Search International and National Patent Collections
Some content of this application is unavailable at the moment.
If this situation persists, please contact us atFeedback&Contact
1. (WO2013039476) METHOD AND DEVICE FOR SECURELY SHARING IMAGES ACROSS UNTRUSTED CHANNELS
Note: Text based on automatic Optical Character Recognition processes. Please use the PDF version for legal matters

CLAIMS:

1. A method comprising:

downloading an encrypted image to a computing device;

receiving an image of a current user of the computing device from a camera communicatively coupled to the computing device;

authenticating the current user by performing a facial recognition procedure on the image of the current user;

determining whether the authenticated current user is authorized to view a decrypted image of the encrypted image; and

in response to the authenticated current user being authorized to view the decrypted image, (i) decrypting the encrypted image and (ii) displaying the decrypted image on the computing device.

2. The method of claim 1, wherein downloading an encrypted image comprises downloading a webpage including the encrypted image from the remote server using a web browser of the computing device.

3. The method of claim 1, wherein downloading an encrypted image comprises downloading an encrypted image including an encrypted key, and

wherein determining whether the authenticated current user is authorized to view the decrypted image comprises determining whether a private key associated with the authenticated current user can decrypt the encrypted key.

4. The method of claim 3, wherein decrypting the encrypted image comprises (i) decrypting the encrypted key and (ii) decrypting the encrypted image using the decrypted key.

5. The method of claim 3, wherein the encrypted key is encrypted using a public key generated as a function of an image of the authenticated current user.

6. The method of claim 1, wherein receiving an image of the current user comprises receiving an image generated by the camera in real-time.

7. The method of claim 1, wherein authenticating the current user comprises

performing a facial recognition procedure on the image of the current user using a processor graphics circuitry of the computing device.

8. The method of claim 1, wherein:

downloading the encrypted image comprises downloading an encrypted image and an image of an authorized user, and

authenticating the current user comprises performing a facial recognition procedure on the image of the current user using the image of the authorized user to verify that the current user is the authorized user.

9. The method of claim 1, wherein determining whether the authenticated current user is authorized to view a decrypted image comprises retrieving a private key of the current user and determining whether the private key can decrypt an encrypted symmetric key that is usable to decrypt the encrypted image.

10. The method of claim 1, wherein decrypting the encrypted image comprises decrypting the encrypted image using a symmetric key that was previously decrypted using a private key of the current user.

11. The method of claim 1 , wherein displaying the decrypted image comprises displaying the decrypted image only while the current user is authenticated using the facial recognition procedure.

12. The method of claim 1, further comprising displaying the encrypted image on the computing device in response to the current user not being authorized to view the decrypted image.

13. The method of claim 1, further comprising displaying the encrypted image in place of the decrypted image in response to the current user no longer being authenticated.

14. A computing device comprising:

a processor; and

a memory having stored therein a plurality of instructions that, in response to being executed by the processor, causes the processor to:

download a webpage including an encrypted image;

determine whether a current user of the computing device is authorized to view a decrypted image of the encrypted image as a function of the current user being authenticated by performing a facial recognition procedure on a real-time image of the current user; and

in response to the current user being authorized to view the decrypted image, (i) decrypt the encrypted image and (ii) display the decrypted image on the computing device.

15. The computing device of claim 14, further comprising a processor graphics circuitry to perform the facial recognition procedure on the real-time image of the current user to authenticate the current user.

16. The computing device of claim 15, wherein to download the webpage including an encrypted image comprises to download an encrypted image including an image of an authorized user that is authorized to view the decrypted image, and

wherein the processor graphics circuitry to perform the facial recognition procedure on the real-time image of the current user to verify that the current user is the authorized user.

17. The computing device of claim 15, wherein the processor graphics circuitry is located on a common die with the central processing unit.

18. The computing device of claim 15, wherein the processor graphics circuitry is located on a peripheral graphics card of the computing device.

19. The computing device of claim 15, further comprising a camera to generate the real-time image of the current user of the computing device.

20. The computing device of claim 14, wherein:

the encrypted image comprises an encrypted symmetric key, and

to determine whether the current user is authorized to view the decrypted image comprises to determine whether a private key of the current user can decrypt the encrypted symmetric key.

21. The computing device of claim 20, wherein to decrypt the encrypted image comprises to decrypt the encrypted image using the decrypted symmetric key.

22. The computing device of claim 20, wherein the encrypted symmetric key

is encrypted using a public key generated as a function of a previously-generated image of the current user.

23. The computing device of claim 14, wherein to display the decrypted image comprises to display the decrypted image only while the current user is authenticated by the computing device.

24. One or more non-transitory, machine readable media comprising a plurality of instructions that in response to being executed result in a computing device:

downloading a webpage including an encrypted image, the encrypted image including an encrypted key;

authenticating a current user of the computing device by performing a facial recognition procedure on a real-time image generated by a camera of the computing device;

retrieving a private key of the authenticated current user;

decrypting the encrypted key using the private key;

decrypting the encrypted image using the decrypted key; and

displaying the decrypted image on the computing device.

25. The one or more non-transitory, machine readable media of claim 24, wherein displaying the decrypted image comprises displaying the decrypted image only while the current user of the computing device is authenticated.

26. The one or more non-transitory, machine readable media of claim 24, wherein the plurality of instructions result in the computing device displaying the encrypted image on the computing device in response to the current user not being authenticated.