1. Field of the Invention
The present invention relates to application software and computing devices. More specifically, it relates to software for hiding content on a mobile device so that it is only visible when a user touches the screen of the device.
2. Description of the Related Art
It has become increasingly important to ensure that communications are secure and kept private. Measures to make electronic and digital communications more secure have taken many forms, the most prevalent of which is to secure the transmission of voice through encryption and implementing secure tunnels (such as VPNs) to transmit the data. However, there are other ways third parties can “snoop” on communications that the sender, receiver or both intended to be secure, confidential, or even secret. One way to do this is to physically see what someone is reading on the screen of a mobile device. That is, actually see what is being typed or read on a screen. For example, a third party/intruder can literally look over the shoulder of someone who is reading a text message or email message on her phone or looking at a picture or diagram on their tablet. In some situations, there may be substantial amount of text on a screen and the reader may take some time to read all of it or may simply (and inadvertently) keep the text or content on the screen after she is finished reading it. During this time, the intruder can look over the shoulder of the intended recipient or use other means, such as binoculars, from a distance to see content on the screen. It would be desirable to be able to block or make it difficult for someone who is not the intended recipient or reader to physically read text on the screen of a mobile device.
In one aspect of the present invention, a method of hiding content displayed on a screen is described. A user turns on a Ghost Mode feature enabling a ghost layer and a particle layer on the mobile device. The particle layer covers text displayed on the device. The ghost layer detects contact on the screen of the device when the user touches the screen. Once contact is detected, a path is created on the ghost layer. In one embodiment, it is the shape of a circle with the contact point being the center and the radius being predetermined. At the same time, content from a table view of the device showing content that would normally be shown is clipped from the table view to the path. Once the content is clipped to the path, the ghost layer on the device is re-drawn, wherein the path is shown on the ghost layer. The software then detects whether there is movement of the contact point (i.e., if the user is moving her finger on the screen). If there is movement, the ghost layer is re-drawn based on the contact point movement. The same clipping of content from the table view to the path is performed each upon each movement of the contact point. This is performed rapidly while the user is moving her finger on the screen thereby giving the illusion that the circle or path is moving and providing an aperture or hole into which the user can see the content in the table view. In one embodiment, if the system does not detect any contact with the screen, the path is closed and no circle or path is shown and the whole screen is hidden by a particle layer.
References are made to the accompanying drawings, which form a part of the description and in which are shown, by way of illustration, specific embodiments of the present invention:
Example embodiments of a method of hiding content normally on display on a mobile device screen, referred to as Ghost Mode or Hide Messages, and allowing the user to see that content by touching the screen and creating a path or circle into which a portion of the content can be seen is described. These examples and embodiments are provided solely to add context and aid in the understanding of the invention. Thus, it will be apparent to one skilled in the art that the present invention may be practiced without some or all of the specific details described herein. In other instances, well-known concepts have not been described in detail in order to avoid unnecessarily obscuring the present invention. Other applications and examples are possible, such that the following examples, illustrations, and contexts should not be taken as definitive or limiting either in scope or setting. Although these embodiments are described in sufficient detail to enable one skilled in the art to practice the invention, these examples, illustrations, and contexts are not limiting, and other embodiments may be used and changes may be made without departing from the spirit and scope of the invention.
Methods and systems for reading and viewing content on a mobile device screen are described in the various figures. As is known in the art of UIs for mobile devices, views are presented on a display in the form of layers or views. In a conventional display, there is a table view or table layer, may also be referred to as a message view. A conventional table view may have numerous elements including text, messages, video, photos, and images (background, foreground, and the like). Embodiments of the present invention allow a user to view partial content in a table (message) view or layer, such as part of a text message, through a pre-defined area, such as a circle, square or any other shape the designer chooses while covering the other content on the screen.
The present invention adds what may be described as “a partial content viewing” feature that can be set to ON or OFF by the user. This feature may be part of a mobile security app that makes communications, such as phone calls and text messaging, through a mobile device more secure.
A particle layer or table 504 is shown above conventional view table 502. This particle layer 504 is opaque and has graphic elements that hide or block the visibility of the content in view table 502, which may be, for example, text messages or e-mails. In one embodiment, as noted above, particle layer 504 has graphical elements resembling circular colored bubbles that slowly move around (float) across the screen. Of course, particle layer 504 may have any type of graphic element(s) as long as it hides or blocks the visibility of the content in table view 502.
