Some content of this application is unavailable at the moment.
If this situation persist, please contact us atFeedback&Contact
1. (WO2017157435) A METHOD AND SYSTEM FOR VISUAL PRIVACY PROTECTION FOR MOBILE AND WEARABLE DEVICES
Note: Text based on automatic Optical Character Recognition processes. Please use the PDF version for legal matters

Claims

1. A method for visual privacy protection of individuals in a network with at least one first mobile device and at least one second mobile device, the mobile devices having at least one camera, the mobile devices being connected to each other within the network and/or having a direct wireless connection and the method comprising the steps of:

A) the second mobile device receiving at least one visual privacy protection request from the first mobile device,

B) the second mobile device processing the information contained in the at least one visual privacy request using a second database on the second mobile device;

C) the second mobile device processing acquired camera data using the information contained in the second database;

D) the second mobile device providing processed acquired camera data to a screen and/or outputting the processed acquired camera data to at least one application preferably running on the second mobile device.

2. The method of claim 1, wherein the visual privacy request comprises face representation information of an individual to be protected.

3. The method of claim 1 or 2, wherein prior to the step A) the first mobile device performs the step of generating the at least one visual privacy protection request preferably further comprising the steps of

Al) the first mobile device calculating a face representation information from a facial picture of an individual to be protected, if no previous face representation information for the individual to be protected exists in a first database of the first mobile device;

A2) the first mobile device generating a visual privacy protection request containing the face representation information of the individual to be protected and preferably further information to be sent; and/or

A3) the first mobile device further performs the step of sending the visual privacy protection request to all other devices in the network and/or in range of the direct wireless connection preferably in a predetermined time interval.

4. The method of any one of claims 1 to 3, wherein the step B) of processing the information contained in the at least one visual privacy request further comprises the steps of:

Bl) the second mobile device extracting the face representation information from the visual privacy request;

B2) the second mobile device storing face representation information in the second database in the second mobile device; and

B3) the second mobile device updating the database, if

a) a new face representation information has been extracted storing the respective face representation information, or

b) a visual privacy request has been expired, wherein

preferably determining the expiration of a visual privacy request is based on a judgment whether the second mobile device does not receive the respective visual privacy again within a predetermined period of time, as

i) the first mobile device does not send the respective visual privacy request anymore, or

ii) the first mobile device is no longer in the same network and/or in the range of the direct wireless connection.

5. The method of any one of claims 1 to 4, wherein the step C) of processing acquired camera data using the information contained in the at least one visual privacy request further comprises the steps of:

CI) the second mobile device detecting all faces in the acquired camera data from the at least one camera;

C2) the second mobile device calculating a face representation information for each of all faces detected in the acquired camera data;

C3) the second mobile device comparing each of the calculated face representation information with the face representation information stored in the second database preferably in a pair wise fashion;

C4) the second mobile device designating each face as a face to be protected if a match is found; and

C5) the second mobile device performing a de-identification process on the acquired camera data taking into account each of the faces to be protected.

6. The method of claim 5, wherein the de-identification process of step C5) comprises at least one of the following steps:

a) altering the data of the camera input data in the region of each of the faces to be protected;

b) altering the data of the camera input data in the region of at least one of the faces to be protected by blurring the face to be protected ;

c) altering the data of the camera input data in the region of at least one of the faces to be protected by substituting the face with default data, preferably the default data being a randomly generated face; and

d) deleting the data of the camera input data in the region of at least one of the faces to be protected.

7. A first mobile device being configured to perform the steps of the method according to claim 3.

8. A second mobile device being configured to perform at least one of the steps of the method according to any one of claims 1 to 6.

9. A system for visual privacy protection of individuals for mobile devices, the system comprising at least one first mobile device according to claim 7 and at least one second mobile device according to claim 8.

10. The system of claim 9, wherein each mobile device has a privacy-preserving module and at least one of the following: a display module; a camera module; a memory management module; and a communication module.

11. The system of claim 10, wherein the respective privacy-preserving module is configured to perform at least one of the steps of any one of claims 1 to 6; wherein

the privacy-preserving module preferably being located in a layer close to the operating system; and/or

the privacy-preserving module preferably being not accessible by any third-party applications or developers; and/or

the privacy-preserving module preferably being below a system services layer, preferably parallel and/or overlapping with a libraries layer.