Patent Issued for Systems and methods for secure display of data on computing devices (USPTO 11943219): Massachusetts Mutual Life Insurance Company - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Advertise
    • Contact
    • Editorial Staff
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
April 16, 2024 Newswires
Share
Share
Post
Email

Patent Issued for Systems and methods for secure display of data on computing devices (USPTO 11943219): Massachusetts Mutual Life Insurance Company

Insurance Daily News

2024 APR 16 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- From Alexandria, Virginia, NewsRx journalists report that a patent by the inventors Cook, Jason (Westfield, MA, US), Depaolo, Damon Ryan (Barkhamsted, CT, US), John, Jiby (Suffield, CT, US), Knas, Michal (Monson, MA, US), Shubrick, Payton A. (Springfield, MA, US), filed on January 11, 2021, was published online on March 26, 2024.

The patent’s assignee for patent number 11943219 is Massachusetts Mutual Life Insurance Company (Springfield, Massachusetts, United States).

News editors obtained the following quote from the background information supplied by the inventors: “Most businesses and enterprise organizations are apprehensive about protection and secure display of their sensitive data. In order to protect and secure their sensitive data, various organizations typically have a “cleanroom,” which is essentially a working room within the organization that is protected such that only authorized users are allowed to enter the cleanroom to access electronic devices and servers within the cleanroom. For instance, when the authorized user enters the cleanroom, the authorized person immediately connects to a network, and is able to access sensitive data and perform computing functions on the various electronic devices and the servers within the cleanroom. On the other hand, there are frequent circumstances when some users may want to access sensitive data when the cleanroom is not readily available. For instance, a user may be working remotely and may access the sensitive data on his/her personal or work-issued computing device. Such viewing of sensitive data in public usually raises security implications regarding unauthorized viewing of the sensitive data by others. Moreover, tracking the release of the sensitive data to such unauthorized viewers can be difficult since the unauthorized viewers do not get direct access to the sensitive data through any electronic device, and thus do not leave a digital fingerprint from which the unauthorized viewers could later be identified.”

As a supplement to the background information on this patent, NewsRx correspondents also obtained the inventors’ summary information for this patent: “For the aforementioned reasons, there is a need for a method and system for preventing the unauthorized users from viewing and accessing sensitive data. Disclosed herein are systems and methods capable of addressing the above-described shortcomings and may provide any number of additional or alternative benefits and advantages corresponding to scrambling techniques that will allow sensitive data displayed on a computer screen to only be viewed by authorized users and will render the computer screen unreadable to unauthorized users. For instance, the systems and the methods are capable of automatically scrambling and unscrambling display screen of the computing device in which only an intended viewer is able to view data on the display screen using deciphering glasses.

“Systems, methods, and computer program products for security of content on a display screen of a computing device in which only an authenticated user is able to view the content on the display screen may automatically scramble and unscramble the screen depending on authentication results of the user looking at the screen. For instance, the computing device may utilize facial recognition or head movement detection techniques to authenticate the user looking at the screen, and upon the execution of the facial recognition or the head movement detection techniques, when it is determined that the authenticated user is no longer looking at the screen of the computing device, the screen becomes scrambled or locked.

“Systems, methods, and computer program products for security of content on a display screen of a computing device in which a first user is able to view the content on the display screen may automatically scramble and unscramble the screen depending on authentication results of the first user looking at the screen. For instance, the computing device may utilize facial recognition or head movement detection apparatus to authenticate the first user looking at the screen, and upon the implementation of the facial recognition or the head movement detection apparatus, when a second user’s face is detected by the computing device, the screen becomes scrambled or locked, even if the first user is authenticated (e.g., the second user looking over the shoulder of the authenticated first user).

“Systems, methods, and computer program products disclosed herein automatically scrambles and unscrambles data on a display screen of a computing device in which an authenticated user is able to view the data on the display screen using deciphering glasses upon electro-biometric identification and verification of user’s identity by bioelectric signal processing and analysis. A biometric pulse signature generation technique is executed to produce a biometric signature of the authenticated user that identifies the user by forming a representation of a pulse pattern of the authenticated user when the deciphering glasses are on the authenticated user. The computing device may perform the bioelectric signal processing and analysis to compare a biometric signature of an individual wanting to view the screen with the biometric signature of the authenticated user to determine whether the individual is the authenticated user, and the data becomes unscrambled when the individual is the authenticated user to allow the individual to view the data on the screen using the deciphering glasses.

