Supercharge Your Innovation With Domain-Expert AI Agents!

Visual security mechanism for a device with a front-facing camera

Inactive Publication Date: 2015-07-23
GOOGLE LLC
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent text describes a method for identifying if a camera on a device is taking images of the user or someone else. This can be useful for security or monitoring purposes. The method involves comparing each image to a stored image of the user and locking the device if there is a mismatch. The technical effect is a way to verify the identity of a camera and protect information from being taken by unauthorized sources.

Problems solved by technology

For example, the user can lock the screen when they decide they are going to be away from the computing device for a long time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Visual security mechanism for a device with a front-facing camera
  • Visual security mechanism for a device with a front-facing camera
  • Visual security mechanism for a device with a front-facing camera

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010]Cameras used with computing devices can be used in helping lock a computing device when persons that are not authorized users are seen using the computing device. Images of authorized users can be stored and compared against images of persons using the computing device, and depending on who is using a device, the device can be locked.

[0011]FIG. 1 displays a computing device 102 at three different time periods T1, T2, and T3. Computing device 102 may be, for example and without limitation, a device such as a desktop computer, laptop computer, mobile device, tablet computer, set top box.

[0012]A user 106 at time T1 is using computing device 102. User 106 may be the owner of computing device 102. In one implementation, a camera 104 of the computing device 102 can be used to take an image 107 of the user 106 and the image 107 can be stored in a database 110 that is remotely connected to computing device 102, or can be part of the computing device 102. In another implementation, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed herein are methods, systems, and computer readable media for locking a computing device. Periodic images are received from a camera on a computing device. Each of the images is compared to a stored image of a user. A determination is made that one of the images does not match the stored image, and the computing device is locked upon determining that one of the images does not match the stored image.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS[0001]This application is related to U.S. patent application Ser. No. ______ [Attorney Docket Number 2525.6360001] entitled “VISUAL SECURITY MECHANISM FOR A DEVICE”, filed Nov. 30, 2011. The contents of the application are incorporated herein in their entirety by reference.BACKGROUND[0002]Computing devices are used by a wide variety of users. They can be used by a single person or by more than one person together at a single time. These computing devices are often equipped with methods to lock the computing device by the user. For example, the user can lock the screen when they decide they are going to be away from the computing device for a long time. Some computing devices can be set to automatically lock after a certain amount of time. However, the user has to remember to set this functionality in their computing device.BRIEF SUMMARY[0003]In general, one innovative aspect of the subject matter described in this specification may be embodied ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/32G06K9/62G06K9/00
CPCG06F21/32G06K9/6202G06K9/00241G06F2221/2139G06V40/164G06V40/167
Inventor YEUNG, BRYAN RUSSELL
Owner GOOGLE LLC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More