Electronic kill and physical cover switch

ABSTRACT

A system includes a frame and a camera coupled to the frame. The camera includes a switch having an on position and an off position. The switch coupled to the frame wherein when the switch is in an off position a portion of the switch covers the lens and the camera is disable and when the switch is in an on position the portion of switch does not cover the lens and the camera is enabled.

CLAIM OF PRIORITY

This application claims priority to U.S. patent application Ser. No.16/457,328, filed on Jun. 28, 2019, which claims priority to U.S. PatentApplication Ser. No. 62/691,822, filed on Jun. 29, 2018, the entirecontents of which are hereby incorporated by reference.

BACKGROUND

Computer security, also known as cyber security or IT security, is theprotection of computer systems from the theft or damage to theirhardware, software or information, as well as from disruption ormisdirection of the services they provide.

SUMMARY

The incorporation of a switch into a computer device, where the switchselectively deactivates select components in the computer device canprovide several advantages over other computer devices. For example, theswitch can disconnect or disable components which may otherwise be usedto invade a user's privacy (for example, a camera, microphone, GPSsystem, etc.), the switch can cover at least one of the of disabledcomponents when the switch is in the off position providing both an easymechanism to know whether the switch is in the on or off position, theswitch can sever a physical connection between the component and thecomputing system making the component inaccessible to the computingsystem.

In general, innovative aspects of the subject matter described in thisspecification can be embodied in systems that include a frame. Thesystems include a camera coupled to the frame, the camera comprising alens. The systems also include a switch having an on position and an offposition, the switch coupled to the frame where when the switch is in anoff position a portion of the switch covers the lens and the camera isdisabled and when the switch is in an on position the portion of switchdoes not cover the lens and the camera is enabled.

Implementations can optionally include one or more of the followingfeatures: The system of may include a power source, where when theswitch is in the off position the camera is disconnected from the powersource. The system may include a microphone, where when the switch is inthe off position the microphone is disabled and when the switch is inthe on position the microphone is enabled. The system may include ahardware based management processor, where when the switch is in the offposition the hardware-based management processor is disabled and whenthe switch is in the on position the hardware-based management processoris enabled. The system may be a smart phone. The system may include asecond switch and a microphone, wherein when the switch is in the offposition the microphone is disabled and when the switch is in the onposition the microphone is enabled. The system may be a laptop computer.The system may include a processor and a memory storing a defaultapplication associated with the camera, where the processor isconfigured to launch the default application in response to the switchbeing moved from the off position to the on position.

In some implementations, the system can include an indicator, where theindicator is connected to a power source of the camera, and where theindicator configured to emit a signal when the camera is enabled andwhere the indicator is configured to be disabled when the camera isdisabled.

In some implementations, the system includes a processing device and amemory in communication with the processing device. The memory can beconfigured to store data that is generated by the camera or anothersensor. Generally, the switch is configured to cause the processingdevice to quarantine the data that is generated by the camera or theother in the memory when a position of the switch is changed. In someimplementations, the switch is configured to cause the processing deviceto delete the data that is generated by the camera or the other sensorin the memory when a position of the switch is changed. In someimplementations, the processing device is configured to execute at leastone application associated with the camera. In response to detecting achange in a position of the switch, the processing device is configuredto generate a notification that identifies the at least one applicationwhen the application is active. In some implementations, in response todetecting a change in a position of the switch, the processing device isconfigured to generate a notification that halts execution of the atleast one application.

In some implementations, the system includes a transmitter configured tosend data to a remote computing device. The switch is configured totemporarily disable the transmitter when the switch is moved to the offposition.

In an aspect, a process for providing a physical security measure for acomputing system includes, determining, by a processing device of thecomputing system, that a hardware switch is moved to a positionconfigured to disable a sensor of the computing system. The processincludes testing, by the processing device, the sensor to verify thatthe sensor is disabled. The process includes generating a notificationfor presentation on a user interface, the notification indicating thatthe sensor is disabled.

In some implementations, the actions include identifying, in response todetermining that the hardware switch is moved to the position, at leastone application configured to receive data associated with the sensor.The process includes updating the notification to identify the at leastone application configured to receive data from the sensor when theapplication is active at a time when the hardware switch is moved. Theprocess includes determining that data is generated by the sensor duringa time window, the time window having a pre-determined length. Theprocess includes causing the data generated by the sensor during thetime window to be deleted in response to determining that the hardwareswitch is moved to the position.

