embodiments, after the encrypted electronic content 152 has beentransmitted to another electronic device, for security purposes, thesender may wish to delete some or all of the encrypted electroniccontent 152 and/or text 742 previously transmitted to the otherelectronic device. FIG. 31 shows an exemplary graphical user interfacewindow 760 of the system 100 in accordance with embodiments of thepresent disclosure. In particular, the window 760 shows a messagedestruction interface for deleting all or some of the electronic contenttransmitted to another electronic device. The window 760 includes aselection menu 762 with options to add the contact as a friend 764,block a user 766, mute notifications 768 from a user, or destruct ordelete 770 all or some of the electronic content previously transmittedto another electronic device and displayed in the communication section704.

Upon selection of the destruct or delete 770 button in the selectionmenu 762 of FIG. 31, the message destruction interface menu can bedisplayed. FIG. 32 shows an exemplary graphical user interface window780 of the system 100 in accordance with embodiments of the presentdisclosure. In particular, the window 780 shows the message destructioninterface menu 782 with options for the user to choose from. The messagedestruction interface menu 782 can overlay the communication section 704such that the user can at least partially see the encrypted electroniccontent 152 and/or text 742 transmitted to the other electronic device.

Option one 784 in the message destruction interface menu 782 can be adestruct function to erase all of the electronic content and/or messagestransmitted to the other electronic device. Option two 786 in themessage destruction interface menu 782 can be a delete function to eraseall of the electronic content and/or messages transmitted to the otherelectronic devices and the thread of messages on the sender's electronicdevice. Option three 788 in the message destruction interface menu 782can be a nuke function to eradicate all traces of the entireconversation from all electronic devices as if the transmissions neveroccurred.

Upon selecting option three 788 from the message destruction interfacemenu 782, the message destruction interface confirmation window can bedisplayed. FIG. 33 shows an exemplary graphical user interface window790 of the system 100 in accordance with embodiments of the presentdisclosure. In particular, the window 790 shows the message destructioninterface confirmation 792 requesting the user to confirm to delete alltraces of electronic transmissions between the electronic devices.

By allowing the user to manage the security settings of the electroniccontent after the electronic content has been transmitted to otherelectronic devices, the sender is ensured that the electronic contentwill not remain with undesired recipients. The sender of the electroniccontent can therefore determine whether the electronic content will lastforever with unlimited views or automatically self-destruct after acertain number of views. Any time after sending the electronic content,the sender can delete the electronic transmissions and content from therecipient's electronic device, adjust the decryption settings, or allowthe recipient additional time to view the electronic content. The sendercan also choose to change the rights or delete a single electroniccontent or perform the actions for multiple (or all) of the electroniccontent transmitted to other electronic devices. The “nuke” optionfurther allows the sender to delete all traces of the electroniccommunication between the electronic devices on both the sender andrecipient's electronic device.

The exemplary systems and methods discussed herein advantageouslyprovide a means of transforming electronic content on a device in a waythat provides security for the electronic content saved on the deviceand/or shared with other users. Electronic content can therefore besaved in a hidden manner on a device without fear of others accidentallyviewing secret data. Similarly, electronic content can be shared withothers in a confidential manner and with a means of limitingdistribution and/or viewing rights of the shared electronic content.

While exemplary embodiments have been described herein, it is expresslynoted that these embodiments should not be construed as limiting, butrather that additions and modifications to what is expressly describedherein also are included within the scope of the invention. Moreover, itis to be understood that the features of the various embodimentsdescribed herein are not mutually exclusive and can exist in variouscombinations and permutations, even if such combinations or permutationsare not made express herein, without departing from the spirit and scopeof the invention.

