Methods and apparatus to operate closed-lid portable computers

ABSTRACT

Methods and apparatus to operate closed-lid portable computers are disclosed. An example portable compute device includes: a microphone; a speaker; a first camera to face a first direction; and a second camera to face a second direction, the second direction opposite the first direction. The compute device further includes communications circuitry; a first display; a second display separate from the first display; and a hinge to enable the first display to rotate relative to the second display between an open position and a closed position. At least a portion of the second display is capable of being visible when the first display is rotated about the hinge to the closed position. The portion of the second display is multiple times longer in a third direction than in a fourth direction perpendicular to the third direction, the third direction extending parallel to an axis of rotation of the hinge.

RELATED APPLICATION(S)

This patent arises from a continuation of U.S. patent application Ser.No. 16/421,217, which was filed on May 23, 2019. U.S. patent applicationSer. No. 16/421,217 is incorporated herein by reference in its entirety.Priority to U.S. patent application Ser. No. 16/421,217 is claimed.

FIELD OF THE DISCLOSURE

This disclosure relates generally to computing, and, more particularly,to methods and apparatus to operate closed-lid portable computers.

BACKGROUND

Housings for laptop computers typically include a base portion that isrotationally coupled to a lid portion. The base portion of a laptopusually includes a keyboard that faces a display screen in the lidportion when the lid is closed against the base portion. Typically,laptop computers either shut down or go to an idle state when the lid isclosed.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example portable computer constructed inaccordance with teachings disclosed herein.

FIG. 2 illustrates the example portable computer of FIG. 1 with the lidin a closed position.

FIGS. 3 and 4 illustrate example secondary user interfaces rendered onthe example secondary display of the example portable computer of FIGS.1 and 2 .

FIG. 5 is a block diagram illustrating an example implementation of theexample portable computers of FIGS. 1 and 2 .

FIGS. 6-11 illustrate example secondary user interfaces that may berendered on the example secondary display as a user interacts with theexample portable computer of FIGS. 1, 2 , and/or 5.

FIGS. 12A, 12B, and 13-18 are flowcharts representative of examplemachine readable instructions which may be executed to implement theexample portable computer of FIGS. 1, 2 , and/or 5.

FIG. 19 is a block diagram of an example processing platform structuredto execute the instructions of FIGS. 12A, 12B, and 13-18 to implementexample portable computer of FIGS. 1, 2 , and/or 5.

The figures are not to scale. In general, the same reference numberswill be used throughout the drawing(s) and accompanying writtendescription to refer to the same or like parts.

Descriptors “first,” “second,” “third,” etc. are used herein whenidentifying multiple elements or components which may be referred toseparately. Unless otherwise specified or understood based on theircontext of use, such descriptors are not intended to impute any meaningof priority, physical order or arrangement in a list, or ordering intime but are merely used as labels for referring to multiple elements orcomponents separately for ease of understanding the disclosed examples.In some examples, the descriptor “first” may be used to refer to anelement in the detailed description, while the same element may bereferred to in a claim with a different descriptor such as “second” or“third.” In such instances, it should be understood that suchdescriptors are used merely for ease of referencing multiple elements orcomponents.

DETAILED DESCRIPTION

Many laptops and other similar portable computers today can providevirtually the same functionality as a desktop computer with the addedfeature of being easily carried by a user. The portability of a laptopand other clamshell devices is at least partially achieved in the designof the device housing that collapses on itself to reduce its size whileprotecting and/or concealing the display screen, keyboard, touchpad,and/or other components. More particular, the lid of such a portablecomputing device typically contains a display screen that folds down orcloses upon a base of the housing. The base typically contains akeyboard (a physical keyboard or a virtual (e-ink or touch screen)keyboard), a touchpad, and/or the processor and/or other logic circuitsto enable operation of the device. Some portable computing devicesinclude a foldable display screen that extends across both the base andlid (with the keyboard and/or touchpad functionality integrated into thefoldable display). While closing the lid of a clamshell device (e.g., alaptop) improves portability while protecting the user interfacecomponents of the device, many such devices do not provide anyfunctionality while the lid is closed.

Example portable computers disclosed herein operate while the lid isclosed to provide functionality previously only available when thecomputers are opened and turned on. Some examples portable computersdisclosed herein operate in a low power or idle state when the lid isclosed to conserve power. However, in some examples, the portablecomputer includes one or more sensors that remain active or turned onwhen the portable computer is in the lower power state with the lidclosed. The sensors enable the portable computer to determine thecontext of the environment in which the portable computer is located toinitiate appropriate actions that are responsive to the environment. Forexample, a human presence sensor on the portable computer may detect aperson is approaching the closed computer. Upon detection of the person,the computer may initiate a user recognition process to identify orauthenticate the person as an authorized user of the computer. If theperson is recognized as an authorized user, the computer may wake up andautomatically login the user so the user can immediately begin using thecomputer as soon as the lid is opened. In some examples, users mayadditionally or alternatively be authenticated based on voicerecognition and/or in any other suitable manner. Further, in someexamples, the computer may automatically open and/or initiate aparticular application in response to detecting an indication of theuser intended to access content associated with the particularapplication. Thus, examples disclosed herein enhance the user experienceby enabling a portable computer to determine the context of itsenvironment and to respond accordingly to provide a more seamlessexperience as a user seeks to open a closed portable computer (e.g.,which may be in a sleep state) to begin using the device.

Further, in some examples, the portable computer may include a secondarydisplay that is visible when the computer is closed (e.g., when aprimary or main display is not visible). In some such examples, thesecondary display may provide a graphical user interface containing userspecific information that the user can access and/or interact withouthaving to open the computer. In some examples, the active operation ofthe secondary display is associated with an intermediate power statethat consumes more power than when the computer is in an idle or sleepstate but less power than when the computer is open with fullfunctionality provided via the primary display. In some examples, powerconsumption is reduced relative to the full power state by implementingoperations associated with the secondary display via a secondary, lowpower processor that is separate from a main processor used when thecomputer is fully turned on. In some examples, interactions with thesecondary display may trigger the operation of functionality associatedwith the primary display to provide users with a seamless experience asthey initially interact with the computer with a closed lid (via thesecondary display) and then transition to a full power state with thelid opened. Similarly, in some examples, functionally provided via theprimary display may continue to be available via the secondary displayevent after the computer is closed so that the primary display is nolonger turned on.

FIG. 1 illustrates an example portable computer 100 constructed inaccordance with teachings disclosed herein. In this example, theportable computer 100 is a laptop. In other examples, the portablecomputer 100 may correspond to different types of clamshell computingdevices. The example portable computer 100 includes a housing 102 thatincludes a base 104 and a top or lid 106. As shown in the illustratedexample, the base 104 of the portable computer includes a keyboard 108and a touchpad 110. The lid 106 includes a primary display screen 114(or primary display for short). In the illustrated example, the base 104and the lid 106 are connected via a hinge 112 to enable the lid 106 torotate relative the base 104 between an open position (as shown in FIG.1 ), and a closed position (as shown in FIG. 2 ). In some examples, thehinge 112 is constructed to open automatically without a user having tomanually move the lid 106 from the closed position to the open position.Additionally or alternatively, in some examples, the hinge 112 isconstructed to close automatically without a user having to manuallymove the lid 106 to the closed position.

For purposes of explanation, the primary display 114 in the lid 106 ofthe example portable computer 100 is referred to herein as a primarydisplay to distinguish the primary display 114 from a secondary displayscreen 116 (or secondary display for short) that is also included on theportable computer 100. In this example, the secondary display 116 is anextension of the touchpad 110 that extends along a front edge 118 of thebase 104 distal to the hinge 112. In the illustrated example, thesecondary display 116 is positioned so as to be visible even when thelid 106 is closed as shown in FIG. 2 . As used herein, reference to theportable computer 100 being closed and the lid 106 being closed areintended to convey the same thing, which is that the lid 106 is rotatedabout the hinge 112 to position a distal edge 120 of the lid 106 (topedge as viewed in FIG. 1 ) adjacent a distal edge of the base 104 (e.g.,the front edge as viewed in FIG. 1 ) with the primary display 114 facingthe base 104 in a generally parallel and/or face-to-face arrangement(although space between the base and the display is present in someexamples). In some examples, the lid 106 is substantially parallel tothe base 104 when in the closed position.

Although the secondary display 116 is shown as an extension of thetouchpad 110, in other examples, the secondary display 116 may beseparate from the touchpad 110. Additionally or alternatively, thesecondary display may be located in a position different than what isshown in FIGS. 1 and 2 . For example, the secondary display 116 may bepositioned at a different location on the edge of the housing 102. Insome examples, the secondary display 116 may be positioned on the lid106 (e.g., along the distal edge 120). In some examples, the secondarydisplay 116 is located in a position that is visible to a user facingthe front of the portable computer 100 regardless of whether theportable computer 100 is opened or closed.

As shown in FIGS. 1 and 2 , the example portable computer 100 includes auser facing camera 122 positioned on an inside surface of the lid 106 soas to face in a same direction as the primary display 114. Additionally,the example portable computer 100 includes a world facing camera 124positioned on an outside surface of the lid 106 so as to face in theopposite direction to the primary display 114. In some examples, theuser facing camera 122 and the world facing camera 124 are positioned atcorrespond locations on opposite sides of the lid 106. In some examples,the user facing camera 122 and the world facing camera 124 includepanamorphic lenses to enable the capture of ultra wide-angle images(e.g., panoramic or hemispherical images). In some examples, thepanamorphic lenses have a field of view of at least 180 degrees asmeasured within a plane extending substantially perpendicular to the lid106 with a 360 degree rotational view as measured in a planesubstantially parallel to the lid 106. As a result, when the lid 106 isopen and both cameras 122, 124 are turned on, it is possible to capturea 360 degree image of the surrounding environment in all directions(e.g., on both sides of the lid 106). Further, when the portablecomputer 100 is resting on a substantially flat surface with the lid 106closed, the world facing camera 124 may be able to capture a 360 degreeimage of the surrounding environment (at least for areas above a planedefined by the outer surface of the lid 106). Accordingly, in someexamples, the world facing camera 124 is able to monitor the environmentsurrounding the portable computer 100 when closed to determine a contextthat can be used as the basis to perform particular operations. In someexamples, the portable computer 100 implements facial recognitionprocedures to uniquely identify a person detected in the vicinity of thecomputer to confirm or authenticate the person as an authorized user ofthe computer. In some such examples, once a user is authenticated inthis manner, the computer may log the user into the computer and/orperform other suitable actions based on the authentication. Thus, usersmay be authenticated and logged into their computers before they havelifted the lid to their portable computers to begin using the devices(i.e., they may be authenticated while the lid is closed).