In some implementations, the process includes deactivating a second,different sensor in response to determining that the hardware switch ismoved. The sensor can include one of a camera, a microphone, and atransmitter. In some implementations, the process includes causing ahardware-based management processor to be disabled in response todetermining that the hardware switch is moved to the position.

Other implementations of any of the above aspects include correspondingmethods, apparatus, and computer programs that are configured to performthe actions of the methods, encoded on computer storage devices. Thepresent disclosure also provides a computer-readable storage mediumcoupled to one or more processors and having instructions stored thereonwhich, when executed by the one or more processors, cause the one ormore processors to perform operations in accordance with implementationsof the methods provided herein. The present disclosure further providesa system for implementing the methods provided herein. The systemincludes one or more processors, and a computer-readable storage mediumcoupled to the one or more processors having instructions stored thereonwhich, when executed by the one or more processors, cause the one ormore processors to perform operations in accordance with implementationsof the methods provided herein.

It is appreciated that aspects and features in accordance with thepresent disclosure can include any combination of the aspects andfeatures described herein. That is, aspects and features in accordancewith the present disclosure are not limited to the combinations ofaspects and features specifically described herein, but also include anycombination of the aspects and features provided.

The details of one or more implementations of the present disclosure areset forth in the accompanying drawings and the description below. Otherfeatures and advantages of the present disclosure will be apparent fromthe description and drawings, and from the claims.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 illustrates a laptop computer with enhanced security.

FIG. 2A-E illustrates example switches.

FIG. 3 illustrates an example of connecting double pole double throwswitch to a camera and microphone.

FIG. 4 illustrates locations on an example motherboard for a laptopwhere the switches may be connected between a power source andcomponents.

FIG. 5 illustrates an example of a WiFi/Bluetooth card that can bedisabled using a switch.

FIG. 6 is a wiring diagram that illustrates and example of a switchconnected to a Bluetooth card.

FIG. 7 illustrates an example of a smart phone with enhanced security.

FIG. 8 illustrates another example of a smart phone with enhancedsecurity.

FIG. 9 depicts an example computing system, according to implementationsof the present disclosure.

FIG. 10 includes a flow diagram showing a process for responding to astate change of a switch of a computing system

DETAILED DESCRIPTION

The advent of computer technology has led to dramatic advancements inproductivity. Computer devices from desktop computers, laptops, tablets,smart phones, and other similar devices enable a relatively high degreeof connectivity for various users. However, computer devices provide arisk that the privacy of users is violated. Computer devicevulnerabilities can be exploited to give access to a user's device. Forexample, vulnerabilities can enable access to the camera and microphone,allowing a computer device to act as an electronic surveillance device.The location of a computer device can be tracked by accessing GlobalPositioning Services (GPS) and location based services.

A computer system can be equipped with switches that disable components,such as sensors that can be used to invade the user's privacy bygathering data without the knowledge of the user. These components canbe disabled at the hardware level, for example, by breaking a connectionthat sends a signal to or from the component, by disconnecting power tothe component, or through another hardware disabling mechanism. Becausethe switches may not be dependent on software to disable the component,the switches cannot be hacked or exploited remotely. Generally, acomponent (or sensor) that is disabled is unable to collect additionaldata as the sensor is intended. For example, a disabled camera can beunable to generate any data, can generate obfuscated data (e.g.,generate data representing black images because of a cover), orotherwise be prevented from nominal operation. An enabled or activesensor is configured to sense the environment around the computingsystem and generate data representing an aspect the environment withoutbeing blocked, blurred, scrambled, or otherwise altered.

FIG. 1 illustrates a computing system 100 (e.g., a laptop computer) withenhanced security. The computing system 100 includes a camera 106 and amicrophone 104 (shown in the magnified area 102). The camera is set intoa frame 110 of the computing system 100. The laptop computer 100includes a switch 112 attached to the frame 110. As shown in FIG. 2A-2B,the switch is located near the camera 106 so that movement of themoveable portion 114 of the switch 112 from an on position (illustratedin FIG. 2A) to an off position (illustrated in FIG. 2B) causes themoveable portion 114 of the switch 112 to cover the camera 106.

In some implementations, when the switch is moved to the on position,the laptop computer 100 can recognize that a component has been enabledand can launch a default application associated with the component. Forexample, a chat application, a camera application, a video conferenceapplication, etc. In some implementations, a user of the laptop (orother device) may be able to customize and select which application(s)launches. In some implementations, multiple applications may beconfigured to launch.

