This technology leverages multiple methods of receiver identification to ensure the digital data is only seen by the intended audience.

About

The demand for increased security and privacy for digitally shared data continues to increase. This disclosed technology leverages multiple methods of receiver identification to ensure the digital data is only seen by the intended audience. This includes security access methods such as facial recognition, biometrics, and location identification through GPS, along with both audio identification and situational awareness of the receiver’s viewing environment. Through these methods, a sender can set the restrictions to a single person, team, or viewing area. This technology also recognizes additional threats to the privacy, such as known object identification, should another camera or device be set up to capture the viewing screen image. Once the receiver(s) and environment have been confirmed to meet sender set restrictions, the digital data can be viewed.

Applications

Communications

Register for free for full unlimited access to all innovation profiles on LEO

  • Discover articles from some of the world’s brightest minds, or share your thoughts and add one yourself
  • Connect with like-minded individuals and forge valuable relationships and collaboration partners
  • Innovate together, promote your expertise, or showcase your innovations