In some examples, the portable computer 100 includes light indicators126 (e.g., LEDs) that turn on to indicate when a corresponding one ofthe cameras 122, 124 is on and capturing image data. As shown in theillustrated example, there are two light indicators 126 adjacent each ofthe cameras 122, 124 to indicate the active status of both cameras 122,124. In other examples, only a single light indicator 126 is positionedadjacent each camera 122, 124 to indicate the status of the adjacentcamera. In some examples, the light indicators 126 are positioned at adifferent location relative to the cameras 122, 124 (e.g., on the base104 of the portable computer 100). In some examples, the lightindicators 126 are omitted.

In some examples, the portable computer includes other sensors that maybe used to monitor aspects of the environment surrounding the portablecomputer 100 while the computer is closed (or open). For instance, insome examples, the portable computer 100 may include one or more humanpresence sensors 128 (e.g., a motion sensor) to detect the presence of aperson in the vicinity of the portable computer 100. In some examples,activation of the world facing camera 124 when the portable computer 100is closed is triggered by the human presence sensor 128 detecting aperson (or at least some movement that may be caused by a person).Whether a person caused the movement (and whether the person isrecognizable as an authorized user) can be verified based on imageanalysis of data captured by the camera 124). Thus, in some examples,the world facing camera 124 is not always on when the computer is in alow powered idle state unless triggered by the human presence sensor128, thereby reducing power consumption in the low powered state. Inother examples, the world facing camera 124 may always be turned on(unless configured by the user to be off). In some examples, the one ormore human presence sensors 128 may be positioned to detect movement(e.g., people) in all direction. In other examples, the one or morehuman presence sensors 128 may be limited to monitoring an area in frontof the portable computer 100 so as to avoid false positives triggeringthe world facing camera 124 (or other functionality) when detectingmovement behind the portable computer 100.

In the illustrated example, the portable computer 100 includes one ormore microphones 130 to detect sounds in the environment surrounding theportable computer 100. In some examples, different microphones 130 arelocated adjacent each of the cameras 122, 124 on either side of the lidto enable audio monitoring whether the lid 106 is opened or closed.Additionally or alternatively, one or more microphones 130 may be placedat different locations (e.g., the front edge 118 of the base 104) tocapture sounds regardless of the position of the lid 106. In someexamples, the audio data captured by the microphones may be used as aseparate technique to authenticate and log a user into a portablecomputer 100 while the computer is closed. More particularly, in someexamples, the portable computer 100 may use voice recognition proceduresto recognize a particular voice command stated by a nearby user. In someexamples, the microphones 130 may be triggered by the human presencesensor 128. In other examples, the microphones 130 may operateindependent of the human presence sensor 128 to capture voice commandsof people that are beyond the reliable range of the human presencesensor 128.

The example computer includes one or more speakers 132 to provideaudible outputs to a user. In some examples, the speakers 132 arepositioned on an exterior surface of the portable computer 100 (e.g.,the front edge 118 of the base 104) so that sound produced by thespeakers can be heard by users regardless of whether the lid 106 isopened or closed. In some examples, the portable computer 100 mayinclude additional (e.g., larger) speakers that are covered by the lid106 when the computer 100 is closed. Such speakers may only beoperational when the portable computer 100 is open.

As mentioned above, the example portable computer 100 includes asecondary display 116 that is visible when the lid 106 is closed. Insome examples, the secondary display 116 is capable of renderinggraphical user interface content that changes based on the circumstancesdetected by the computer sensors and/or based on user inputs. Forinstance, the content rendered via the secondary display 116 may dependon whether a user is logged in to the portable computer 100. In someexamples, the content rendered via the secondary display 116 may dependon how close the user is to the portable computer 100 and/or theposition and/or orientation of the person relative to the portablecomputer 100. In some examples, the content rendered via the secondarydisplay 116 may depend on the setting in which the portable computer 100is located (e.g., at home, at work, in a public area, etc.).

In the illustrated example, the secondary display 116 includes arendering of a power icon 134 and a battery power icon 136. In theillustrated example, the secondary display 116 is touch sensitive sothat a user may interact with the display. In some examples, the touchsensor for the secondary display 116 is the same as the touch sensor forthe touchpad 110. In other examples, user inputs detected by secondarydisplay 116 may be accomplished independent of the sensor system of thetouchpad 110.

In some examples, the icons and/or other content rendered via thesecondary display 116 are associated with particular operations that areinvoked when the associated icons and/or content is touched by a user.For example, a user may touch the power icon 134 to turn on or off thesecondary display 116. Additionally or alternatively, touching the powericon 134 may turn off the entire portable computer 100. In someexamples, interactions of a user with the icons and/or other content onthe secondary display may result in different actions by the portablecomputer 100 depending on the context in which a user interacts with thesecondary display 116. For instance, in some examples, a user selectinga particular icon rendered on the secondary display 116 may perform onefunction when the portable computer 100 is closed and a differentfunction when the portable computer 100 is opened and in a full powerstate. In some examples, user interactions with the secondary display116 may affect content that is rendered via the primary display 114.Similarly, user interactions with the primary display 114 (and/or theassociated keyboard 108 or touchpad 110) may affect content that is(and/or will be) rendered via the secondary display 116. Further, insome examples, content rendered via either the primary display 114and/or the secondary display 116 may be controlled using voice commandswithout a user physically touching the secondary display 116 or anyother component of the portable computer 100.

In some examples, the content rendered via the secondary display and/orfunctionality associated with such content (e.g., when selected by auser) may depend on whether the user has been authenticated and/orlogged into the computer. As mentioned above, in some examples, a usermay be logged in automatically based on facial and/or voice recognition.In some examples, when a user has not been authenticated or logged in,the secondary display 116 renders a generic secondary user interface 300(e.g., displaying the time, date, and power icon 134) as shown in theillustrated example of FIG. 3 . By contrast, when a user has beenauthenticated, a personalized secondary user interface 400 (e.g.,displaying a user specific message 402 and/or other personalizedinformation including one or more other icons) may be rendered via thesecondary display as shown in the illustrated example of FIG. 4 . Asused herein, the term “secondary user interface” refers to renderedcontent and associated user-interactive functionality provided via thesecondary display 116 to distinguish such from a “primary userinterface” that corresponds to rendered content and associateduser-interactive functionality provided via the primary display 114.

As shown in the illustrated examples of FIGS. 3 and 4 , both the genericand personalized secondary user interfaces 300, 400 include the powericon 134 and the battery power icon 136. However, in some examples, onlyan authorized user may be able to turn off the secondary display 116 byselecting the power icon. By contrast, if an unauthorized (e.g.,unauthenticated) user selects the power icon 134, the secondary display116 may prompt the user to provide authentication information (e.g.,request the user hold still while the world facing camera 124 capturesan image for facial recognition purposes, request the user to repeat astatement used for voice recognition, etc.).

Both the generic and personalized secondary user interfaces 300, 400 ofFIGS. 3 and 4 also include a camera icon 302 and a microphone icon 304.In some examples, the camera icon 302 indicates when the world facingcamera 124 and/or the user facing camera 122 is turned on to captureimage data. Similarly, the microphone icon 304 indicates whether the oneor more microphones 130 are turned on to capture audio data. In someexamples, a user may select the camera icon 302 and/or the microphoneicon 304 to toggle the corresponding camera or microphone on or off(e.g., to mute the microphone). In some such examples, the appearance ofthe icons 302, 304 may change in appearance (e.g., color, brightness,etc.) to indicate when the associated microphone or camera is turned onor turned off. However, in some examples, only when the user has beenauthenticated and logged in is this toggling functionality enabled.

The main middle section of the secondary display 116 includes genericinformation 306 (e.g., time and date) when the generic secondary userinterface 300 is rendered as shown in FIG. 3 . By contrast, as shown inthe illustrated example of FIG. 4 , where a user has been authenticatedand logged into the system, the personalized secondary user interface400 includes personalized information 402 such as, for example, anidentification or greeting of the user (e.g., with the user's name), andnotifications about any pertinent information such as new emails,upcoming calendar appointments, etc. Further, in some examples, thesecondary display 116 may render additional icons that the user canselect to obtain more information and/or implement other actions. Forinstance, in the illustrated example of FIG. 4 , the personalizedsecondary user interface 400 includes a calendar icon 404 to enableusers to access their calendars, an email icon 406 to enable users toaccess their emails, and a music player icon 408 to enable users toaccess their music. There may be any other number of icons or othercontent provided to the user via the secondary display 116. In someexamples, when the user selects on a particular icon associated withuser-specific information, the user-specific information may bedisplayed via the secondary display 116. Additionally or alternatively,selecting such information (e.g., by touching the relevant content viathe secondary display 116 or via a voice command) may trigger theportable computer 100 to wake up so that the user-specific informationis automatically rendered via the primary display 114 once the portablecomputer 100 is opened. Further, in some examples, selecting suchinformation may trigger to automatically open and begin rendering therelevant content via the primary display 114.

FIG. 5 is a block diagram illustrating an example implementation of theportable computer 100 of FIGS. 1 and 2 . In this example, the portablecomputer 100 includes one or more example sensor(s) 502, one or moreexample communications interface(s) 504, an example camera inputanalyzer 506, an example audio input analyzer 508, an exampletouch-based input analyzer 510, an example login controller 512, anexample push notification controller 514, an example primary displaycontroller 516, an example secondary display controller 518, an examplelid controller 520, an example system controller 522, and one or moreexample database(s) 524.

The example sensor(s) 502 include any sensors that may be implemented tomonitor or detect the circumstances or context of an environmentsurrounding the portable computer 100 and/or alternatively to detect orenable interactions with the portable computer 100 by a user. Thus, forexample, the sensor(s) 502 include a touch sensor associated with thesecondary display 116 (which may be the same as or different than atouch sensor associated with the touchpad 110) to detect a user'sinteractions with the secondary display 116. The example sensor(s) 502include the example user facing camera 122 and the example world facingcamera 124 to capture images of the user and/or the surroundingenvironment. The example sensor(s) 502 include the one or more examplemicrophones 130 to capture audio (e.g., voice commands) from a userwithin audible range of the portable computer 100. The example sensor(s)502 include the example human presence sensor 128 (e.g., a motionsensor) to detect motion in the vicinity of the portable computer 100that may be indicative of a nearby person. The example sensor(s) 502 mayinclude any other suitable sensor devices that collect relevant sensordata that may be used by the portable computer 100 to determine acurrent context. For example, the sensor(s) 502 may include anaccelerometer, a gyroscope, and/or a magnetometer to determine motion,position, and/or orientation of the portable computer 100. As anotherexample, the sensor(s) 502 may include a fingerprint scanner toauthenticate users based on their fingerprints. In some examples, one ormore of the sensor(s) 502 may be powered on to collect sensor data whilethe portable computer 100 is closed and/or otherwise in a low power oridle state.