In some implementations, the switch may be a double throw switch. FIG.2C-2E illustrate an example of employing a double throw switch 200. Thedouble throw switch 200 includes three positions, an off position, apartial-on position, and an on position. In this example, the moveableportion 204 of the double throw switch 200 is sufficiently wide to coverthe camera 202 in the off position (as illustrated by FIG. 2E), and inthe partial-on position (as illustrated in FIG. 2D). The moveableportion of the double throw switch reveals the camera 202 in the secondon position (illustrated by FIG. 2C). The double throw switch 200 may beused, for example, to disable the camera 202 and a microphone (notshown) when in the off position, to disable the camera 202 and enablethe microphone when in the partial-on position, and to enable the camera202 and the microphone when in the on position. In general, a doublethrow switch can be used to control two different components. Othertypes of switches may also be used, for example, a single pole singlethrow switch, a single pole double throw switch, a double pole singlethrow switch, etc.

In some implementations, the double throw switch is configured to severa power connection to each of the microphone and the camera 202 todisable the microphone and the camera, in addition to physicallycovering the camera. In some implementations, the double throw switch200 can be connected to a hardware indicator that displays a status ofthe sensors (such as the camera 202, the microphone, or another sensor)that is controlled by the double throw switch. For example, theindicator can include a light emitting diode (LED), which is configuredto illuminate when the double throw switch is disabling a sensor (orvice versa). For example, an LED can be configured to illuminate a firstcolor when the microphone is disabled, and illuminate a second colorwhen both the camera and the microphone are disabled. The indicator canprovide a second check to the user to show that an associated sensor isdisabled. In some implementations, the indicator is positioned on ahardware circuit in communication with the sensor. A hardware connectionto the indicator can ensure that the indicator accurately represents thestatus of a sensor associated with the indicator and that the indicatorhasn't been compromised by an unauthorized user. For example, theindicator can be configured to be in sequence with a power signalprovided to the sensor so that the indicator is on when the sensor isreceiving power and off when the sensor is not receiving power. In someimplementations, the illuminator can be positioned in sequence with aninverter so that, when the sensor is inactive, the indicator is active(e.g., illuminated).

Referring back to FIG. 1 , movement of the switch from the on positionto the off position can further disable the camera. The switch 112 canalso disable additional components on the laptop computer, for example,the switch may disable the microphone 104, the microphone jack 114, etc.

Disabling components of a computing system can include disconnecting thecomponents from a power source for the respective components,disconnecting the signal path between the component and computingsystem, disabling a processing chip that controls the component, etc.For example, the switch 112 can be configured to physically sever therespective connection from the sensor to a power source, to thecomputing system, and so forth. Generally, the switch 112 is configuredto control operation of a sensor independent a software signal.

FIG. 3 illustrates an example of connecting camera and microphone powerto a double pole double throw switch. The wires 304, 306 to power thecamera are connected to one set of terminals on the switch 302. In thisexample, the microphone is a passive device that does not require powerto be operational, the wires 308, 310 that deliver the signal for themicrophone are connected to another set of terminals on the switch 302.In this manner, moving the switch 302 to the off position causes thepower to the camera and the signal from the microphone to bedisconnected.

In some implementations, when the switch moves to a position that causesthe power to the camera to be disconnected, the system may terminate anyprocesses or applications that are currently accessing the camera. Forexample, the switch may be configured to send a signal to a processor ofthe computing system, or may be otherwise in communication of integratedwith the computing system. The signal may cause the processor of thecomputing system to identify and end any processes or applications thatare accessing the camera.

In some implementations, the processor can also be configured to disablea different hardware device (other than the respective sensor, such asthe camera or microphone) in response to activation of the switch. Forexample, a network connection between the computing system and anothercomputing system (e.g. a remote computing system) can be severed so thatdata captured by the sensor cannot be transmitted to the remote device.For example, the switch 112 can be configured to sever an internetconnection of the computing system 100 or cause the computing system 100to restrict data transmission while the switch is activated.

