Patent classifications
G06F21/84
SYSTEM FOR END-TO-END ELECTRONIC DATA ENCRYPTION USING AN INTELLIGENT HOMOMORPHIC ENCRYPED PRIVACY SCREEN
A system is provided for end-to-end electronic data encryption using an intelligent homomorphic encrypted privacy screen. In particular, the system may be configured to use homomorphic encryption on sensitive data displayed on a screen of a computing device. An augmented reality (“AR”) device may be used (e.g., a user) with the privacy screen such that the sensitive data that appears on the screen may be selectively decrypted. In this way, an authorized user may be able to view and interact with the encrypted data whereas an unauthorized user may not.
Sensor block
Embodiments of the present disclosure include apparatuses and methods for sensor blocking. In a number of embodiments, a method can include operating a sensor block of an apparatus in a first mode to allow a sensor to receive inputs, and operating the sensor block in a second mode to inhibit the sensor from receiving the inputs. A sensor block can be used to prevent a sensor, such as an image sensor, from receiving an input, such as a light source input, to capture image data. A sensor block can be used to prevent a sensor from capturing image data even when an application causing to the sensor to operate, such as when applications have access to the sensor, but the user of a device is unaware that an application is using the sensor. The sensor block can be used to prevent the sensor from capturing useful images and the sensor can only capture a black image of the sensor block and not the surroundings of the device.
Selective screen sharing
Disclosed are various examples for selective screen sharing. In one example, a computing device can generate a video stream based on a screen capture and transmit the video stream to a destination device. The computing device can also obtain a user-specified modification to an area of the screen capture within the video stream. The computing device can also update the video stream by application of a transformation to the screen capture based at least in part on the user-specified modification, after the video stream started transmission to the destination device. In some cases, a user-specified modification to the area is also obtained. The video stream can be updated by applying an updated transformation to the screen capture that obscures the updated area within the video stream.
Selective screen sharing
Disclosed are various examples for selective screen sharing. In one example, a computing device can generate a video stream based on a screen capture and transmit the video stream to a destination device. The computing device can also obtain a user-specified modification to an area of the screen capture within the video stream. The computing device can also update the video stream by application of a transformation to the screen capture based at least in part on the user-specified modification, after the video stream started transmission to the destination device. In some cases, a user-specified modification to the area is also obtained. The video stream can be updated by applying an updated transformation to the screen capture that obscures the updated area within the video stream.
Privacy enforcing memory system
A method and apparatus for enforcing privacy within one or more memories of a data storage system are disclosed. In one embodiment, sensor data containing personally identifiable information (PII) is provided to a memory. In some embodiments, the memory of disclosed systems and methods may be volatile, non-volatile, or a combination. Within the memory, PII is detected in some embodiments by AI-based computer vision, voice recognition, or natural language processing methods. Detected PII is obfuscated within the memory prior to making the sensor data available to other systems or memories. In some embodiments, once PII has been obfuscated, the original sensor data is overwritten, deleted, or otherwise made unavailable.
Privacy enforcing memory system
A method and apparatus for enforcing privacy within one or more memories of a data storage system are disclosed. In one embodiment, sensor data containing personally identifiable information (PII) is provided to a memory. In some embodiments, the memory of disclosed systems and methods may be volatile, non-volatile, or a combination. Within the memory, PII is detected in some embodiments by AI-based computer vision, voice recognition, or natural language processing methods. Detected PII is obfuscated within the memory prior to making the sensor data available to other systems or memories. In some embodiments, once PII has been obfuscated, the original sensor data is overwritten, deleted, or otherwise made unavailable.
TRANSPARENT EXECUTION OF SECRET CONTENT
The present application is directed to transparent execution of secret content. A device may be capable of downloading content that may include at least one secret portion, wherein any secret portions of the content may be directed to a secure workplace in the device not accessible to device operating system components, applications, users, etc. The device may then present the content in a manner that allows secret portions of the content to be executed without direct access. For example, the device may download content, and a director module in the device may direct any secret portions of the downloaded content to a secure workspace. During execution of the content, any inputs required by the secret portions may be provided to the secure workspace, and any resulting outputs from the secret portions may then be used during content presentation.
TRANSPARENT EXECUTION OF SECRET CONTENT
The present application is directed to transparent execution of secret content. A device may be capable of downloading content that may include at least one secret portion, wherein any secret portions of the content may be directed to a secure workplace in the device not accessible to device operating system components, applications, users, etc. The device may then present the content in a manner that allows secret portions of the content to be executed without direct access. For example, the device may download content, and a director module in the device may direct any secret portions of the downloaded content to a secure workspace. During execution of the content, any inputs required by the secret portions may be provided to the secure workspace, and any resulting outputs from the secret portions may then be used during content presentation.
CRYPTOGRAPHIC KEY EXCHANGE OVER AN ELECTROSTATIC CHANNEL
Various embodiments relating to exchanging a cryptographic key between a display device and an input device via electrostatic communication are disclosed. In one embodiment, an interactive communication device includes one or more electrodes and a radio transceiver. The one or more electrodes may be excited to capacitively couple with one or more electrodes of a proximate communication device so as to capacitively send a cryptographic key from the interactive communication device to the proximate communication device. The radio transceiver may be configured to communicate with a radio transceiver of the proximate communication device via a radio channel. The interactive communication device may be configured to subsequently exchange encrypted communications with the proximate communication device over the radio channel. The encrypted communications may be encrypted using the cryptographic key.
HEAD-MOUNTED DISPLAY SYSTEM AND OPERATING METHOD FOR HEAD-MOUNTED DISPLAY DEVICE
Operability of head-mounted display systems is enhanced by incorporating the following: a microphone which receives an utterance input by a person and outputs voice information; a character string generation unit which generates an uttered character string by converting the voice information into a character string; a specific utterance information storage unit which stores specific utterance information that associates at least one program to be started or stopped and/or at least one operating mode to be started or stopped, with specific utterances for starting or stopping each of the programs and/or operating modes; a specific utterance extraction unit which extracts a specific utterance included in the uttered character string with reference to the specific utterance information, and generates an extracted specific utterance signal indicating the extraction result; and a control unit which starts or stops a program or an operating mode with reference to the extracted specific utterance signal.