The example portable computer 100 of FIG. 5 includes one or morecommunication interface(s) 504 to enable the computer to communicatewith other devices in a wired or wireless manner. For instance, in someexamples, the communication interface(s) 504 includes an Ethernet jackto enable the portable computer 100 to be physically wired to a network.Additionally or alternatively, the communications interface(s) 504 mayinclude wireless communications circuitry to communicate with otherdevices wireless (e.g., via Wi-Fi, Bluetooth, and/or a mobile telephonenetwork). In some examples, the portable computer 100 may be connectedto a cloud network (e.g., the Internet) via the communications interfaceto transmit data to and/or retrieve data from remote servers that may beused by the portable computer 100. In some examples, the communicationsinterface 504 may receive push notifications from remote servers and/orother devices that are subsequently processed and/or initiate particularactions. For example, push notifications may correspond to the receiptof new email messages, incoming conference calls, a request from anearby device to connect with the computer to share a file or otherdocument, a file or other document shared by a nearby device designatedas a trusted device for file sharing purposes, etc. In some examples,one or more of the communication interface(s) 504 may be powered on tosend or receive data while the portable computer 100 is closed and in alow power and/or intermediate power state that consumes less power thanwhen the computer is opened and fully active (e.g., with the primarydisplay 114 turned on to render content for a user).

The example camera input analyzer 506 of the illustrated example of FIG.5 processes and/or analyzes image data captured by the user facingcamera 122 and/or the world facing camera 124. In some examples, thecamera input analyzer 506 is implemented to authenticate a user of theportable computer 100 based on a facial recognition analysis of an imageof the user's face. In some examples, this facial recognition analysismay be performed while the portable computer 100 is closed so that auser may be authenticated and logged into the portable computer 100before the user opens (or even touches) the portable computer 100. Insome examples, the camera input analyzer 506 may transmit image data toa remote server (e.g., via the communications interface 504) to performthe facial recognition. In other examples, the facial recognition may beperformed locally on the portable computer 100 by comparing image datato reference user authentication data (e.g., reference images ofauthorized users) stored in the database(s) 524. In some examples, thecamera input analyzer 506 may implement other actions on the portablecomputer 100 based on an analysis of image data captured by one of thecameras 122, 124. For example, the camera input analyzer 506 maydetermine the context in which the computer is located (e.g., publicversus private setting) to determine whether to display privateinformation to the authenticated user. In other examples, the camerainput analyzer 506 may monitor movement of the user for particulargestures (e.g., hand motions) intended to control operation of theportable computer 100.

The example audio input analyzer 508 of the illustrated example of FIG.5 processes and/or analyzes audio data captured by the microphones 130on the portable computer 100. In some examples, the audio input analyzer508 is implemented to authenticate a user of the portable computer 100based on a voice recognition analysis of captured audio corresponding tothe voice of a user. In some examples, this voice recognition analysismay be performed while the portable computer 100 is closed so that auser may be authenticated and logged into the portable computer 100before the user opens (or even touches) the portable computer 100. Insome examples, the audio input analyzer 508 may transmit audio data to aremote server (e.g., via the communications interface 504) to performthe voice recognition. In other examples, the voice recognition may beperformed locally on the portable computer 100 by comparing image datato reference user authentication data (e.g., reference images ofauthorized users) stored in the database(s) 524. In some examples, theaudio input analyzer 508 may analyze audio input to detect voicecommands from a user to enable the user to interact and/or control theportable computer 100 without touching the device. As with the voicerecognition, such voice detection may be implemented locally on thecomputer or accomplished via a remote server. In some examples, theaudio input analyzer 508 may determine whether a detected voice commandis to be implemented based on whether or not the person providing thecommand is an authorized user (e.g., authenticated based on voicerecognition).

The example touch-based input analyzer 510 of the illustrated example ofFIG. 5 processes and/or analyzes touch-based data captured by a touchsensor associated with the touchpad 110 and/or the secondary display116. Inasmuch as the secondary display 116 is visible and available foruser interaction when the computer lid 106 is closed, the touch-basedinput analyzer 510 may be powered and operating while the portablecomputer 100 is closed. In some examples, the touch-based input analyzer510 is always powered when the portable computer 100 is turned on, evenwhen the computer is in a low power or sleep state. In other examples,the touch-based input analyzer 510 may be activated in response todetection of a person in the vicinity of the portable computer 100 bythe human presence sensor 128. In other examples, the touch-based inputanalyzer 510 is activated only after a user has been authenticated(e.g., via facial recognition and/or voice recognition).

The example login controller 512 of the illustrated example of FIG. 5 ,determines when and whether to login or logout a user on the portablecomputer 100. In some examples, the login controller 512 determines tologin a user after the user has been authenticated visually by thecamera input analyzer 506 and/or audibly by the audio input analyzer508. In some examples, if not of the sensor(s) 502 detect any activityfor a threshold period of time, the login controller 512 mayautomatically logout a user current logged in to the portable computer100. In some examples, the login controller 512 may be powered or turnedon while the portable computer 100 is still closed to enable a user tologin to the portable computer 100 without having to open the portablecomputer 100 and wait for the device to boot up.

The example push notification controller 514 of the illustrated exampleof FIG. 5 analyzes and/or controls responses to push notificationsreceived from remote sources via the communications interface. Forinstance, in some examples, the push notification controller 514 causesan audio, visual, and/or haptic signal to be generated to alert a userof an incoming notification. In some examples, whether such anotification is generated and/or the nature of the notification (e.g.,the amount of detail included with the notification) may depend onwhether a user is logged in as determined by the login controller 512.Further, in some examples, the push notification controller 514 maygenerate and/or determine different options a user may select to respondto an incoming notification. For instance, one option may be for a userto dismiss the notification and respond later, a second option may befor a user to provide a quick reply (e.g., a short preset text message),and a third option may be for the user to provide a detailed response(e.g., immediately answer an incoming conference call, begin drafting areply email, etc.). In some examples, the push notification controller514 may be powered or turned on while the portable computer 100 is stillclosed to enable a user to respond to incoming push notifications whilethe computer is closed (e.g., via the secondary display 116).

In the illustrated example of FIG. 5 , the primary display controller516 serves to control the operation of the primary display 114 and tofacilitate the rendering of content (e.g., primary user interfaces) viathe primary display. The example secondary display controller 518 ofFIG. 5 serves to control the operation of the secondary display 116 andto facilitate the rendering of content (e.g., secondary user interfaces)via the secondary display. In some examples, the primary displaycontroller 516 and the secondary display controller 518 update therendering of content on the respective displays 114, 116 based onoutputs of one or more of the example sensor(s) 502, the examplecommunications interface(s) 504, the example camera input analyzer 506,the example audio input analyzer 508, the example touch-based inputanalyzer 510, the example login controller 512, and/or the example pushnotification controller 514. In some examples, the nature of contentrendered by the primary display controller 516 and the secondary displaycontroller 518 depends on whether there is an authorized orauthenticated user logged into the portable computer 100.

Further, in some examples, content accessed and/or interacted with by auser on one of the displays 114, 116 may affect content rendered via theother display. For instance, in some examples, when a user launches anapplication having a primary user interface to be rendered via theprimary display 114, the secondary display controller 518 mayautomatically launch a corresponding secondary user interface associatedwith the application to be rendered via the secondary display 116. As aspecific example, a user may launch a media player via the primarydisplay 114, which may cause the secondary display controller 518 torender a secondary user interface via the secondary display 116 thatcontains control options (e.g., play, pause, skip, backward, forward,volume controls, etc.) that enable a user to control the playback ofmedia (e.g., videos, music, etc.) shown in an application user interfacerendered on the primary display 114.

In the above examples, user interactions with the primary display 114(and the associated primary display controller 516) result in changes tothe secondary display 116 based on operations of the secondary displaycontroller 518. Similarly, user interactions with the secondary display116 (and the associated secondary display controller 518) may cause theprimary display controller 516 to implement operations affecting contentrendered via the primary display 114. As a specific example, thesecondary display controller 518 may render the email icon 406 shown inFIG. 4 when the user has new emails to read. If the user selects theemail icon 406 (either by touching the icon or through a voice command),the secondary display controller 518 may render basic details about thenew emails (e.g., sender name, subject line, etc.). If the user selectsa particular email listed on the secondary display 116, the primarydisplay controller 516 may initiate or render a primary user interfacefor an email application via the primary display 114 for the user toview the entire email and/or to reply as appropriate.

As described above, while the primary display 114 is not visible whenthe lid 106 of the portable computer 100 is closed, the secondarydisplay 116 remains visible. Accordingly, in some examples, thesecondary display controller 518 remains powered and/or in operationwhile the computer is closed. By contrast, in some examples, the primarydisplay controller 516 is powered and/or in operation only when the lid106 is opened. However, in some examples, the primary display controller516 may be turned on or activated before the lid 106 is opened based onan indication of intent of the user to open the lid 106 to beginaccessing content using the primary display 114. For instance, assumethat the portable computer 100 is closed in the above example when theuser selects a particular email via the secondary display 116 to view infurther detail. In some such examples, the secondary display controller518 may communicate the intent of the user to view the email via theprimary display while the portable computer 100 is still closed, therebycausing the secondary display controller 518 to activate and turn on theprimary display 114 to render the email within a primary user interfaceassociated with a corresponding email application. Thus, although theprimary display controller 516 may be turned on while the computer isclosed, in some examples, activation of the primary display controller516 corresponds with activation of the computer to a full power (awake)state.

As outlined above, operation of the primary display controller 516 isassociated with the portable computer 100 being in a full power state.By contrast, the secondary display controller 518 may operate in a lowerpower state (e.g., idle/sleep state and/or an intermediate power state).In some examples, to improve (e.g., optimize) the power consumption ofthe portable computer 100 in the different power states, the primarydisplay controller 516 and the secondary display controller 518 may beimplemented on different processors including a main processor for usewhen the portable computer 100 is in a full power state and a second lowpower processor for use when the computer is in a lower power state. Insome such examples, certain aspects of functionalities of the othercomponents of the portable computer 100 shown in FIG. 5 may beimplemented by the main processor while other aspects or functionalitiesare implemented by the low power processor.