The switch 112 can be configured to cause the computing system 100 toperform some other action in response to activation of the switch. Theother action can be an action in software. For example, the computingsystem 100 can be configured to clear a memory cache associated with thesensor (e.g., the camera 106, microphone 104, or another sensor). Thiscan prevent data that was already captured by the sensor (e.g., prior todeactivation by the switch 112) from being retrieved at a later time byan unauthorized user. In some implementations, a notification can bepresented to a user indicating one or more applications that areretrieving data from the sensors when the sensors are deactivated. Forexample, if a memory associated with a webcam application is storingdata from the camera 106 when the camera is deactivated by the switch112, a notification can be displayed to the user of the computing system100 indicating that the webcam application collected image data from thecamera 106. The user is informed about the data collection and candecide whether to save the image data or discard the image data. Inanother example, the data captured by the sensor that is controlled bythe switch 112 can be quarantined to a particular location in memory ofthe computing system. In some implementations, the data that is deleted,quarantined, etc. in the cache related to the sensor can be data thatwas collected during a particular time window (such as the last 5minutes, 10 minutes, 30 seconds, etc.). The time window can be set by auser in an application related to the switch 112.

FIG. 4 illustrates locations on an example of a circuit board (forexample, a motherboard) for a laptop where the switches may be connectedbetween a power source and components. In this example, the camera onthe laptop 400 is located above the laptop's screen (not shown) andconnects to the motherboard 402 via connector 404 (for example, anEDPCON1 connector which is a 30 pin connector that also contains all thewiring for the laptop's display). The camera uses a USB 2.0 interface,meaning there are four wires on connector 404 that are used just for thecamera. Two of the four wires are for data, one is for a +3.3 volt DCsignal to power the camera, and the last wire it the ground. To disablethe camera with a switch, the wire providing the +3.3 volt DC signal canbe wired directly into the switch.

With the switch in the OFF position, no power gets to the camera, andthus making it impossible for the camera to be used (in this example,the camera is not detected by a kernel nor operating system of thelaptop when the switch is in the off position).

In some implementations, the microphone on a laptop can be located rightnext to the camera above the laptop's screen (as described above withrespect to FIG. 1 ) and connects to the laptop's motherboard viaconnector 410 (for example, a MIC_COM1 connector). But unlike thecamera, the microphone is a passive device that has two wires, a signalwire and a ground wire. The signal wire transmits the signal from themicrophone to the mother board. The ground wire is used to ground themicrophone. The signal wire can be connected to a switch, as describedabove, with respect to FIG. 3 .

With the switch in the OFF position, no signal from the microphone isprovided to the motherboard, thus making it impossible for themicrophone to send any signals to the laptop. By wiring both the cameraand the microphone into the same switch, both devices can be disabledsimultaneously.

Other components of the computing system can also be disabled using aswitch, these components can include components that enable, Bluetooth,WiFi, Global Positioning System (GPS) devices, location based services,MAC Addresses, 3G services, etc.

FIG. 5 illustrates an example of a WiFi/Bluetooth card 406 that can bedisabled using a switch. In this example, the WiFi/Bluetooth card 406uses a connector 500 (for example, a PCISIG M.2 NGFF connector). In thisexample, the connector 500 has 67 pins, each with a specific function.Some of the pins are used for data, some of the pins are used for powerand ground, and still other pins are used for control signals. The twopins of interest are pin 502 (circuit board pin 56) and pin 504 (circuitboard pin 54), which control PCISIG M.2 NGFF functions called W_DISABLE#1 and W_DISABLE #2 (respectfully). The switch enables and disables theWiFi/Bluetooth component by applying to pin 502 and pin 504 an input ofone of two DC signals:

1. To turn the radios ON: Apply a Ground (GND) or +0 V signal.

2. To turn the radios OFF: Apply a +3.3 V signal.

In some scenarios, some of the smaller connector pins are inaccessible,either due to size or position. In some implementations, these smallerpins can be accessed through surface mounted devices. In this example,two Surface Mount Device (SMD) pads on the circuit board itself (in thisexample connector pin 502 can be accessed using pad 508 (Pad R609) andconnector pin 504 can be accessed using pad 506 (Pad R629)).

FIG. 6 is a wiring diagram that illustrates and example of a switch 606connected to the pad 508 and the pad 506. One side of the switch iswired to a +3.3 volt signal 602 and the other side of the switch 606wired to ground 604. When the switch 606 is in the +3.3 Volt position,pins 504 and 502 in the M.2 NGFF connector will receive a HIGH voltage,and the radios on the WiFi card will be turned OFF. With the switch inthe off position, pins 504 and 502 will receive a LOW voltage, and theWiFi and Bluetooth radios will be turned ON.

In some implementations, a switch can cause software configurationchanges to be applied to the computing system. For example, the switchmay enable software and/or hardware to use random MAC addresses whenconnecting to WiFi access points.

