IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
UP-0705199
(2003-11-12)
|
등록번호 |
US-7761713
(2010-08-09)
|
우선권정보 |
CA-2411898(2002-11-15) |
발명자
/ 주소 |
|
인용정보 |
피인용 횟수 :
67 인용 특허 :
191 |
초록
▼
A method for controlling access to secured information for a predetermined region of a computer generated original image presented on a display, comprising: determining whether a user is authorized to access the secured information; and, in response to the determining, distorting the original image
A method for controlling access to secured information for a predetermined region of a computer generated original image presented on a display, comprising: determining whether a user is authorized to access the secured information; and, in response to the determining, distorting the original image to produce a distorted region for the predetermined region to provide the user with the secured information on the display.
대표청구항
▼
The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows: 1. A method comprising: determining whether access is authorized to secured information in a predetermined region of an image; and distorting said predetermined region by: applying a dist
The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows: 1. A method comprising: determining whether access is authorized to secured information in a predetermined region of an image; and distorting said predetermined region by: applying a distortion function to said image by displacing said image onto said distortion function; and projecting said image, to which the distortion function has been applied, onto a plane, to present said secured information with context from said image when said determining indicates that access is authorized, wherein said secured information is presented with a graphical user interface (“GUI”), over said predetermined region, to receive one or more signals for adjusting said distortion function. 2. The method of claim 1, further comprising uncovering said predetermined region when said determining indicates that access is authorized. 3. The method of claim 1, wherein said determining comprises: receiving authentication information; and comparing said authentication information to stored authentication information to indicate whether access is authorized. 4. The method of claim 3, wherein said authentication information includes at least one of: a user identification or a password. 5. The method of claim 3, wherein said authentication information is received through a dialog box. 6. The method of claim 5, wherein said dialog box is presented adjacent to said predetermined region. 7. The method of claim 1, wherein said determining is performed in response to receipt of a signal that selects said predetermined region. 8. The method of claim 7, wherein said signal comprises a cursor movement. 9. The method of claim 8, wherein said predetermined region is presented at a same level of detail as said context when authorization is denied. 10. The method of claim 1, wherein said distorting results in presentation of said secured information in detail in comparison to said context from said image. 11. The method of claim 1, wherein said distorting comprises magnifying said predetermined region in comparison to said image. 12. The method of claim 1, wherein said secured information comprises encrypted information. 13. The method of claim 12, wherein said distorting further comprises decrypting said encrypted information. 14. The method of claim 1, wherein said image comprises at least one of: a graphic image, a photographic image, or a text image. 15. The method of claim 1, wherein said applying results in presentation of a focal region having a magnification for said predetermined region at least partially surrounded by a shoulder region where said magnification decreases to that of said image to provide context for said predetermined region with respect to said image, and said GUI is for adjusting at least one of: said magnification, a concavity of said shoulder region, an extent for said focal region, an extent for said shoulder region, a location for said distortion function within said image, a location for an outline of said shoulder region within said image, or a location for said focal region relative to said shoulder region to define a degree and a direction of a folding of said distortion function. 16. The method of claim 1, wherein said determining further comprises: receiving biometric information; and comparing said biometric information to stored biometric information. 17. The method of claim 16, wherein said biometric information comprises one or more of: a fingerprint, an iris pattern, a voice pattern, or DNA pattern information. 18. The method of claim 1, wherein said distorting comprises manipulating said image. 19. A method comprising: determining whether access is authorized to detailed information included in a predetermined region of an image; and magnifying said predetermined region by: applying a magnification function to said image by displacing said image onto said magnification function; and projecting said image, to which the magnification function has been applied, onto a plane, to present said detailed information at a higher resolution than a context region when said determining indicates that access is authorized, wherein said detailed information is presented with a graphical user interface (“GUI”), over said predetermined region, to receive one or more signals for adjusting said magnification function. 20. The method of claim 19, further comprising uncovering said predetermined region when said determining indicates that access is authorized. 21. The method of claim 19, wherein said predetermined region is presented at a same level of detail as said context region when said determining indicates access is denied. 22. One or more computer-readable media comprising instructions that, responsive to being executed by a computing system, cause the computing system to: determine whether access is authorized to secured information included in a predetermined region of an image; and distort said predetermined region through: application of a distortion function to said image through displacement of said image onto said distortion function; and projection of said image, to which the distortion function has been applied, onto a plane, to present said secured information in detail in comparison to a context region of said image, when access is authorized, wherein said secured information is presented with a graphical user interface (“GUI”), over said predetermined region, to receive one or more signals that adjust said distortion function. 23. The one or more computer-readable media of claim 22, wherein said secured information comprises encrypted information. 24. The one or more computer-readable media of claim 22, wherein said instructions are further executable to present a shoulder region that surrounds said predetermined region to provide context between said secured information and said context region. 25. The one or more computer-readable media of claim 22, wherein said image comprises one or more of: an original image, a base image, a graphic image, a photographic image, or a text image. 26. A system comprising: a processor coupled to memory that includes instructions that, responsive to being executed by the processor, cause the system to provide one or more modules that include: a module to determine whether access is authorized to detailed information in a predetermined region of an image presented on a display; a module to generate a presentation on said display through application of a distortion function to said image by displacement of said image onto said distortion function and projection of said image, with the distortion function applied, onto a plane, wherein said presentation includes said predetermined region presented at a higher resolution than a remainder of said image responsive to a determination that access is authorized to said detailed information, said predetermined region being positioned with respect to the remainder of the image so said predetermined region is presented in context with said remainder to indicate said predetermined region's location in said image, wherein said module to generate a presentation is configured to present a graphical user interface (“GUI”), over said predetermined region, to receive one or more signals that adjust said distortion function. 27. The system of claim 26, wherein said module to generate the presentation is further configured to present a shoulder region adjacent said predetermined region, said shoulder region being configured to blend the predetermined region with said remainder of the image. 28. The system of claim 26, wherein said remainder of the image comprises a portion of said image that is not said predetermined region. 29. The system of claim 26, wherein said module to generate the presentation is further configured to present an icon to prevent observation of said predetermined region when access is denied. 30. One or more computer-readable media comprising instructions that, responsive to being executed by a computing system, cause the computing system to: determine whether access is authorized to secured information in a predetermined region of an image; and magnify the predetermined region through: application of a magnification function to said image through displacement of said image onto said magnification function; and projection of said image, to which the magnification function has been applied, onto a plane, to present said secured information with context from said image when access is authorized to said secured information, said secured information being presented such that said predetermined region's location is maintained to show the predetermined region's location in the image, wherein said secured information is presented with a graphical user interface (“GUI”), over said predetermined region, to receive one or more signals for adjusting said magnification function. 31. The one or more computer-readable media of claim 30, wherein the instructions are further executable to cause the computing system to present a graphical user interface that covers said predetermined region when access to said secured information is not authorized. 32. The one or more computer-readable media of claim 30, wherein to magnify the predetermined region causes the computing system to: at least partially surround the predetermined region with a shoulder region in which magnification decreases to the context's magnification.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.