The example lid controller 520 of the illustrated example controlsand/or monitors the positional relationship of the lid 106 and the base104 of the portable computer 100 about the hinge 112. More particularly,in some examples, the lid controller 520 determines when the portablecomputer 100 is closed and when the computer is closed. In someexamples, opening and closing the portable computer 100 may trigger atransition of the portable computer 100 between different power states,which may affect the type of content that is rendered via the displays114, 116 and/or what displays 114, 116 are used to display content.Further, in some examples, the lid controller 520 is able to control thehinge 112 to automatically open the lid 106 without a person manuallymoving the lid 106 open. Additionally or alternatively, in someexamples, the lid controller 520 is able to control the hinge 112 toautomatically close the lid 106 without a person manually moving the lid106 closed. In some examples, the automatic opening and/or closing ofthe lid 106 is performed in response to user inputs (e.g., via a voicecommand, via a touch-based user selection on the secondary display 116,etc.). In some examples, the hinge 112 is associated with a spring toautomatically open and/or close the lid 106 in response to the lidcontroller 520 releasing a latch securing the lid 106 in closed or openposition. In other examples, the hinge 112 is associated with a motor toautomatically open and/or close the lid 106.

The example system controller 522 of the illustrated example of FIG. 5serves to oversee, control and/or facilitate interactions betweendifferent ones of the components of the portable computer 100 shown inFIG. 5 and/or other components of the portable computer 100 notrepresented in the illustrated example.

As mentioned above, the example database(s) 524 may store userauthentication data to enable the camera input analyzer 506 to recognizea person captured in an image as an authorized user and/or to enable theaudio input analyzer 508 to recognize a person as an authorized userbased on the voice of the user. Further, in some examples, thedatabase(s) 524 include a database of voice commands that may beidentified by the audio input analyzer 508 (regardless of whether thevoice is recognized as corresponding to a unique individual) to enablevoice detection of commands locally on the portable computer 100 withoutthe need for transmitting audio data to or otherwise communicating witha remote server. Further, in some examples, the database(s) 524 storeuser preferences pertaining to the operation of the secondary display116 and/or the content rendered via the display 116 both when noauthorized user has been recognized and when an authorized user has beenrecognized.

While an example manner of implementing the example portable computer100 of FIGS. 1 and 2 is illustrated in FIG. 5 , one or more of theelements, processes and/or devices illustrated in FIG. 5 may becombined, divided, re-arranged, omitted, eliminated and/or implementedin any other way. Further, the example sensor(s) 502, the examplecommunications interface(s) 504, the example camera input analyzer 506,the example audio input analyzer 508, the example touch-based inputanalyzer 510, the example login controller 512, the example pushnotification controller 514, the example primary display controller 516,the example secondary display controller 518, the example lid controller520, the example system controller 522, the example database(s) 524and/or, more generally, the example portable computer 100 of FIG. 5 maybe implemented by hardware, software, firmware and/or any combination ofhardware, software and/or firmware. Thus, for example, any of theexample sensor(s) 502, the example communications interface(s) 504, theexample camera input analyzer 506, the example audio input analyzer 508,the example touch-based input analyzer 510, the example login controller512, the example push notification controller 514, the example primarydisplay controller 516, the example secondary display controller 518,the example lid controller 520, the example system controller 522, theexample database(s) 524 and/or, more generally, the example portablecomputer 100 could be implemented by one or more analog or digitalcircuit(s), logic circuits, programmable processor(s), programmablecontroller(s), graphics processing unit(s) (GPU(s)), digital signalprocessor(s) (DSP(s)), application specific integrated circuit(s)(ASIC(s)), programmable logic device(s) (PLD(s)) and/or fieldprogrammable logic device(s) (FPLD(s)). When reading any of theapparatus or system claims of this patent to cover a purely softwareand/or firmware implementation, at least one of the example sensor(s)502, the example communications interface(s) 504, the example camerainput analyzer 506, the example audio input analyzer 508, the exampletouch-based input analyzer 510, the example login controller 512, theexample push notification controller 514, the example primary displaycontroller 516, the example secondary display controller 518, theexample lid controller 520, the example system controller 522, and/orthe example database(s) 524 is/are hereby expressly defined to include anon-transitory computer readable storage device or storage disk such asa memory, a digital versatile disk (DVD), a compact disk (CD), a Blu-raydisk, etc. including the software and/or firmware. Further still, theexample portable computer 100 of FIGS. 1 and 2 may include one or moreelements, processes and/or devices in addition to, or instead of, thoseillustrated in FIG. 5 , and/or may include more than one of any or allof the illustrated elements, processes and devices. As used herein, thephrase “in communication,” including variations thereof, encompassesdirect communication and/or indirect communication through one or moreintermediary components, and does not require direct physical (e.g.,wired) communication and/or constant communication, but ratheradditionally includes selective communication at periodic intervals,scheduled intervals, aperiodic intervals, and/or one-time events.

FIGS. 6-11 illustrate example secondary user interfaces rendered on thesecondary display 116 as a user interacts with the example portablecomputer 100 in different ways. In particular, FIG. 6 illustratesdifferent secondary user interfaces rendered via the secondary display116 at different stages 602, 604, 606, 608, 610 in time during a wakeupsequence for the secondary display 116. In the illustrated example, theportable computer 100 begins in a lower power idle state with the lid106 closed and the secondary display 116 in an idle or sleep state. Assuch, at the initial stage 602 in the sequence, the secondary display116 does not include any content rendered thereon. In this low poweridle state of the portable computer 100, the human presence sensor 128is monitoring for people in the vicinity of the portable computer 100.Once the human presence sensor 128 detects a person, the sequenceadvances to the second stage 604 where the secondary display 116 isactivated. Further, in this example, the world facing camera 124 isactivated to capture an image of the detected person for authenticationpurposes (e.g., based on facial recognition). In some examples, thesecondary display 116 displays an indication that the camera 124 iscapturing an image and/or analyzing the captured image. In someexamples, the indication may correspond to changing an appearance of thecamera icon 302 and/or including an additional icon and/or animation 612in the central region of the secondary display 116. The icon and/oranimation 612 may convey to a user the time period during which the usermay choose to hold still facing the camera to facilitate the userrecognition. The camera input analyzer 506 then determines whether thedetected person can be recognized as an authorized user. If not, theprocess moves to the third stage 606 where a generic secondary userinterface is provided (e.g., similar to the secondary user interface 300discussed above in connection with FIG. 3 ). If the person isrecognized, the process advances to the fourth stage 608 where thesecondary display controller 518 causes the secondary display 116 torender an acknowledgement (e.g., a greeting 614 identifying the user byname) that the user was recognized. In some examples, the systemcontroller 522 may additionally cause speakers 132 to provide an audiblegreeting and/or other audible notification indicating the user has beenrecognized and logged into the portable computer 100 as an authorizeduser. Thereafter, at the fifth stage 610, the secondary display 116renders a personalized home screen containing personalized informationand/or icons that enable the user to access personalized information. Insome examples, the personalized home screen may be similar to thesecondary user interface 400 discussed above in connection with FIG. 4 .

FIG. 7 illustrates different secondary user interfaces rendered via thesecondary display 116 at different stages 702, 704, 706, 708, 710 intime associated with responding to a voice command from a user. As withFIG. 6 , all of the stages 702, 704, 706, 708, 710 in FIG. 7 occur withthe lid 106 of the portable computer 100 closed. Further, all of thestages 702, 704, 706, 708, 710 in FIG. 7 may be performed while theportable computer 100 is in a lower power state (e.g., less than in afull power state). In this example, the first stage 702 corresponds tothe secondary display 116 rendering the personalized home screenindicating that a user has already been recognized and logged into thesystem. In some examples, a voice command may be used to authenticate auser in a similar manner to the process flow for capturing and analyzingimage data discussed above in connection with FIG. 6 . In this example,the microphone 130 is monitoring for a voice assistant trigger word,which, in this example is “computer.” Thus, as the user speaks thetrigger word, a voice assistant (e.g., associated with the audio inputanalyzer 508) is activated to monitor and detect the rest of the user'svoice command. In some examples, the secondary display 116 displays anindication that the voice assistant (audio input analyzer 508) islistening for a voice command and/or analyzing audio associated with thecommand. In some examples, the indication may correspond to changing anappearance of the microphone icon 304 and/or including an additionalicon and/or animation 712 in the central region of the secondary display116. In some examples, the icon and/or animation 712 of FIG. 7 may bethe same as the icon and/or animation 612 associated with the camerainput analyzer 506 capturing and/or analyzing image data as discussedabove in FIG. 6 .

In this example, the voice command is “Computer, when is my nextmeeting?” In some examples, the audio input analyzer 508 may performvoice recognition on the voice command to confirm that the voice comesfrom the authorized user before proceeding. In other examples, theprocess may proceed without user authentication inasmuch as the user hasalready been authenticated and logged into the portable computer 100.Assuming the user was recognized and/or the recognition was notperformed, the process advances to the third stage 706 where thesecondary display 116 provides confirmation that the voice command wasdetected by, for example, showing the voice command as text on thedisplay. Additionally or alternatively, the voice command may berepeated back to the user via the speakers 132. The audio input analyzer508 in conjunction with the system controller 522 may determine theintent of the voice command and retrieve the relevant information fromthe user's calendar that is responsive to the user's request. Therelevant information is then provided via the secondary display 116(and/or via the speakers 132) at the fourth stage 708. After a thresholdperiod of time, the secondary user interface rendered on the secondarydisplay 116 may revert to the previous view prior to detecting the voicecommand at the fifth stage 710. In this example, the previous viewcorresponds to the personalized home screen shown at the first stage 702in the process.

FIG. 8 illustrates different secondary user interfaces rendered via thesecondary display 116 at different stages 802, 804, 806, 808, 810, 812in time associated with responding to a voice command from a user. Aswith FIGS. 6 and 7 , all of the stages 802, 804, 806, 808, 810, 812 inFIG. 8 occur with the lid 106 of the portable computer 100 closed.Further, all of the stages 802, 804, 806, 808, 810, 812 in FIG. 8 may beperformed while the portable computer 100 is in a lower power state(e.g., less than in a full power state). In some examples, rather thanthe audio input analyzer 508 always monitoring for a voice assistanttrigger word, a user may provide a touch-based input to activate ortrigger the voice assistant system associated with the audio inputanalyzer 508 as demonstrated in the illustrated example of FIG. 8 .Specifically, the first stage 802 corresponds to the secondary display116 rendering the personalized home screen. While at this stage, theuser may select (e.g., by touching) the microphone icon 304 on thesecondary display to indicate the intent to provide a voice command tothe system. By touching the microphone icon 304, the user activates thevoice assistant such that, at the second stage 804, the secondarydisplay 116 displays an indication that the voice assistant (audio inputanalyzer 508) is listening for a voice command and/or analyzing audioassociated with the command as discussed above in connection with thesecond stage 704 of FIG. 7 . With the indication on the secondarydisplay 116, the user knows to proceed to speaking a voice command,which, in this example, is “Computer, show me my calendar?” At the thirdstage 806, the secondary display 116 renders an acknowledgement that thevoice command was detected. Thereafter, at a fourth stage 808, thesecondary display 116 is updated to render a secondary user interfaceassociated with the calendar application on the portable computer 100.In some examples, the user may interact with the calendar by touchingthe secondary display 116. Thus, for example, the user may slide thecalendar display into the future to see future appointments as shown atthe fifth stage 810 in the illustrated example. Either after a thresholdperiod of time without user activity or in response to a user request(e.g., selecting the home screen icon 814), the secondary display 116may again revert to the home screen at the sixth stage 812. Although theprocedures of FIGS. 6 and 7 are described in the context of userinteractions based on voice commands, in other examples, the user maycontrol the secondary user interface exclusively through touch. Forexample, rather than requesting to view the calendar using speech, auser may simply select the calendar icon 816 on the home screen to bringup the secondary user interface associated with the calendar.