Some computer devices (e.g., laptops, desktop computers, tablets,smartphones, etc.) may be equipped with computer management technology.In general, computer management technology is integrated into thehardware and firmware. Computer management technology can enable thecomputing system to be controlled remotely, even when powered off.Examples of computer management technology include Intel's ActiveManagement Technology (Intel AMT).

Because computer management technology relies on specific combinationsof hardware, computer management technology can be avoided by selectingprocessors and components that are not compatible with the technology.For example, the computing system 100 can be configured be independentof infrastructure components on which computer management technologyrelies. For example, Intel AMT relies on an Intel network working card.In another example, the computing system 100 can be configured byremoving or altering the software that controls the computer managementtechnology.

FIG. 7 illustrates an example of a smart phone 700 with enhancedsecurity. The smart phone 700 includes a frame 704. The smart phone 700includes a camera 702 and a microphone 712 (not viewable in the figureas incorporated in the smart phone 700) coupled to the frame 704. Theframe may be a structural part of the smart phone, for example, a frontplastic cover (e.g., an exterior portion) that protects the electronicsof the smart phone. A switch 706, connected to the frame, is positionedin proximity to the camera 702. Movement of the moveable portion 708 ofthe switch 706 from an on position to an off position causes themoveable portion 708 of the switch 706 covers the camera 702.

Users may wish to use the microphone 712 of the smart phone 700 withoutusing the camera 702 (for example, the user may wish to place atelephone call). At the same time, use of the camera either uses themicrophone (for example, to record a video), or does not use themicrophone (for example, taking a digital photograph). To support thesedifferent usage, the smart phone 700 can include an additional switch710, which can disable the microphone 712, independent of the camera702. In some implementations, disabling the camera 702 also disables anyadditional cameras on the smart phone (not shown). An indicator 714(such as an LED) is shown that is configured to signal to a user thestatus of the camera 702, microphone, and/or other sensors for the smartphone 700, similar to the indicator described previously in reference tothe computing system 100. In some implementations, a second indicator716 can be positioned near the additional switch 710 independent of theindicator 714.

FIG. 8 illustrates another example of a smart phone 800 with enhancedsecurity. The smart phone 800 includes a frame 802. The smart phone 800includes a camera 808 and a microphone 812 (not viewable in the figure,but incorporated into the smartphone 800) coupled to the frame 802. Adouble throw switch 806, connected to the frame, is positioned inproximity to the camera 808 so that movement of the moveable portion 804of the double throw switch 806 from an a second on position to either afirst on position or an off position causes the moveable portion 804 ofthe double throw switch 806 to cover the camera 808. An indicator 814(such as an LED) is shown that is configured to signal to a user thestatus of the camera 808, microphone, and/or other sensors for the smartphone 800, similar to the indicator described previously in reference tothe computing system 100.

In this example, a single switch 806 can be used to provide security tothe user. As discussed above, a user may commonly wish to disable boththe microphone and the camera (for example, while carrying thesmartphone, access the microphone without accessing the camera (such asplacing a telephone call), or access the microphone and the camerasimultaneously (for example, while filming a video). While the user doesnot require the microphone while taking a digital photograph, the periodof time that a photograph is being taken is relatively short, andenabling the microphone during that period may not pose a substantialsecurity risk to the user.

In some implementations, movement of the switch from the on position tothe partial-on position can disable the camera without disabling themicrophone. Movement of the switch from the partial-on position to theoff position can disable both the camera and the microphone. In someimplementations, disabling the camera 808 also disables any additionalcameras on the smart phone (for example, integrated into the back andfront of the smart phone) (not shown).

In some implementations, when the switch is moved to the on position, asmart phone (for example, the smart phone 700 and smart phone 800) canrecognize that a component has been enabled and can launch a defaultapplication associated with the component. For example, enabling thecamera may cause the camera or photo taking application to launch.

FIG. 9 depicts an example computing system, according to implementationsof the present disclosure. The system 900 may be used for any of theoperations described with respect to the various implementationsdiscussed herein. For example, the system 900 may be included, at leastin part, in one or more of the computing device(s) 106, the IoTdevice(s) 104, and/or other computing device(s) or system(s) describedherein. The system 900 may include one or more processors 910, a memory920, one or more storage devices 930, and one or more input/output (I/O)devices 950 controllable via one or more I/O interfaces 940. The variouscomponents 910, 920, 930, 940, or 950 may be interconnected via at leastone system bus 960, which may enable the transfer of data between thevarious modules and components of the system 900.