“Systems, methods, and computer program products disclosed herein automatically scrambles and unscrambles data on a graphical user interface (GUI) of a computing device in which an authenticated user is able to view the unscrambled data on the display screen using deciphering glasses. The display of the data on the GUI is automatically moved from a first display screen (showing unscrambled data) to a second display screen (showing scrambled data) on the GUI and vice-versa depending on a distance between the GUI and authenticated user wearing the deciphering glasses. For instance, a first display screen is presented on the GUI showing the unscrambled data when the GUI is in viewable Bluetooth range of a user authorized to view the data. A second display screen is presented on the GUI showing the scrambled data when the GUI is not in the Bluetooth viewable range of the user authorized to view the data.”

The claims supplied by the inventors are:

“1. A method, comprising: presenting, by a server, for display on a screen of a first electronic device, an encrypted machine-readable code, the encrypted machine-readable code being unreadable to a human viewing the screen of the first electronic device; receiving, by the server from a second electronic device, data generated by the second electronic device in response to the second electronic device accessing the encrypted machine-readable code; and upon authenticating the second electronic device and determining that the second electronic device is associated with the first electronic device, and upon determining that the second electronic device has accessed the encrypted machine-readable code presented by the first electronic device, presenting, for display on the screen of the first electronic device, data corresponding to the encrypted machine-readable code that is readable to the human viewing the screen of the first electronic device.

“2. The method of claim 1, wherein the second electronic device is a smart phone, a tablet, or a wearable device.

“3. The method of claim 1, wherein the encrypted machine-readable code is a quick reaction code or a barcode.

“4. The method of claim 1, wherein the server authenticates the second electronic device using an eye movement attribute of a user operating the second electronic device.

“5. The method of claim 1, wherein the server authenticates the second electronic device using a biometric attribute of a user operating the second electronic device.

“6. The method of claim 1, wherein the server authenticates the second electronic device using a head movement attribute or a facial attribute of a user operating the second electronic device.

“7. The method of claim 1, wherein the first electronic device displays an image comprising scrambled segments of data corresponding to the encrypted machine-readable code.

“8. The method of claim 1, further comprising: presenting, by the server, for display on a screen of the second electronic device, data corresponding to the encrypted machine-readable code that is readable to the human viewing the screen of the second electronic device.

“9. The method of claim 8, wherein the server discontinues presenting on the second electronic device when the server identifies an unauthorized person viewing the screen of the second electronic device.

“10. The method of claim 1, wherein the server authenticates the second electronic device based on a connection between the first electronic device and the second electronic device.

“11. A computer system comprising: a first electronic device comprising a display screen configured to display data, the first electronic device further comprising a processor in communication with a server, the processor configured to: receive, via a camera of the first electronic device, an image of an encrypted machine-readable code displayed on a second electronic device, the encrypted machine-readable code unreadable to a human viewing a screen of the second electronic device; in response to transmitting data generated based on the image captured using the camera of the first electronic device to the server, display, using an augmented reality protocol displayed on the screen of the first electronic device when the camera of the first electronic device is pointed towards the screen of the second electronic device, data corresponding to the encrypted machine-readable code that is readable to the human viewing the screen of the first electronic device; wherein the server authenticates the first electronic device and determines that the second electronic device is associated with the first electronic device before the first electronic device displays the data corresponding to the encrypted machine-readable code that is readable to the human viewing the screen of the first electronic device.

“12. The computer system of claim 11, wherein the first electronic device is a smart phone, a tablet, or a wearable device.

“13. The computer system of claim 11, wherein the encrypted machine-readable code is a quick reaction code or a barcode.

“14. The computer system of claim 11, wherein the server authenticates the first electronic device using an eye movement attribute of a user operating the second electronic device.