FIG. 9 illustrates different secondary user interfaces rendered via thesecondary display 116 at different stages 902, 904, 906, 908, 910 intime associated with providing a push notification to an authorized userof the portable computer 100. As with FIGS. 6-8 , all of the stages 902,904, 906, 908, 910 in FIG. 9 occur with the lid 106 of the portablecomputer 100 closed. Further, all of the stages 902, 904, 906, 908, 910in FIG. 9 may be performed while the portable computer 100 is in a lowerpower state (e.g., less than in a full power state). In this example,the first stage 902 corresponds to the secondary display 116 renderingthe personalized home screen indicating that a user has already beenrecognized and logged into the system. Thereafter, the calendarapplication running on the portable computer 100 may generate a pushnotification to provide a reminder that it is almost time for anupcoming meeting or other scheduled appointment. Accordingly, at thesecond stage 904, the secondary display 116 is automatically updatedwith a reminder notification 912. In this example, the remindernotification 912 includes an indication of the location (e.g., roomJF3-201) and a document icon 914 indicating there is a documentassociated with the meeting. In some examples, the system controller 522may generate an audible and/or haptic signal to alert the user of thereminder.

Continuing in time in the illustrated example, the calendar app mayreceive a push notification from the organizer of the meeting that therehas been a room change. Accordingly, at the third stage 906 of theillustrated example, the secondary display includes an alert icon 916.In this example, when the user selects the alert icon 916, details ofthe room change are rendered via the secondary display 116 at the fourthstage 908. In some examples, the secondary user interface at the fourthstage includes response options associated with the push notifications.In this example, the options include the user accepting or acknowledgingthe room change, rejecting or dismissing the room change, or replying tothe room change (e.g., to propose an alternate room). In this example,the user accepts the room change such that, at the fifth stage 910, thecalendar is updated with the new room number. In some examples, thecalendar may be automatically updated with the new room number withoutthe user having to accept the change.

FIG. 10 illustrates different secondary user interfaces rendered via thesecondary display 116 at different stages 1002, 1004, 1006, 1008, 1010,1012, 1014 in time associated with providing and responding to a pushnotification corresponding to an incoming conference call. In thisexample, the first stage 1002 corresponds to the secondary display 116rendering the personalized home screen while the lid 106 of the portablecomputer 100 is closed. When an incoming call is received, a secondaryuser interface associated with the conference calling application on theportable computer 100 is rendered via the secondary display 116 at thesecond stage 1004. In some examples, an audible alert may be generatedvia the speakers 132. As shown in the illustrated example, the secondaryuser interface rendered at the second stage 1004 includes anidentification of the caller and different response options for the userthat include accepting or answering the call, dismissing or hanging upthe call, or providing a quick reply. In some examples, the quick replymay be short text message to the caller selected from a list ofpreconfigured text replies. In this example, the user accepts the calland the secondary user interface is updated to provide control optionsand/or additional detail about the ongoing call as shown at the thirdstage 1006 of the illustrated example. In some examples, the callautomatically activates the microphone so that the user can speak on thecall, which is indicated by a microphone icon 1016 within the controloptions for the ongoing conference call. In some examples, if the userselects the microphone icon 1016, the user mutes the microphone. Mutingthe microphone may be indicated by a change in the microphone icon 1016as shown at the fourth stage 1008 in FIG. 10 .

In some examples, the control options may also include a video icon 1018that may be selected by the user to activate the world facing camera 124to transmit video on the call. In some examples, the video icon may beprovided as an option only when the portable computer 100 is open. Inthe illustrated example, the user opens the portable computer 100between the fourth and fifth stages 1008, 1010. Once the portablecomputer 100 is opened, a 360 degree video icon 1020 may be provided viathe secondary user interface. In some examples, the 360 degree videoicon may be included alongside the standard video icon 1018 or in placeof it. In some examples, the standard video icon 1018 activates thecamera that is facing the user. That is, if the portable computer 100 isclosed, selecting the standard video icon 1018 may activate the worldfacing camera 124. However, when the portable computer 100 is open,selecting the standard video camera 1018 may activate the user facingcamera 122. By contrast, selecting the 360 degree video icon 1020activates both the user facing camera 122 and the world facing camera124 to capture a 360 degree view of the area surrounding the portablecomputer 100. The sixth stage 1012 in the illustrated occurs after theuser has unmuted the microphone and selected the 360 degree video icon1020. In some examples, a primary user interface associated with theconference calling application is rendered via the primary display 114in response to the user selecting the video option so that the user isable to view the video stream on the primary display 114. In someexamples, the primary user interface may be rendered automatically onthe primary display 114 in response to the lid 106 of the portablecomputer 100 being opened regardless of whether the user selects one ofthe video options. In some examples, one or both of the video optionsmay be provided on the secondary display 116 while the computer isclosed and, if selected, cause the primary display to turn on to renderthe primary user interface associated with the conference callingapplication even before the display is open. In this manner, the videoconference call will be ready and going as soon as the user opens theportable computer 100.

The seventh stage 1014 in the illustrated example corresponds to afterthe conference all has ended. In this example, although the portablecomputer 100 is now opened, the secondary display still reverts to theview prior to the conference call. In this example, the previous viewcorresponds to the personalized home screen of the user as in the firststage 1002,

FIG. 11 illustrates different secondary user interfaces rendered via thesecondary display 116 at different stages 1102, 1104, 1106, 1108, 1110,1112, 1114 in time associated with user interactions between both theprimary and secondary displays 114, 116. In this example, the firststage 1102 corresponds to the secondary display 116 rendering thepersonalized home screen while the lid 106 of the portable computer 100is opened so that the user may be interacting with the primary display114. More particular, the example proceeds with the user launching amusic player application via the primary display to begin playing music.At the second stage 1104, the secondary display 116 is updated toidentify the song that is playing and to provide control options for theuser to control the music via the secondary display. In some examples,if the user does not interact with the secondary display within athreshold period of time, the secondary display will revert to thepersonalized home screen as shown at the third stage 1106. The user maystill activate the music player controls on the secondary display 116 byselecting the music player icon 408. Once the icon 408 is selected, afull secondary user interface associated with the music player may berendered via the secondary display 116 as shown at the fourth stage 1108in the illustrated example. In some examples, the full secondary userinterface for the music player application may automatically be launchedon the secondary display 116 in response to the user launching theapplication via the primary display 114. In some examples, that themusic player application is active on the secondary display 116 isindicated by a change to the music player icon 408 as shown in theillustrated example.

While the music is still playing, the user may close the portablecomputer 100. In some examples, the music player application maycontinue to be executed in connection with the secondary display 116. Insome examples, closing the computer lid 106 may cause the current songbeing played to pause. However, the secondary display may provide anoption in the controls to enable the user to have the song continueplaying where it was paused as shown at the fifth stage 1110 in FIG. 11. The playback of the song when the lid 106 is closed may be from thespeakers 132 on the front of the portable computer 100 if the user wasusing speakers before closing the portable computer 100. If the user wasplaying the music via headphones (e.g., via a Bluetooth or wiredconnection), the song would continue to play the music via theheadphones after the lid 106 is closed and the user selects the optionto continue playing the song. In some examples, the song mayautomatically continue to play after the user closes the computer lid106 without waiting for the user to indicate the song should continue tobe played. The sixth stage 1112 in the illustrated example representsthe song being played (with the option to again pause the song) whilethe portable computer 100 is closed. The user may desire to access otherinformation and/or functionality on the computer via the secondarydisplay while the music continues to play. To do so, the user may selectthe home screen icon 814 on the secondary display to return to thepersonalized home screen as shown in the seventh stage 1114 of FIG. 11 .In this example, even though the secondary user interface associatedwith the music player is no longer being rendered via the secondarydisplay 116, the music continues to play. In some examples, the activemusic player continues to be indicated on the secondary display 116based on the changed appearance of the music player icon 408. If theuser wishes to change songs or otherwise again control the music, theuser may again select the music player icon 408 to reopen the associatedsecondary user interface.

Flowcharts representative of example hardware logic, machine readableinstructions, hardware implemented state machines, and/or anycombination thereof for implementing the portable computer 100 of FIGS.1 and 2 is shown in FIGS. 12A, 12B, and 13-18 . The machine readableinstructions may be one or more executable programs or portion(s) of anexecutable program for execution by a computer processor such as theprocessors 1910, 1912 shown in the example processor platform 1900discussed below in connection with FIG. 19 . The program may be embodiedin software stored on a non-transitory computer readable storage mediumsuch as a CD-ROM, a floppy disk, a hard drive, a DVD, a Blu-ray disk, ora memory associated with the processors 1910, 1912, but the entireprogram and/or parts thereof could alternatively be executed by a deviceother than the processors 1910, 1912 and/or embodied in firmware ordedicated hardware. Further, although the example program is describedwith reference to the flowcharts illustrated in FIGS. 12A, 12B, and13-18 , many other methods of implementing the example portable computer100 may alternatively be used. For example, the order of execution ofthe blocks may be changed, and/or some of the blocks described may bechanged, eliminated, or combined. Additionally or alternatively, any orall of the blocks may be implemented by one or more hardware circuits(e.g., discrete and/or integrated analog and/or digital circuitry, anFPGA, an ASIC, a comparator, an operational-amplifier (op-amp), a logiccircuit, etc.) structured to perform the corresponding operation withoutexecuting software or firmware.