The processor(s) 910 may be configured to process instructions forexecution within the system 900. The processor(s) 910 may includesingle-threaded processor(s), multi-threaded processor(s), or both. Theprocessor(s) 910 may be configured to process instructions stored in thememory 920 or on the storage device(s) 930. For example, theprocessor(s) 910 may execute instructions for the various softwaremodule(s) described herein. The processor(s) 910 may includehardware-based processor(s) each including one or more cores. Theprocessor(s) 910 may include general purpose processor(s), specialpurpose processor(s), or both.

The memory 920 may store information within the system 900. In someimplementations, the memory 920 includes one or more computer-readablemedia. The memory 920 may include any number of volatile memory units,any number of non-volatile memory units, or both volatile andnon-volatile memory units. The memory 920 may include read-only memory,random access memory, or both. In some examples, the memory 920 may beemployed as active or physical memory by one or more executing softwaremodules.

The storage device(s) 930 may be configured to provide (e.g.,persistent) mass storage for the system 900. In some implementations,the storage device(s) 930 may include one or more computer-readablemedia. For example, the storage device(s) 930 may include a floppy diskdevice, a hard disk device, an optical disk device, or a tape device.The storage device(s) 930 may include read-only memory, random accessmemory, or both. The storage device(s) 930 may include one or more of aninternal hard drive, an external hard drive, or a removable drive.

One or both of the memory 920 or the storage device(s) 930 may includeone or more computer-readable storage media (CRSM). The CRSM may includeone or more of an electronic storage medium, a magnetic storage medium,an optical storage medium, a magneto-optical storage medium, a quantumstorage medium, a mechanical computer storage medium, and so forth. TheCRSM may provide storage of computer-readable instructions describingdata structures, processes, applications, programs, other modules, orother data for the operation of the system 900. In some implementations,the CRSM may include a data store that provides storage ofcomputer-readable instructions or other information in a non-transitoryformat. The CRSM may be incorporated into the system 900 or may beexternal with respect to the system 900. The CRSM may include read-onlymemory, random access memory, or both. One or more CRSM suitable fortangibly embodying computer program instructions and data may includeany type of non-volatile memory, including but not limited to:semiconductor memory devices, such as EPROM, EEPROM, and flash memorydevices; magnetic disks such as internal hard disks and removable disks;magneto-optical disks; and CD-ROM and DVD-ROM disks. In some examples,the processor(s) 910 and the memory 920 may be supplemented by, orincorporated into, one or more application-specific integrated circuits(ASICs).

The system 900 may include one or more I/O devices 950. The I/Odevice(s) 950 may include one or more input devices such as a keyboard,a mouse, a pen, a game controller, a touch input device, an audio inputdevice (e.g., a microphone), a gestural input device, a haptic inputdevice, an image or video capture device (e.g., a camera), or otherdevices. In some examples, the I/O device(s) 950 may also include one ormore output devices such as a display, LED(s), an audio output device(e.g., a speaker), a printer, a haptic output device, and so forth. TheI/O device(s) 950 may be physically incorporated in one or morecomputing devices of the system 900, or may be external with respect toone or more computing devices of the system 900.

The system 900 may include one or more I/O interfaces 940 to enablecomponents or modules of the system 900 to control, interface with, orotherwise communicate with the I/O device(s) 950. The I/O interface(s)940 may enable information to be transferred in or out of the system900, or between components of the system 900, through serialcommunication, parallel communication, or other types of communication.For example, the I/O interface(s) 940 may comply with a version of theRS-232 standard for serial ports, or with a version of the IEEE 1284standard for parallel ports. As another example, the I/O interface(s)940 may be configured to provide a connection over Universal Serial Bus(USB) or Ethernet. In some examples, the I/O interface(s) 940 may beconfigured to provide a serial connection that is compliant with aversion of the IEEE 1394 standard.

The I/O interface(s) 940 may also include one or more network interfacesthat enable communications between computing devices in the system 900,or between the system 900 and other network-connected computing systems.The network interface(s) may include one or more network interfacecontrollers (NICs) or other types of transceiver devices configured tosend and receive communications over one or more communication networksusing any network protocol.

Computing devices of the system 900 may communicate with one another, orwith other computing devices, using one or more communication networks.Such communication networks may include public networks such as theinternet, private networks such as an institutional or personalintranet, or any combination of private and public networks. Thecommunication networks may include any type of wired or wirelessnetwork, including but not limited to local area networks (LANs), widearea networks (WANs), wireless WANs (WWANs), wireless LANs (WLANs),mobile communications networks (e.g., 3G, 4G, Edge, etc.), and so forth.In some implementations, the communications between computing devicesmay be encrypted or otherwise secured. For example, communications mayemploy one or more public or private cryptographic keys, ciphers,digital certificates, or other credentials supported by a securityprotocol, such as any version of the Secure Sockets Layer (SSL) or theTransport Layer Security (TLS) protocol.

The system 900 may include any number of computing devices of any type.The computing device(s) may include, but are not limited to: a personalcomputer, a smart phone, a tablet computer, a wearable computer, animplanted computer, a mobile gaming device, an electronic book reader,an automotive computer, a desktop computer, a laptop computer, anotebook computer, a game console, a home entertainment device, anetwork computer, a server computer, a mainframe computer, a distributedcomputing device (e.g., a cloud computing device), a microcomputer, asystem on a chip (SoC), a system in a package (SiP), and so forth.Although examples herein may describe computing device(s) as physicaldevice(s), implementations are not so limited. In some examples, acomputing device may include one or more of a virtual computingenvironment, a hypervisor, an emulation, or a virtual machine executingon one or more physical computing devices. In some examples, two or morecomputing devices may include a cluster, cloud, farm, or other groupingof multiple devices that coordinate operations to provide loadbalancing, failover support, parallel processing capabilities, sharedstorage resources, shared networking capabilities, or other aspects.

FIG. 10 includes a flow diagram showing a process 1000 for responding,by a computing device (such as a processing device of computing system100 or smart phones 700, 800) to a state change of a switch (such asswitch 112, 606, 706, 806, etc.) that is a part of the respectivecomputing system including the computing device. The computing device ofthe computing system is configured to determine (1002) that a switch,which can include a sensor-specific switch connected to one or moresensors as previously described, is activated. The switch generallyincludes a hardware switch that is activated manually by a user of thecomputing system. The computing device is configured to test (1004) thesensor(s) connected to the switch to verify that the sensor(s) have beendeactivated. Testing the sensors can include sending a test signal tothe sensor(s) and waiting for a response, testing a voltage, and soforth. The test is performed to confirm that the switch has properlydeactivated the sensor. If the sensor is still active, a notificationcan be generated to the user to inform the user that the sensor is stillactivated. The computing system is configured to identify (1006) anyapplications associated with the sensor that are actively configured(e.g., contemporaneously executing or recently executing) to use datafrom the sensor. For example, if a recording application is running, anotification can be generated informing the user that the recordingapplication was reading microphone data when the switch was activated,which may alert the user to unauthorized access to the user's computingsystem. The computing device generates (1008) a notification forpresentation to the user that identifies which application(s) werereceiving data from the sensor that was deactivated. In someimplementations, the computing device can quarantine the data (so thatit cannot be transmitted to a remote device by a transmitter of thecomputing system), deactivate a network connection, delete the data, ortake other remedial action to respond to a potential security threat.

While this specification contains many specifics, these should not beconstrued as limitations on the scope of the disclosure or of what maybe claimed, but rather as descriptions of features specific toparticular implementations. Certain features that are described in thisspecification in the context of separate implementations may also beimplemented in combination in a single implementation. Conversely,various features that are described in the context of a singleimplementation may also be implemented in multiple implementationsseparately or in any suitable sub-combination. Moreover, althoughfeatures may be described above as acting in certain combinations andeven initially claimed as such, one or more features from a claimedcombination may in some examples be excised from the combination, andthe claimed combination may be directed to a sub-combination orvariation of a sub-combination.

Similarly, while operations are depicted in the drawings in a particularorder, this should not be understood as requiring that such operationsbe performed in the particular order shown or in sequential order, orthat all illustrated operations be performed, to achieve desirableresults. In certain circumstances, multitasking and parallel processingmay be advantageous. Moreover, the separation of various systemcomponents in the implementations described above should not beunderstood as requiring such separation in all implementations, and itshould be understood that the described program components and systemsmay generally be integrated together in a single software product orpackaged into multiple software products.

A number of implementations have been described. Nevertheless, it willbe understood that various modifications may be made without departingfrom the spirit and scope of the disclosure. For example, various formsof the flows shown above may be used, with steps re-ordered, added, orremoved. Accordingly, other implementations are within the scope of thefollowing claims.

