Patent classifications
G09G2358/00
Facial recognition-based authentication
Facial recognition-based authentication comprises obtaining a first image of a target object, updating projection information associated with a display by a display device, obtaining a second image of the target object, the second image being an image of the target object after the projection information is updated, obtaining an image difference data based at least in part on the first image and the second image, and determining whether the target object is a virtual object based at least in part on the image difference data.
TERMINAL DEVICE PRESENTATION SYSTEM, TERMINAL DEVICE, CONNECTION CONTROL METHOD, AND PROGRAM
A terminal device presentation system (1) includes: a relay device (20) which relays communication between a display device (50) and a terminal device (T), transmits an image signal from the terminal device to the display device and causes the display device to display the image signal; and a terminal connection processor (100) which performs processing of connection to the relay device in the terminal device, wherein the relay device includes a connection processor (200) which transmits connection information of an accessible network to the terminal device, and the terminal device includes a switching control unit (150) which connects the terminal device to a second network that is accessible for at least the relay device and different from a first network and is set in the terminal device such that a user of the terminal device uses the second network in preference to the first network, when the terminal device is connectable to the second network.
Prompt Information Display Method and Electronic Device
A prompt information display method and an electronic device, the method including displaying, by the electronic device, prompt information on the screen when the electronic device is in a screen-off state, where the prompt information includes a fingerprint identifier, and the fingerprint identifier is used to indicate a fingerprint recognition area, after the electronic device displays the prompt information on the screen, stopping, by the electronic device, displaying the prompt information on the screen if a first preset condition is met, and displaying, by the electronic device, the prompt information on the screen if a second preset condition is met.
INTERACTIVE VIRTUAL REALITY SYSTEM
Provided herein are method, apparatus, and computer program products for generating a first and second three dimensional interactive environment. The first three dimensional interactive environment may contain one or more engageable virtual interfaces that correspond to one or more items. Upon engagement with a virtual interface the second three dimensional interactive environment is produced to virtual simulation related to the one or more items.
Privacy Safeguards for Projecting Content onto a Shared Display Device
A technique allows a user to project content onto a shared display region in a controlled manner. The technique involves receiving context information that describes a context in which a user is currently interacting with a local user computing device. The technique then determines, based on policy logic and the context information, whether it is appropriate to invoke a private state, or to remove the private state and enter a shared state. The private state involves presenting a privacy screen on one or more shared display regions. The local user computing device remains connected to the display device(s) that host the shared display region(s) while operating in both the private state and the shared state. According to one advantage, the technique eliminates or reduces the risk that the user will inadvertently release private information to others; further, it does so without asking the user to perform burdensome preparatory actions.
Method and apparatus for deterrence and detection of leakage during remote interactive sessions
A server includes a virtual machine to execute a remote graphics generation protocol. Execution of the remote graphics generation protocol determines a protection label to be inserted within a bitmap that is to be transmitted for display on a client machine associated with the virtual machine, and determines at least one optimization technique to be performed on the bitmap. A determination is made on if the at least one optimization technique, if performed, alters the at least one protection label when inserted within the bitmap. The protection label is inserted within the bitmap.
DATA PRIVACY IN SCREEN SHARING DURING A WEB CONFERENCE
Data privacy in screen sharing during Web conferencing includes selecting a third-party application executing in contemporaneously with a conferencing application. Screen sharing is activated during a Web conference in the conferencing application so as to share a display screen of the third-party application with different attendee computers over a computer communications network. An interface to the application is then queried with the attendees in order to receive access control data for the attendees. Then, a protected data field is identified in the display screen and determined whether one of the attendee computers is associated with one of several access control rules based upon the access control data that prohibits display of content in the protected data field. The data field is masked in the shared display screen for the one of the attendee computers while displaying remaining portions of the shared display screen in the one of the attendee computers.
DISPLAY METHOD, APPARATUS, AND STORAGE MEDIUM
A display method, an apparatus, and a storage medium are provided. The method includes: rendering, by a first container, a to-be-displayed page to generate to-be-displayed image data, and encrypting the image data; and writing, by the first container, encrypted image data into a buffer corresponding to the first container, and sending instruction information to a second container of a terminal, where the instruction information is used to instruct the second container to securely display the encrypted image data. Because the containers are isolated from each other, the malware in the first container cannot access the image data displayed in the second container, and the second container securely displays the encrypted image data. In this way, security of displaying the image data can be improved while ensuring that an image display function is not restricted.
COMPUTER READABLE MEDIUM STORING DISPLAY CONTROL PROGRAM AND DISPLAY CONTROL METHOD
The invention is directed to a computer readable medium storing a display control program for causing a computer to execute: a setting procedure of setting display control information of protected content to be protected based on authentication information; and a determination procedure of determining whether to permit display of the protected content and whether to cancel an authenticated state of the protected content based on the display control information set by the setting procedure.
Mode-selectable backlight, privacy display, and method
A mode-selectable backlight and privacy display employ directional scattering features to provide emitted light. The mode-selectable backlight includes a light guide, a first directional scattering feature to provide broad-angle emitted light from guided light having a first propagation direction within the light guide during a public mode, and a second directional scattering feature to provide directional emitted light from guided light having a second propagation direction within the light guide during a privacy mode. The directional emitted light the provided during the privacy mode is directed into a viewbox. The mode-selectable privacy display further includes light sources configured to provide the guided light having the first and second propagation directions along with an array of light valves configured to modulate the broad-angle emitted light as a public image and the directional emitted light as a private image visible within the viewbox.