The machine readable instructions described herein may be stored in oneor more of a compressed format, an encrypted format, a fragmentedformat, a packaged format, etc. Machine readable instructions asdescribed herein may be stored as data (e.g., portions of instructions,code, representations of code, etc.) that may be utilized to create,manufacture, and/or produce machine executable instructions. Forexample, the machine readable instructions may be fragmented and storedon one or more storage devices and/or computing devices (e.g., servers).The machine readable instructions may require one or more ofinstallation, modification, adaptation, updating, combining,supplementing, configuring, decryption, decompression, unpacking,distribution, reassignment, etc. in order to make them directly readableand/or executable by a computing device and/or other machine. Forexample, the machine readable instructions may be stored in multipleparts, which are individually compressed, encrypted, and stored onseparate computing devices, wherein the parts when decrypted,decompressed, and combined form a set of executable instructions thatimplement a program such as that described herein. In another example,the machine readable instructions may be stored in a state in which theymay be read by a computer, but require addition of a library (e.g., adynamic link library (DLL)), a software development kit (SDK), anapplication programming interface (API), etc. in order to execute theinstructions on a particular computing device or other device. Inanother example, the machine readable instructions may need to beconfigured (e.g., settings stored, data input, network addressesrecorded, etc.) before the machine readable instructions and/or thecorresponding program(s) can be executed in whole or in part. Thus, thedisclosed machine readable instructions and/or corresponding program(s)are intended to encompass such machine readable instructions and/orprogram(s) regardless of the particular format or state of the machinereadable instructions and/or program(s) when stored or otherwise at restor in transit.

As mentioned above, the example processes of FIGS. 12A, 12B, and 13-18may be implemented using executable instructions (e.g., computer and/ormachine readable instructions) stored on a non-transitory computerand/or machine readable medium such as a hard disk drive, a flashmemory, a read-only memory, a compact disk, a digital versatile disk, acache, a random-access memory and/or any other storage device or storagedisk in which information is stored for any duration (e.g., for extendedtime periods, permanently, for brief instances, for temporarilybuffering, and/or for caching of the information). As used herein, theterm non-transitory computer readable medium is expressly defined toinclude any type of computer readable storage device and/or storage diskand to exclude propagating signals and to exclude transmission media.

“Including” and “comprising” (and all forms and tenses thereof) are usedherein to be open ended terms. Thus, whenever a claim employs any formof “include” or “comprise” (e.g., comprises, includes, comprising,including, having, etc.) as a preamble or within a claim recitation ofany kind, it is to be understood that additional elements, terms, etc.may be present without falling outside the scope of the correspondingclaim or recitation. As used herein, when the phrase “at least” is usedas the transition term in, for example, a preamble of a claim, it isopen-ended in the same manner as the term “comprising” and “including”are open ended. The term “and/or” when used, for example, in a form suchas A, B, and/or C refers to any combination or subset of A, B, C such as(1) A alone, (2) B alone, (3) C alone, (4) A with B, (5) A with C, (6) Bwith C, and (7) A with B and with C. As used herein in the context ofdescribing structures, components, items, objects and/or things, thephrase “at least one of A and B” is intended to refer to implementationsincluding any of (1) at least one A, (2) at least one B, and (3) atleast one A and at least one B. Similarly, as used herein in the contextof describing structures, components, items, objects and/or things, thephrase “at least one of A or B” is intended to refer to implementationsincluding any of (1) at least one A, (2) at least one B, and (3) atleast one A and at least one B. As used herein in the context ofdescribing the performance or execution of processes, instructions,actions, activities and/or steps, the phrase “at least one of A and B”is intended to refer to implementations including any of (1) at leastone A, (2) at least one B, and (3) at least one A and at least one B.Similarly, as used herein in the context of describing the performanceor execution of processes, instructions, actions, activities and/orsteps, the phrase “at least one of A or B” is intended to refer toimplementations including any of (1) at least one A, (2) at least one B,and (3) at least one A and at least one B.

The program of FIGS. 12A and 12B begins at block 1202, the example logincontroller 512 determines whether an authorized user has already beenrecognized and logged into the portable computer 100. If so, controladvances to block 1204 where the example login controller 512 determineswhether a threshold period of time has elapsed without activity on theportable computer 100. If so, control advances to block 1206 where theexample login controller 512 logs out the user. At block 1208, theexample secondary display controller 518 turns off the secondary display116. That is, the portable computer 100 is placed in a low power sleepmode. In some such examples, nearly all functionality of the computer isput to sleep except for the human presence sensor 128, which maycontinue to monitor for the presence of a person (e.g., the userapproaching the portable computer 100). Additionally or alternatively,in some examples, the microphone 130 and the example audio inputanalyzer 508 may continue to monitor for a voice assistant trigger thatmay cause the portable computer 100 to again wake up into a higher powerstate. After turning off the secondary display 116 at block 1208,control advances to block 1210. Returning to block 1202, if the examplelogin controller 512 determines that an authorized user has not beenrecognized and logged in (e.g., since being logged out at block 1206 ina previous iteration of the process), control advances directly to block1210.

At block 1210, the human presence sensor 128 determines whether a personnear the portable computer 100 has been detected. If so, controladvances to block 1212 to attempt to authenticate or recognize theperson using a camera (e.g., either the world facing camera 124 if theportable computer 100 is closed or the user facing camera 122 if theportable computer 100 is open). Further detail regarding theimplementation of block 1212 is provided below in connection with FIG.13 . Thereafter, at block 1214, the example login controller 512determines whether the person was recognized as an authorized user. Ifso, control advances to block 1222. If not, control advances to block1216. Returning to block 1210, if the human presence sensor 128 does notdetect a person near the portable computer 100, control advancesdirectly to block 1216.

At block 1216, the example system controller 522 determines whether tomonitor audio for voice-based user authentication. In some examples, themonitoring of audio is done in parallel with the human presencedetection of blocks 1210 and 1212 rather than occur after no person hasbeen recognized as represented in the flowchart of FIG. 12A. If theexample system controller 522 determines to monitor audio forvoice-based user authentication, control advances to block 1218 toattempt to authenticate or recognize a person based on their voice.Further detail regarding the implementation of block 1218 is providedbelow in connection with FIG. 14 . Thereafter, control advances to block1220 where the example login controller 512 determines whether theperson was recognized as an authorized user. If so, control advances toblock 1222. If it is determined that a person was not recognized atblock 1220 (and that no person was recognized at block 1212), then thereis no person recognized as an authorized user. In such situationscontrol advances to block 1238 on FIG. 12B. Likewise, if the examplesystem controller 522 determines at block 1216 not to monitor audio forvoice-based user authentication, control advances directly to block1238.

At block 1222, the example login controller 512 automatically logs inthe person recognized at block 1214 or block 1218 as an authorized user.Thereafter, at block 1224, the example secondary display controller 518renders a personalized message confirming the identification of theperson as an authorized user via the secondary display 116. In someexamples, the message may include a greeting that uses the name of theperson. In some examples, the greeting may be audible in addition towhat is rendered via the secondary display 116. At block 1226, theexample secondary display controller 518 renders personalized userinformation via the secondary display 116. In some examples, thepersonalized user information may be represented in a personalized homescreen (e.g., the personalized secondary user interface 400 of FIG. 4 ).In examples, where the user was previously logged in and has alreadyinteracted with the secondary display 116, the personalized informationmay correspond to a secondary user interface associated with aparticular application running on the portable computer 100 (e.g., anyof the various personalized secondary user interfaces described inconnection with FIGS. 6-11 ). In some examples, a user may be previouslylogged in if control came from block 1204. That is, returning to block1204, if the example login controller 512 determines that a thresholdperiod of time has not elapsed without activity on the portable computer100 (after an authorized user has already been recognized and loggedin), control advances directly to block 1226.

At block 1228 (top of FIG. 12B), the example audio input analyzer 508determines whether to detect a voice command. In some examples, thisdetermination is made based on the audio input analyzer 508 detecting avoice assistant trigger word spoken by a person within audible range ofthe microphones 130 of the portable computer 100. In some examples, thistrigger word may be the same voice command associated with the initialvoice recognition performed at block 1218. In other examples, this voicecommand may occur after the user has already been recognized and loggedin. If the example audio input analyzer 508 determines to detect a voicecommand, control advances to block 1230 where the example audio inputanalyzer 508 determines whether the detected voice is recognized ascorresponding to an authorized user. If so, control advances to block1232 to implement actions to provide a response to the voice command.Further detail regarding the implementation of block 1232 is providedbelow in connection with FIG. 15 . Thereafter, control advances to block1234. In some examples, block 1230 may be omitted with control advancesdirectly to block 1232 where the voice is automatically assumed tocorrespond to the authorized user based on the user having already beenrecognized and logged into the portable computer 100. Additionally oralternatively, in some examples block 1230 may be omitted with controladvancing directly to block 1232 when the voice command does not involvethe access or retrieval of personal information associated with the user(e.g., a voice command stating, “Computer, what is the weather today?”).Returning to block 1228, if the example audio input analyzer 508determines not to detect a voice command (e.g., no voice assistanttrigger word has been detected), control advances directly to block1234.

At block 1234, the example communications interface(s) 504 determinewhether a push notification has been received. In some examples, pushnotifications are received in connection with applications running onthe computer. Additionally or alternatively, push notifications may bereceived from separate devices communicatively coupled to the computer(e.g., a remote server connected via the Internet or a local trusteddevice connected via Bluetooth or Wi-Fi). For example, a pushnotification may include a reminder regarding an upcoming appointmentand/or a change in the appointment details associated with a calendarapplication of the user (as discussed in connection with FIG. 9 ), anincoming call on a conference calling application (as discussed inconnection with FIG. 10 ), or any other type of push notification (e.g.,a new email message, new posts on social media, etc.). If the examplecommunications interface(s) 504 determine that push notification hasbeen received at block 1234, control advances to block 1236 to implementactions enabling the user to respond to the push notification. Furtherdetail regarding the implementation of block 1236 is provided below inconnection with FIG. 16 . Thereafter, control advances to block 1238.Returning to block 1234, if the example communications interface(s) 504determine that no push notification has been received, control advancesdirectly to block 1238.

At block 1238, the example lid controller 520 determines whether thecomputer lid has been opened. If so, control advances to block 1240 toimplement actions enabling interaction between the primary display 114and the secondary display 116. Further detail regarding theimplementation of block 1240 is provided below in connection with FIG.17 . Thereafter, control advances to block 1242, where the example logincontroller 512 determines whether the authorized user is recognized andlogged in. If so, control advances to block 1244. Returning to block1238, if the example lid controller 520 determines that the computer lidhas not been opened, control advances directly to block 1244.