What is claimed is:
 1. A system, comprising: a frame; a sensor coupledto the frame; a hardware switch having an on position and an offposition, the hardware switch coupled to the frame wherein when thehardware switch is in an off position a portion of the hardware switchdisables the sensor and when the hardware switch is in an on positionthe sensor is enabled; and a processing device configured to execute atleast one application associated with the sensor; wherein, in responseto detecting a change in a position of the hardware switch, theprocessing device is configured to generate a notification thatidentifies the at least one application when the application is active.2. The system of claim 1, further comprising: a power source; whereinwhen the hardware switch is in the off position the sensor isdisconnected from the power source.
 3. The system of claim 1, furthercomprising: a microphone; wherein when the hardware switch is in the offposition the microphone is disabled and when the hardware switch is inthe on position the microphone is enabled.
 4. The system of claim 1,further comprising: a hardware-based management processor; wherein whenthe hardware switch is in the off position the hardware-based managementprocessor is disabled and when the hardware switch is in the on positionthe hardware-based management processor is enabled.
 5. The system ofclaim 1, wherein the system is configured to send and receive data overa cellular network.
 6. The system of claim 5, further comprising: asecond hardware switch; and a microphone; wherein when the secondhardware switch is in the off position the microphone is disabled andwhen the second hardware switch is in the on position the microphone isenabled.
 7. The system of claim 1, further comprising: a memory storinga default application associated with the sensor; wherein the processingdevice is configured to launch the default application in response tothe hardware switch being moved from the off position to the onposition.
 8. The system of claim 1, further comprising: an indicator,wherein the indicator is connected to a power source of the sensor, andwherein the indicator configured to emit a signal when the sensor isenabled and wherein the indicator is configured to be disabled when thesensor is disabled.
 9. The system of claim 1, further comprising: amemory in communication with the processing device, the memoryconfigured to store data that is generated by the sensor; wherein thehardware switch is configured to cause the processing device toquarantine the data that is generated by the sensor in the memory when aposition of the hardware switch is changed.
 10. The system of claim 1,further comprising: a memory in communication with the processingdevice, the memory configured to store data that is generated by thesensor; wherein the hardware switch is configured to cause theprocessing device to delete the data that is generated by the sensor inthe memory when a position of the hardware switch is changed.
 11. Thesystem of claim 1, wherein the processing device, in response todetecting a change in a position of the hardware switch, the processingdevice is configured to generate a notification that halts execution ofthe at least one application.
 12. The system of claim 1, wherein thesensor comprises a system on a chip (SoC).
 13. The system of claim 1,further comprising: a transmitter configured to send data to a remotecomputing device, wherein the hardware switch is configured totemporarily disable the transmitter when the hardware switch is moved tothe off position.
 14. The system of claim 1, wherein the processingdevice is configured for identifying, in response to determining thatthe hardware switch is moved to the position, at least one applicationconfigured to receive data associated with the sensor; and wherein theprocessing device is configured for updating the notification toidentify the at least one application configured to receive data fromthe sensor when the application is active at a time when the hardwareswitch is moved.
 15. The system of claim 1, wherein the processingdevice is configured for determining that data is generated by thesensor during a time window, the time window having a pre-determinedlength; and wherein the processing device is configured for causing thedata generated by the sensor during the time window to be deleted inresponse to determining that the hardware switch is moved to theposition.
 16. The system of claim 1, wherein the processing device isconfigured for deactivating a second, different sensor in response todetermining that the hardware switch is moved.
 17. The system of claim1, wherein the processing device is configured for causing ahardware-based management processor to be disabled in response todetermining that the hardware switch is moved to the position.
 18. Asmartphone, comprising: a frame; a system on a chip (SoC) coupled to theframe and configured to send data to and receive data from one or moreother components of the smartphone; a hardware switch having an onposition and an off position, the hardware switch coupled to the framewherein when the hardware switch is in an off position the SoC isdisabled and when the switch is in an on position the SoC is enabled;and a processing device configured to execute at least one applicationassociated with the SoC; wherein, in response to detecting a change in aposition of the hardware switch, the processing device is configured togenerate a notification that identifies the at least one applicationwhen the application is active.
 19. The smartphone of claim 18, wherein,in response to detecting a change in a position of the hardware switch,the processing device is configured to quarantine data of the SoC fromthe one or more other components of the smartphone.
 20. The smartphoneof claim 18, wherein the SoC comprises a transceiver.