scispace - formally typeset

Selective screen sharing

02 Mar 2021-
Abstract: Disclosed are various examples for selective screen sharing. In one example, a computing device determines that a state of a destination device does not satisfy a compliance rule of a management service. The computing device also determines an area to obscure within a video stream using screen-sharing data. The video stream is generated by applying a transformation to a screen capture. The transformation obscures the area within the video stream. The video stream is transmitted to a destination device. In some cases, a user-specified modification to the area is also obtained. The video stream is updated by applying an updated transformation to the screen capture that obscures the updated area within the video stream.

... read more


5 results found

25 Jun 2019-
Abstract: A technique for sharing screen content of a host machine with a client machine includes identifying multiple screen regions formed by image features within screen content of the host machine and enabling a user of the client machine to move selected screen regions to desired screen locations on the client machine, while leaving unselected screen regions in place. For example, when the user of the client machine selects and drags a particular screen region, the client machine creates a new window and displays the screen contents of the selected screen region in the new window, which the user may place and resize as desired.

... read more

Topics: Window (computing) (53%)

3 Citations

Kwon Jina1, Jun-Sik ChoiInstitutions (1)
25 May 2021-
Abstract: An electronic device and a control method thereof are provided. The electronic device includes: a display; a communicator; and a processor configured to execute instructions to: control the communicator to mirror, to an external device, a first screen provided by a first application corresponding to a user command, among a plurality of applications providing a plurality of screens, based on the user command for selectively mirroring one of the plurality of screens being input in a state in which the plurality of screens are displayed on the display, and control the display to display a second screen provided by a second application that is not mirrored to the external device, among the plurality of applications, while mirroring the first screen provided by the first application to the external device.

... read more

30 Jan 2020-
Abstract: Embodiments may include systems, apparatus, and methods for direct onscreen computer system or software navigation and guidance without the need for direct user computer access or control, or the download of any additional software, thereby enabling such navigation and guidance without the risk of exposure of sensitive information from the user device.

... read more

Topics: Software (57%)

02 Apr 2021-
Abstract: La confidentialite des donnees dans le partage d'ecran pendant une conference en ligne comprend la selection d'une application tierce qui s'execute en meme temps qu'une application de conference. Le partage d'ecran est active pendant une conference en ligne dans l'application de conference afin de partager un ecran d'affichage de l'application tierce avec differents ordinateurs participants via un reseau de communication informatique. Une interface de l'application est ensuite interrogee avec les participants afin de recevoir les donnees de controle d'acces pour les participants. Ensuite, un champ de donnees protege est identifie dans l'ecran d'affichage et determine si l'un des ordinateurs participants est associe ou non a une regle parmi plusieurs regles de controle d'acces basees sur les donnees de controle d'acces qui interdit l'affichage du contenu du champ de donnees protege. Le champ de donnees est masque dans l'ecran d'affichage partage de l’ordinateur participant parmi les ordinateurs participants tout en affichant les portions restantes de l'ecran d’affichage partage dans l’ordinateur participant parmi les ordinateurs participants. Figure accompagnant l'abrege : Figure 1

... read more

03 Jan 2019-
Abstract: A switching method, an electronic device, and a storage medium are provided. The switching method includes detecting whether a triggering condition is satisfied in a first mode of an electronic device, and in response to the triggering condition being satisfied, switching from the first mode to a second mode. The first mode enables acquisition and output of analysis data. The second mode enables acquisition of the analysis data and non-output of at least one part of the analysis data. The analysis data are related to historical data of one or more of the electronic device, an application in the electronic device, and an owner of the electronic device.

... read more


11 results found

29 Jan 2010-
Abstract: Embodiments relate to display of visual content on a client device using server-side rasterization of visual content. According to some embodiments, visual content is rendered on a server system, transformed into bitmaps compatible with the display attributes of a client device, and transmitted for display on the client device. The server system can perform, in effect, as a remote browser for displaying Web pages, e-mail, e-mail attachments, electronic document and forms, database queries and results, drawings, presentations, images at the client device, and so on. The approach can be “remote” because the server does the rendering and the client provides the interface; “multi-level” because rendered visual content is represented as a multi-level set of raster representations; and constitutes a “browsing system” because the client and server share data about the source visual content element being browsed, and the client performs a specific browsing function assisted by the server.

... read more

Topics: Fat client (68%), Remote evaluation (61%), Web page (52%)

93 Citations

11 Jul 2011-
Abstract: A system can mask specific components of an application, such as a web page, displayed during a screen sharing session. As the web page is being displayed on a first computer screen (i.e., screen), the system can automatically mask specific components of the web page. Thus, when the first screen is captured, and the capture is transmitted to a second screen, the specific components of the web page that have been masked will not be displayed at the second screen.

... read more

Topics: Web page (65%), Second screen (56%)

48 Citations

Ryan Conrad Brander1, Yuri Poeluev1Institutions (1)
29 Jan 2013-
Abstract: A method, transmitting device, and computer-readable storage medium are provided for sharing image data between a source device and at least one receiving device. In one implementation, a method is provided for periodically sending image data of a shared screen to the at least one receiving device using a sharing connection. The method also receives a request associated with activating a user interface component involving confidential information, suspends updating of the image data responsive to the received request, and periodically sends suspended image data to the at least one receiving device while updating is suspended.

... read more

47 Citations

11 Jun 2010-
Abstract: A method and apparatus for allowing the user of an electronic device to enhance privacy over a display with the use of software, are disclosed. A security window including a translucent graphical effects region may be displayed on the electronic device such that it overlays content the user may choose to protect. The security window allows the protected content to remain discernable for the user of the device yet substantially indiscernible to a person at a further distance and/or greater viewing angle from the screen of the device. The user may control the size, shape, texture, translucency level and any other graphical or behavioral properties of the security window and graphical effects region. The user may invoke or terminate a security window with the single click of a button. Security windows may automatically attach to applications in focus, or be attached in response to a user command, and allow uninterrupted usability of those applications. Security windows may be associated with application types and may automatically be invoked in response to running processes associated with the application types. Security windows may be associated with email (e.g. displayed by a productivity application such as Microsoft Outlook®, or via any browser-based service such as GMail®, etc.) causing security windows to be automatically displayed in response to displaying emails that meet various criteria (e.g. from a specific sender, containing specific words, containing tags associated with security windows, etc.)

... read more

29 Citations

06 Jul 2009-
Abstract: A screen sharing system that enables selective access to application data and application logic is described. This screen sharing system is implemented by coupling a helper application ( 36 ) to an application that provides content referred to as content application ( 35 ). The helper application is an application that has the ability to programmatically access the content application ( 35 ) using window system graphical user interface application programming interface. Helper application ( 36 ) is used to get and set content application data and interact with the content application using window system input events that simulate user input. This method enables selective access to both application data and application logic that is necessary for use in a screen sharing system used by participants that may be trusted or may not be fully trusted.

... read more

26 Citations

No. of citations received by the Paper in previous years
Network Information
Related Papers (5)
Methods and systems for an augmented film crew using sweet spots04 Jul 2019

Newell Nicholas B, Sharma Abhijit

Collective broadcasting based on geo-localized video streaming01 Aug 2013

Charles Black, Jason Phillips +2 more

Method and device for adapting the display of a video stream by a client28 Sep 2015

Baumann Maximilien, Lacharme Sandrine

Group live-view interactive program guide04 Dec 2015

Arnon Levy, Peter S. Warrick