At block 1244, the example touch-based input analyzer 510 determineswhether a touch-based user input on the secondary display 116 has beendetected. If so, control advances to block 1246 where the exampletouch-based input analyzer 510 implements actions corresponding to thetouch-based user input. Touch-based user inputs may occur at any pointduring the process of FIGS. 12A and 12B. Thus, the touch-based inputsmay be associated with a user providing a voice command and/or the userresponding to feedback provided in response to a voice command.Similarly, touch-based user inputs may be implemented in connection witha user responding to push notifications. Touch-based user inputs on thesecondary display 116 may also be used to control applications renderedon the primary display (e.g., when the lid 106 of the portable computer100 is open). Further, touch-based user inputs on the secondary display116 may be used at other times whenever the user desires to accessand/or interact with information and/or other content directly via thesecondary display 116. As a specific example, the touch-based inputs mayenable a user to perform the reverse operations to receiving pushnotifications. That is, rather than answer a conference call, in someexamples, a user may be able to initiate a conference call with someoneelse based on user interactions with the secondary display 116. Asanother example, a user may be able to use touch-based inputs on thesecondary display 116 to locate and identify a particular document orfile stored on the portable computer 100 to share with a separatedevice. In some examples, after selecting the particular document orfile, the user may request (via the secondary display 116) the portablecomputer 100 to identify any nearby devices (e.g., within wirelesscommunication range) to which the document or file may be sent. In somesuch examples, the user may select (via the secondary display 116) oneor more of the identified device and cause the portable computer 100share the file with such devices. In some such examples, the portablecomputer 100 may first transmit a request to the devices and wait for anacknowledgement before establishing a connecting and transferring thedata. In some examples, any operations capable using touch-based inputsmay also be performed using corresponding voice commands. Afterimplementing actions corresponding to the touch-based user input atblock 1246, control advances to block 1250. Returning to block 1244, ifthe example touch-based input analyzer 510 has not detected atouch-based user input, control advances directly to block 1250.

Returning to block 1242, if no authorized user has been recognized andlogged in, control advances to block 1248 where the example secondarydisplay controller 518 renders generic information via the secondarydisplay. In some examples, the generic information corresponds to thegeneric secondary user interface described above in connection with FIG.3 . Thereafter, control advances to block 1250 to determine whether tocontinue the process. If so, control returns to block 1202. Otherwise,the example process of FIGS. 12A and 12B ends.

FIG. 13 provides further detail regarding the implementation of block1212 of FIG. 12A to attempt to authenticate or recognize a person usinga camera. The example process of FIG. 13 begins at block 1302 where theexample camera input analyzer 506 determines whether the relevant camerais turned on. In some examples, which camera is the relevant cameradepends on whether the portable computer 100 is opened or closed (asdetermined by the example lid controller 520). If the portable computer100 is closed, the relevant camera corresponds to the world facingcamera 124. If the portable computer 100 is open, the relevant cameracorresponds to the user facing camera 122. In some examples, bothcameras 122, 124 may be considered when the portable computer 100 isopen. If the example camera input analyzer 506 determines that therelevant camera is not turned on, control advances to block 1304 wherethe example system controller 522 activates the relevant camera. Atblock 1306, the example system controller 522 turns on the lightindicator 126 to indicate relevant camera is on. At block 1308, theexample secondary display controller 518 renders the camera icon 302 viathe secondary display 116. Thereafter, control advances to block 1310.Returning to block 1302, if the example camera input analyzer 506determines the relevant camera is already turned on, control advancesdirectly to block 1310.

At block 1310, the relevant camera captures an image of the person. Atblock 1312, the example camera input analyzer 506 analyzes the capturedimage relative to image data associated with authorized user(s) of theportable computer 100. At block 1314, the example secondary displaycontroller 518 renders a graphic (e.g., the icon and/or animation 612shown in FIG. 6 ) via the secondary display indicating the image isbeing captured and/or analyzed. At block 1316, the example camera inputanalyzer 506 determines whether to turn off the camera. If so, controladvances to block 1318 where the example system controller 522deactivates the camera. Thereafter, the process of FIG. 13 ends andreturns to complete the process of FIGS. 12A and 12B. If the examplecamera input analyzer 506 determines not to turn off the camera, theexample process immediately ends and returns to complete the process ofFIGS. 12A and 12B.

FIG. 14 provides further detail regarding the implementation of block1218 of FIG. 12A to attempt to authenticate or recognize a person usingtheir voice. The example process of FIG. 14 begins at block 1402 wherethe example audio input analyzer 508 determines whether the microphone130 is turned on. If not, control advances to block 1404 where theexample system controller 522 activates the microphone 130. At block1406, the example secondary display controller 518 renders themicrophone icon 304 via the secondary display 116. Thereafter, controladvances to block 1408. Returning to block 1402, if the example audioinput analyzer 508 determines the microphone 130 is already turned on,control advances directly to block 1408.

At block 1408, the example audio input analyzer 508 determines whether avoice assistant trigger word has been detected. If so, control advancesto block 1410 where the example secondary display controller 518 rendersa graphic (e.g., the icon and/or animation 712 of FIG. 7 ) via thesecondary display 116 indicating the system is monitoring for a voicecommand. At block 1412, the example audio input analyzer 508 determineswhether a voice command has been detected. If so, control advances toblock 1414 where the example secondary display controller 518 renders agraphic on the secondary display acknowledging the voice command. Insome examples, the acknowledgement graphic is a text-based reproductionof the voice command as described in the connection with the illustratedexamples of FIGS. 7 and 8 . At block 1416, the example audio inputanalyzer 508 analyzes the voice command relative to voice dataassociated with authorized user(s) of the portable computer 100.Thereafter, control advances to block 1418. If no voice assistant wordwas detected (block 1408) or no voice command was detected (block 1412),control advances directly to block 1418.

At block 1418, the example audio input analyzer 508 determines whetherto turn off the microphone 130. If so, control advances to block 1420where the example system controller 522 deactivates the microphone 130.Thereafter, the process of FIG. 14 ends and returns to continue theprocess of FIGS. 12A and 12B. If the example audio input analyzer 508determines not to turn off the microphone 130, the example processimmediately ends and returns to continue the process of FIGS. 12A and12B.

FIG. 15 provides further detail regarding the implementation of block1232 of FIG. 12B to implement actions to provide a response to the voicecommand. As described above in connection with FIG. 12B, this processbegins after a voice command has already been detected (block 1228 ofFIG. 12B). Accordingly, the example process of FIG. 15 begins at block1502 where the example secondary display controller 518 renders agraphic via the secondary display acknowledging the voice command. Insome examples, the acknowledgement graphic is a text-based reproductionof the voice command as described in the connection with the illustratedexamples of FIGS. 7 and 8 . At block 1504, the example system controller522 retrieves information needed to respond to the voice command. Insome examples, the information may be retrieved from the exampledatabase(s) 524. In some examples, the information is retrieved from anapplication running on the portable computer 100. In some examples, theinformation may be retrieved from a remote server via the communicationsinterface(s) 504.

At block 1506, the example secondary display controller 518 determineswhether to render a response to voice command via the secondary display116. If so, control advances to block 1508 where the example secondarydisplay controller 518 renders the response via the secondary display116. In some examples, the response may be rendered as text on thesecondary display 116 (e.g., as described in the illustrated example ofFIG. 7 ). In some examples, the response may include rendering asecondary user interface associated with an application running on thecomputer (e.g., the calendar application as described in the illustratedexample of FIG. 8 ). Thereafter, control advances to block 1510.Returning to block 1506, if the example secondary display controller 518determines not to render a response to voice command via the secondarydisplay 116, control advances directly to block 1510.

At block 1510, the example system controller 522 determines whether toprovide a response to the voice command via the speakers 132. If so,control advances to block 1512 where the example system controller 522generates a response via the speakers. Thereafter, control advances toblock 1514. Returning to block 1510, if the example system controller522 determines not to provide a response to the voice command via thespeakers 132, control advances directly to block 1514.

At block 1514, the example system controller 522 determines whether torender content via the primary display 114 as part of the response. Ifso, control advances to block 1516 where the example primary displaycontroller 516 turns on the primary display 114 if it is not already on.The primary display 114 may not be on if the lid 106 of the portablecomputer 100 is closed at the time the voice command is detected. Atblock 1518, the example primary display controller 516 renders a primaryuser interface associated with an application responsive to the voicecommand. As a specific example, if the user provides a voice command toinitiate a 360 degree video conference call, the example primary displaycontroller 516 may render a primary user interface associated with theconference calling application via the primary display 114, where theuser interface includes a 360 video stream of the surroundingenvironment of the portable computer 100 as captured by the world anduser facing cameras 122, 124. At block 1520, the example lid controller520 automatically opens the computer lid if not already open. In someexamples, the hinge 112 may not be constructed to automatically open thelid 106 of the portable computer 100. In such examples, block 1520 maybe omitted. In some such examples, the secondary display 116 may providea prompt directing the user to open the lid 106 to be able to see thecontent rendered via the primary display 114. Thereafter, controladvances to block 1522. Returning to block 1514, if the example systemcontroller 522 determines not to render content via the primary display114 as part of the response, control advances directly to block 1522.

At block 1522, the example secondary display controller 518 determineswhether to return the secondary display 116 to a previous screen. Insome examples, the example secondary display controller 518 maydetermine to do so based on a threshold period of time elapsing withoutthe user taking any action following the rendering of the response tothe voice command. In other examples, the determination may be madebased on the user providing input that the response to the voice commandis no longer needed. If the example secondary display controller 518determines to return the secondary display 116 to a previous screen,control advances to block 1524 where the example secondary displaycontroller 518 renders the primary user interface previously rendered onthe secondary display prior to the voice command. Thereafter, theexample process ends and returns to continue the process of FIGS. 12Aand 12B. If the example secondary display controller 518 determines notto return the secondary display 116 to a previous screen, the exampleprocess of FIG. 15 immediately ends and returns to continue the processof FIGS. 12A and 12B.

FIG. 16 provides further detail regarding the implementation of block1236 of FIG. 12B to implement actions enabling the user to respond to apush notification. As described above in connection with FIG. 12B, thisprocess begins after having received a push notification (as determinedat block 1234 of FIG. 12B). Accordingly, the example process of FIG. 16begins at block 1602 where the example push notification controller 514determines whether to generate an audio and/or haptic signal to indicatethe receipt of the push notification. If so, control advances to block1604 where the example system controller 522 generates the audio and/orhaptic signal. Thereafter, control advances to block 1606. If theexample push notification controller 514 determines not to generate anaudio and/or haptic signal, control advances directly to block 1606.

At block 1606, the example secondary display controller 518 renders agraphic indicative of the push notification with an option for the userto dismiss the notification or to take further action. The nature of thefurther action and/or the associated graphic may depend on the nature ofthe push notification. In some examples, the further action may involvereviewing more detailed information about the notification. In someexamples, the further action may involve the user responding to thenotification either by acknowledging and/or accepting the notificationor providing a more detailed response. In some examples, the option todismiss the notification may be presented as an explicit option (e.g.,as a button or icon) the user is to select. In other examples, the usermay dismiss the notification by not taking any further action regardingthe notification within a threshold period of time. As a specificexample, a push notification may correspond to an incoming conferencecall. The options for further action to be taken by the user may includeaccepting or answering, dismissing the call (e.g., by selecting the hangup icon or by not answering within a threshold period of time), orsending a quick reply (e.g., a text message stating the user cannot takethe call at the moment).

