International Business Machines Corporation
SOFTWARE PRIVACY FILTER OVERLAY
Last updated:
Abstract:
Input data for a computing device is received from one or more input devices. Whether there is visual hacking of the computing device is determined based on the input data. A user interface of the computing device is modified in response to determining there is visual hacking of the computing device.
Status:
Application
Type:
Utility
Filling date:
13 May 2020
Issue date:
18 Nov 2021