Above particle layer 504 is another layer 506, referred to as a ghost layer. In one embodiment, ghost layer 506 is a transparent layer on top of particle layer 504. Shown in ghost layer 506 is a circular graphical element 508 which is created when a user touches the screen. As described above, when the user touches the screen, she is able to see partial text in message view 502. Ghost layer 506 may be described as activated when a user touches the screen. When the user touches the screen, a circle appears on the screen with the point of contact as the center of the circle. The visual effect seen by the user is that of the circle opening a view or aperture through particle layer 504 enabling visibility of view table 502. Through this aperture the user can see part of the content shown in view table 502. That is, it appears to the user that a portion of view table 502 is showing through circle 506.
In one embodiment this visual effect is implemented by having an image from view table 502 clipped onto circle 508. The system keeps track of the coordinates of the contact point on the screen (x,y), and the circular area around it based on a pre-determined radius from the center. The system knows the coordinate of the point of contact and the radius of the circle. It uses this data to determine what to clip from view table 502 and essentially paste to circle 508, also referred to as a path. In other words, an image is clipped from the table view to the path (i.e., circle 508) displayed in ghost layer 506. As the user moves her finger on the screen, the coordinate (x,y) constantly changes, as does the location of circle 508. However, the system only needs to keep track of coordinate (x,y). As long as the user is moving her finger the screen is constantly refreshing. Ghost layer 506 is constantly re-drawing itself by having different clips from table view 502 shown in path 508 in ghost layer 506. The re-drawing or refreshing of ghost layer 506 is done very quickly and constantly as long as the user is moving her finger on the screen. The effect of the rapid re-drawing is that visually it appears to the user that the circle is providing a view or hole through the particle layer which hides the content, the hole providing a partial view to the screen the user would normally see (table view 502). In other embodiments, particle layer 504 and ghost layer 506 may be implemented over any view within the mobile security app. In the described embodiment, these two layers, or a single layer combining these two layers, is applied to the message table view 502, but they can be applied to other views within the security app.
The important feature here is detecting whether the user is touching the screen. In one embodiment, there may be a Boolean variable keeping track of whether there is contact with the screen or not (touch variable is ON or OFF). Note that, when there is no touching on the screen, ghost layer 506 is still present, but because it is transparent and there is no circle or path 508 displayed (i.e., there is no clipping taking place), the user simply does not see ghost layer 506. In another embodiment, particle layer 504 and ghost layer 506 may be implemented as one layer, each may be described as sub-layers within a single layer.
At step 606 a path is created using the x,y coordinate as the center of a circle having a pre-determined radius, as established by the software designer or entity implementing the present invention. Once the path is created, at step 608 the software determines what content to clip from the table view and paste into the path on top of the ghost layer. The content that would normally be shown on the screen is the content that will precisely and entirely fill the path created in step 606.
At step 610 the software re-draws the ghost layer so that the user now sees the content from the table view, but only within the path created at step 606, as shown in
If at step 612 it is determined that there is no movement of the contact point, the software detects whether there is still actual contact on the screen. If there is, control goes to step 612 and the system continues to detect whether there is movement of the contact point. If there is no contact with the screen as determined at step 614, control goes to step 616 where the software closes the path created at step 606 and the table view is entirely blocked from being viewed by the user or any other observers.
CPU 722 is also coupled to a variety of input/output devices such as display 704, keyboard 710, mouse 712 and speakers 730. In general, an input/output device may be any of: video displays, track balls, mice, keyboards, microphones, touch-sensitive displays, transducer card readers, magnetic or paper tape readers, tablets, styluses, voice or handwriting recognizers, biometrics readers, or other computers. CPU 722 optionally may be coupled to another computer or telecommunications network using network interface 740. With such a network interface, it is contemplated that the CPU might receive information from the network, or might output information to the network in the course of performing the above-described method steps. Furthermore, method embodiments of the present invention may execute solely upon CPU 722 or may execute over a network such as the Internet in conjunction with a remote CPU that shares a portion of the processing.
Although illustrative embodiments and applications of this invention are shown and described herein, many variations and modifications are possible which remain within the concept, scope, and spirit of the invention, and these variations would become clear to those of ordinary skill in the art after perusal of this application. Accordingly, the embodiments described are to be considered as illustrative and not restrictive, and the invention is not to be limited to the details given herein, but may be modified within the scope and equivalents of the appended claims.
This application claims priority under U.S.C. §119(e) to pending U.S. Provisional Application No. 61/986,609, filed Apr. 30, 2014, entitled “GHOST MODE VIEWING OF CONTENT ON A MOBILE DEVICE,” incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
61986609 | Apr 2014 | US |