The invention claimed is:
 1. A method of transforming electroniccontent, the method comprising: electronically capturing or receiving afirst electronic content and a second electronic content with a firstelectronic device; executing an assignment function to designate thefirst electronic content as a hidden electronic content and to designatethe second electronic content as a cover electronic content; andexecuting an encryption function that receives as input the hiddenelectronic content and the cover electronic content, and that outputs anencrypted electronic content and a decryption key; wherein the encryptedelectronic content includes the cover electronic content overlaid overthe entire hidden electronic content such that, prior to decryption,only the cover electronic content is viewable at a location of agraphical user interface; wherein in the encrypted state, the encryptedelectronic content appears as only the cover electronic content withoutvisually indicating encryption and without visually indicating that thehidden electronic content is hidden below the cover electronic content;and wherein execution of the encryption function allows for selection ofencryption settings and decryption settings associated with theencrypted electronic content, the encryption settings including at leastone of viewing rights, distribution rights, or decryption methods. 2.The method of claim 1, wherein the first electronic content and thesecond electronic content are at least one of a photograph, a video, ora text.
 3. The method of claim 1, further comprising executing atransmission function to transmit the encrypted electronic content andthe decryption key to a second electronic device, the second electronicdevice including a graphical user interface.
 4. The method of claim 3,further comprising executing on the second electronic device adecryption function that receives as input the encrypted electroniccontent and the decryption key, and that outputs the hidden electroniccontent to the second electronic device.
 5. The method of claim 4,wherein executing the decryption function to output the hiddenelectronic content comprises providing a physical input from a user onthe graphical user interface of the second electronic device.
 6. Themethod of claim 5, wherein the physical input from the user comprises atouch and hold at a single point on the graphical user interface.
 7. Themethod of claim 5, wherein the physical input from the user comprises asimultaneous touch and hold at two or more different points on thegraphical user interface.
 8. The method of claim 1, further comprisingstoring the encrypted electronic content in an electronic contentdatabase associated with the first electronic device, the encryptedelectronic content being viewable on the graphical user interface of thefirst electronic device at a second location.
 9. The method of claim 1,further comprising executing a distribution rights function to assignthe distribution rights to the encrypted electronic content.
 10. Themethod of claim 9, further comprising executing a transmission functionto transmit the encrypted electronic content to a second electronicdevice, the distribution rights limiting or preventing distribution ofthe encrypted electronic content from the second electronic device to athird electronic device.
 11. The method of claim 1, further comprisingexecuting a viewing rights function to assign viewing rights to theencrypted electronic content.
 12. The method of claim 11, wherein theviewing rights designate at least one of (i) a time limit for viewingthe encrypted electronic content, or (ii) a number of permitted views ofthe encrypted electronic content.
 13. The method of claim 12, furthercomprising executing a self-destruct function upon reaching at least oneof (i) the time limit, or (ii) the number of permitted views, theself-destruct function comprising removing or altering the decryptionkey associated with the encrypted electronic content to preventdecryption of the encrypted electronic content, wherein executing theself-destruct function permanently prevents viewing the hiddenelectronic content via the graphical user interface, while permittingviewing of the cover electronic content.
 14. A non-transitorycomputer-readable medium storing instructions that are executable by aprocessing device, wherein execution of the instructions by theprocessing device causes the processing device to: electronicallycapture or receive a first electronic content and a second electroniccontent with a first electronic device; execute an assignment functionto designate the first electronic content as a hidden electronic contentand to designate the second electronic content as a cover electroniccontent; and execute an encryption function that receives as input thehidden electronic content and the cover electronic content, and thatoutputs an encrypted electronic content and a decryption key; whereinthe encrypted electronic content includes the cover electronic contentoverlaid over the entire hidden electronic content such that, prior todecryption, only the cover electronic content is viewable at a locationof a graphical user interface; wherein in the encrypted state, theencrypted electronic content appears as only the cover electroniccontent without visually indicating encryption and without visuallyindicating that the hidden electronic content is hidden below the coverelectronic content; and wherein execution of the encryption functionallows for selection of encryption settings and decryption settingsassociated with the encrypted electronic content, the encryptionsettings including at least one of viewing rights, distribution rights,or decryption methods.
 15. A system of transforming electronic content,the system comprising: a first electronic device including a firstgraphical user interface, a first non-transitory computer-readablemedium, and a first processing device; and a second electronic deviceincluding a second graphical user interface, a second non-transitorycomputer-readable medium, and a second processing device; wherein thefirst processing device of the first electronic device is configured toexecute instructions stored in the first non-transitorycomputer-readable medium to: electronically capture or receive a firstelectronic content and a second electronic content with the firstelectronic device; execute an assignment function to designate the firstelectronic content as a hidden electronic content and to designate thesecond electronic content as a cover electronic content; execute anencryption function that receives as input the hidden electronic contentand the cover electronic content, and that outputs an encryptedelectronic content and a decryption key, wherein the encryptedelectronic content includes the cover electronic content overlaid overthe entire hidden electronic content such that, prior to decryption,only the cover electronic content is viewable at a location of agraphical user interface, wherein in the encrypted state, the encryptedelectronic content appears as only the cover electronic content withoutvisually indicating encryption and without visually indicating that thehidden electronic content is hidden below the cover electronic content,and wherein execution of the encryption function allows for selection ofencryption settings and decryption settings associated with theencrypted electronic content, the encryption settings including at leastone of viewing rights, distribution rights, or decryption methods; andexecute a transmission function to transmit the encrypted electroniccontent and the decryption key to the second electronic device; whereinthe second processing device of the second electronic device isconfigured to execute instructions stored in the second non-transitorycomputer-readable medium to: electronically receive the encryptedelectronic content and the decryption key from the first electronicdevice; and execute a decryption function that receives as input theencrypted electronic content and the decryption key, and that outputsthe hidden electronic content.
 16. The system of claim 15, wherein thefirst processing device of the first electronic device is configured toexecute instructions stored in the first non-transitorycomputer-readable medium to execute a distribution rights function toassign the distribution rights to the encrypted electronic content, thedistribution rights limiting or preventing distribution of the encryptedelectronic content from the second electronic device to a thirdelectronic device.
 17. The system of claim 15, wherein the firstprocessing device of the first electronic device is configured toexecute instructions stored in the first non-transitorycomputer-readable medium to execute a viewing rights function to assignthe viewing rights to the encrypted electronic content.
 18. The systemof claim 15, wherein the first processing device of the first electronicdevice is configured to execute instructions stored in the firstnon-transitory computer-readable medium to alter a type of decryptionfor execution of the decryption function after the encrypted electroniccontent has been transmitted to the second electronic device.
 19. Thesystem of claim 15, wherein the first processing device of the firstelectronic device is configured to execute instructions stored in thefirst non-transitory computer-readable medium to delete the encryptedelectronic content from the second electronic device after the encryptedelectronic content has been transmitted to the second electronic device.20. The system of claim 17, wherein the first processing device of thefirst electronic device is configured to execute instructions stored inthe first non-transitory computer-readable medium to alter the assignedviewing rights of the encrypted electronic content after the encryptedelectronic content has been transmitted to the second electronic device.21. The method of claim 5, wherein the physical input from the usercomprises a simultaneous touch and hold at four different points on thegraphical user interface.
 22. The method of claim 21, wherein thegraphical user interface comprises markers indicating four separatelocations at which the user is to simultaneously touch and hold at thefour different points on the graphical user interface.
 23. The method ofclaim 5, wherein the physical input from the user comprises asimultaneous touch and hold at three different points on the graphicaluser interface, and a touch and tap at a fourth point on the graphicaluser interface.