“15. The computer system of claim 11, wherein the server authenticates the first electronic device using a biometric attribute of a user operating the second electronic device.

“16. The computer system of claim 11, wherein the server authenticates the first electronic device using a head movement attribute or a facial attribute of a user operating the second electronic device.

“17. The computer system of claim 11, wherein the second electronic device displays the image comprising scrambled segments of data corresponding to the encrypted machine-readable code.

“18. The computer system of claim 11, wherein the server is further configured to: present for display on the screen of the second electronic device, data corresponding to the encrypted machine-readable code that is readable to the human viewing the screen of the second electronic device.

“19. The computer system of claim 18, wherein the server discontinues presenting on the second electronic device when the server identifies an unauthorized person viewing the screen of the second electronic device.

“20. The computer system of claim 11, wherein the server authenticates the first electronic device based on a connection between the first electronic device and the second electronic device.”

For additional information on this patent, see: Cook, Jason. Systems and methods for secure display of data on computing devices. U.S. Patent Number 11943219, filed January 11, 2021, and published online on March 26, 2024. Patent URL (for desktop use only): https://ppubs.uspto.gov/pubwebapp/external.html?q=(11943219)&db=USPAT&type=ids

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

Patent Application Titled “System And Method For Treating And Tracking Mental Health Using Bio-Psycho-Social (Bps) Formulation” Published Online (USPTO 20240105309): Psychnosis Inc.

Newer

Patent Issued for System and method for intercepting and interdicting telephone fraud (USPTO 11943387): Sentien Corporation

Advisor News

  • Metlife study finds less than half of US workforce holistically healthy
  • Invigorating client relationships with AI coaching
  • SEC: Get-rich-quick influencer Tai Lopez was running a Ponzi scam
  • Companies take greater interest in employee financial wellness
  • Tax refund won’t do what fed says it will
More Advisor News

Annuity News

  • The structural rise of structured products
  • How next-gen pricing tech can help insurers offer better annuity products
  • Continental General Acquires Block of Life Insurance, Annuity and Health Policies from State Guaranty Associations
  • Lincoln reports strong life/annuity sales, executes with ‘discipline and focus’
  • LIMRA launches the Lifetime Income Initiative
More Annuity News

Health/Employee Benefits News

  • Insurer ends coverage of Medicare Advantage Plan
  • NM House approves fund to pay for expired federal health care tax credits
  • Lawmakers advance Reynolds’ proposal for submitting state-based health insurance waiver
  • Students at HPHS celebrate 'No One Eats Alone Day'
  • Bloomfield-based health care giant Cigna plans to lay off 2,000 employees worldwide
More Health/Employee Benefits News

Life Insurance News

  • The structural rise of structured products
  • AM Best Affirms Credit Ratings of Members of Aegon Ltd.’s U.S. Subsidiaries
  • Corporate PACs vs. Silicon Valley: Sharply different fundraising paths for Democratic rivals Mike Thompson, Eric Jones in 4th District race for Congress
  • Continental General Acquires Block of Life Insurance, Annuity and Health Policies from State Guaranty Associations
  • LIMRA launches the Lifetime Income Initiative
Sponsor
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Elevate Your Practice with Pacific Life
Taking your business to the next level is easier when you have experienced support.

LIMRA’s Distribution and Marketing Conference
Attend the premier event for industry sales and marketing professionals

Get up to 1,000 turning 65 leads
Access your leads, plus engagement results most agents don’t see.

What if Your FIA Cap Didn’t Reset?
CapLock™ removes annual cap resets for clearer planning and fewer surprises.

Press Releases

  • LIDP Named Top Digital-First Insurance Solution 2026 by Insurance CIO Outlook
  • Finseca & IAQFP Announce Unification to Strengthen Financial Planning
  • Prosperity Life Group Appoints Nick Volpe as Chief Technology Officer
  • Prosperity Life Group appoints industry veteran Rona Guymon as President, Retail Life and Annuity
  • Financial Independence Group Marks 50 Years of Growth, Innovation, and Advisor Support
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Advertise
  • Contact
  • Editorial Staff
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet