Microsoft Patents An Encryption System to Block Visual Hacking


It is simple to have your computer or tablet screen visually hacked in public, which allows someone to steal private information. Plastic screen coverings are one technique to stop this from happening, as they make it harder for someone to view the document unless they are directly in front of it. Microsoft might develop a technology that encrypts text graphically as you read it.

A system that encrypts a document so that only the reader can decipher it is described in a recent Microsoft patent. By changing the letters in the text section of the original document, the approach encrypts the document. The document is then shown in a private mode using an alpha-blended version that combines the encoded and original copies of the text. Next, the system takes advantage of eye tracking to show the user the decoded portion of the document at their fixation point and the encoded version at the periphery of their field of vision.

This issue is currently addressed by a wide range of products on the market, from hardware privacy screens to software that uses webcams and eye tracking to let light from the screen enter the eyes of the intended user while blocking light from the screen from entering the eyes of onlookers. They are all limited, though.

Because it is challenging to attain 100% light efficiency, privacy screens make the display appear dull to the intended user’s eyes. In the meantime, reading the text becomes more challenging when non-fixed portions of the screen are arbitrarily blurred or dimmed—it becomes like reading through a telescope.

The Ponemon Institute claims that visual hacking is a common issue. The institute carried out an experiment in the US in 2015 that showed how simple it was to use visual hacking to get confidential firm information. In 2016, 3M supported an enlarged version of this project with offices in China, France, Germany, India, Japan, South Korea, and the UK.

According to the 3M investigation, in 91% of the worldwide trials, information was visually hacked by an undercover white hat hacker. An undercover visual hacker was able to collect information in 15 minutes or less in nearly half of the global trials. Only 32% of the hacker efforts were successful, and 52% of the sensitive data was taken from staff computer screens. The outcomes matched those of the smaller study conducted by the Ponemon Institute.


Subscribe to Technology This Week