At block 1608, the example system controller 522 activates themicrophone 130 if not already turned on to detect user voice commands.In this manner, the user may specify the further action the user intendsto take using a voice command without having to physically touch thesecondary display 116. At block 1610, the example push notificationcontroller 514 determines whether the user selects an option to takefurther action or to dismiss the notification. If the example pushnotification controller 514 determines that further action was taken,control advances to block 1612 where the example push notificationcontroller 514 determines whether the user selected a quick response ora detailed response. In the context of an incoming conference call, aquick response may include a text message to the caller whereas a moredetailed response includes answering the call. In other contexts, forexample, a push notification indicating a new email message has beenreceived, a quick reply may be to acknowledge receipt of the emailwhereas a more detailed response includes drafting a reply email. If theuser selected a quick response, control advances to block 1614, wherethe example secondary display controller 518 renders options for thequick response via the secondary display 116. That is, in some examples,after the user has indicated an intent to provide a quick response theremay be multiple options for the quick response. As a specific example,if the user cannot answer an incoming conference call, the user mayselect an option to send a quick text message. Upon selecting thisoption, multiple preset text messages may be provided to the user toselect to send to the caller. In some examples, there may not bemultiple options for the quick response such that block 1614 may beomitted. For instance, in some examples, the push notification may be arequest from a separate device to share a document or other file withthe portable computer 100. In other examples, where the separate deviceis a trusted device, the push notification may indicate the separatedevice is transmitting the file or document to the portable computer100. In such examples, the only option for response by the user may beeither to dismiss or deny the request/transmission or to select a quickreply corresponding to accepting the request.

At block 1616, the example system controller 522 implements the quickresponse based on the user input. How the system controller 522implements the quick response may depend on the nature of thenotification and the quick response selected by the user. For example,in the context of a quick text-message reply to an incoming conferencecall, the system controller 522 may transmit the selected text message(e.g., via the communications interface(s) 504) to the caller. Inexamples where the push notification indicates a trusted device istransmitting a document or other file, the quick response involves theportable computer 100 storing the shared document. In some examples,where the separate device has been previously established as a trusteddevice, the portable computer 100 may automatically receive and storethe shared document and the quick response is merely to acknowledgereceipt of the document. Where the push notification corresponds to arequest to share the document or file, the system controller 522 mayestablish a connection with the separate device to then receive thedocument or file following the user's quick response to accept therequest. After implementing the quick response at block 1616, controladvances to block 1628. Returning to block 1612, if the example pushnotification controller 514 determines the user selected a detailedresponse, control advances to block 1618. In some examples, a quickresponse may not be an option such that control automatically advancesfrom block 1610 to block 1618 when the user takes further action.

At block 1618, the example system controller 522 determines whether thefurther action involves rendering content via the primary display 114 aspart of the response. If so, control advances to block 1620 where theexample primary display controller 516 turns on the primary display 114if it is not already on. The primary display 114 may not be on if thelid 106 of the portable computer 100 is closed at the time the pushnotification is received. At block 1622, the example primary displaycontroller 516 renders a primary user interface associated with anapplication that enables the further action of the user. As a specificexample, if the user indicates the intent to response to an incomingcall with a 360 degree video, the example primary display controller 516may render a primary user interface associated with the conferencecalling application via the primary display 114, where the userinterface includes a 360 video stream of the surrounding environment ofthe portable computer 100 as captured by the world and user facingcameras 122, 124. As another example, if the push notificationcorresponds to a new email and the user indicates the intent to draft areply email, the example primary display controller 516 may render aprimary user interface associated with an email application via theprimary display 114. At block 1624, the example lid controller 520automatically opens the computer lid if not already open. In someexamples, the hinge 112 may not be constructed to automatically open thelid 106 of the portable computer 100. In such examples, block 1624 maybe omitted. In some such examples, the secondary display 116 may providea prompt directing the user to open the lid 106 to be able to see thecontent rendered via the primary display 114. Thereafter, controladvances to block 1626. Returning to block 1618, if the example systemcontroller 522 determines the further action does not to renderingcontent via the primary display 114, control advances directly to block1626.

At block 1626, the example secondary display controller 518 renders asecondary user interface via the secondary display to enable the user totake the further action. In some examples, the content rendered via thesecondary display 116 may be done in conjunction with what is renderedvia the primary display 114. For instance, in some examples, while avideo stream for a video conference call may be rendered via the primarydisplay 114, controls for the call may be rendered via the secondarydisplay 116. In some examples, when the primary display 114 is used bythe user in taking further action to respond to the push notification,no content relevant to the push notification is rendered via thesecondary display 116 such that block 1626 may be omitted. Thereafter,control advances to block 1628. Returning to block 1610, if the examplepush notification controller 514 determines that the user selects todismiss the notification, control advances directly to block 1628.

At block 1622, the example secondary display controller 518 determineswhether to return the secondary display 116 to a previous screen. If so,control advances to block 1628 where the example secondary displaycontroller 518 renders the secondary user interface previously renderedon the secondary display prior to the voice command. Thereafter, theexample process ends and returns to continue the process of FIGS. 12Aand 12B. If the example secondary display controller 518 determines notto return the secondary display 116 to a previous screen, the exampleprocess of FIG. 16 immediately ends and returns to continue the processof FIGS. 12A and 12B.

FIG. 17 provides further detail regarding the implementation of block1240 of FIG. 12B to implement actions enabling interaction between theprimary display 114 and the secondary display 116. As described above inconnection with FIG. 12B, this process begins after having determinedthat this computer lid 106 is opened. Further, as described above, block1240 may be implemented in the context of an authorized user beinglogged into the portable computer 100 (e.g., when control comes fromblock 1234 or block 1236) or in the context of no authorized user beinglogged into the portable computer 100 (e.g., when control comes fromblock 1216 or block 1220). Accordingly, the example process of FIG. 17begins at block 1702 where the example login controller 512 determineswhether an authorized user has been recognized and logged into theportable computer 100. If so, control advances to block 1710. Otherwise,control advances to block 1704 where the example login controller 512(in conjunction with the primary display controller 516) request theuser to log in via the primary display 114. At block 1706, the examplelogin controller 512 determines whether the login credentials arereceived. If not, the example process of FIG. 17 ends and returns tocontinue the process of FIGS. 12A and 12B. If so, control advances toblock 1708 where the example login controller 512 logs in the authorizeduser.

At block 1710, the example primary display controller 516 renderspersonalized content via the primary display 114 associated with theauthorized user. At block 1712, the example lid controller 520determines whether the computer lid 106 was opened based on a responseto an active application associated with content rendered via thesecondary display 116. As an example, a user may have indicated anintent via the secondary display 116 to initiate a 360 degree videoconference call (that involves use of the primary display 114) beforeopening the lid 106 of the portable computer 100 as discussed in theillustrated example of FIG. 10 . As another example, the user may haveindicated an intent via the secondary display 116 to draft a reply (onthe primary display 114) to a new email message before opening the lid106. If the example lid controller 520 determines that the computer lid106 was opened based on a response to an active application associatedwith content rendered via the secondary display 116, controls advancesto block 1714 where the example primary display controller 516 renders aprimary user interface for the active application on the primary display114. Thereafter, control advances to block 1716. Returning to block1712, if the example lid controller 520 determines that the computer lid106 was not opened based on a response to an active applicationassociated with content rendered via the secondary display 116, controlsadvances directly to block 1716.

At block 1716, the example system controller 522 determines whetherthere is a secondary user interface associated with the activeapplication. If so, control advances to block 1718 where the examplesecondary display controller 518 renders the secondary user interfaceassociated with the active application via the secondary display 116.Thereafter, control advances to block 1724. If the example systemcontroller 522 determines there is not a secondary user interfaceassociated with the active application (or there is currently no activeapplication), control advances to block 1720 where the example secondarydisplay controller 518 determines whether to turn off the secondarydisplay 116. If so, control advances to block 1722 where the examplesecondary display controller 518 turns off the secondary display 116.Thereafter, control advances to block 1724. If the example secondarydisplay controller 518 determines not to turn off the secondary display116 at block 1720, control advances directly to block 1724.

At block 1724, the example system controller 522 determines whether theuser has activated a new application. In some examples, the newapplication may be launched or activated by the user interacting witheither the primary display 114 or the secondary display 116. If a newapplication was activated, control advances to block 1726 where theexample primary display controller 516 renders a primary user interfacefor the active application on the primary display 114. If, at block1724, the example system controller 522 determines the user has notactivated a new application control advances to block 1728 where theexample lid controller 520 determines whether the computer lid has beenclosed. If the lid has not closed, the example process of FIG. 17 endsand returns to continue the process of FIGS. 12A and 12B. If the lid hasclosed, control advances to block 1730.

At block 1730, the example system controller 522 determines whether theactive application associated with the current rendering on thesecondary display 116 includes closed-lid functionality. Exampleapplications associated with closed-lid functionality include theconference calling application described above in connection with FIG.10 and the music player application described above in connection withFIG. 11 . If the active application is associated with closed-lidfunctionality, control advances to block 1732 where the example systemcontroller 522 continues implementing the active application with thelid 106 closed. At block 1734, the example secondary display controller518 continues to render the secondary user interface associated with theactive application via the secondary display 116. Thereafter, theexample process of FIG. 17 ends and returns to continue the process ofFIGS. 12A and 12B. Returning to block 1730, if the example systemcontroller 522 determines that the active application associated withthe current rendering on the secondary display 116 does not includeclosed-lid functionality, control advances to block 1736 where theexample primary display controller 516 renders a personalized homescreen via the secondary display 116. Thereafter, the example process ofFIG. 17 ends and returns to continue the process of FIGS. 12A and 12B.

As mentioned above, in some examples, the portable computer 100 includesa hinge 112 that enables the lid 106 to be automatically opened and/orclosed without a user manually moving the lid 106. In some examples, thecomputer lid 106 may automatically open in response to user interactionswith the secondary display 116 (either through a voice command or aphysical touch). There may be other circumstances in which a user mayindicate an intent to access content via the primary display 114 whilethe portable computer 100 is closed to trigger the portable computer 100to automatically open. In one example, the user may tap on the portablecomputer 100 while closed with a unique tapping sequence correspondingto an accelerometer-based password that causes the user the beauthenticated and logged in to the portable computer 100 and furthercaused the lid 106 to automatically open. Additionally or alternatively,the lid 106 may automatically open in response to the camera inputanalyzer 506 recognizing the user.

In other examples, triggering the portable computer 100 to automaticallyopen from a closed position may and render relevant content via theprimary display 114 may be based on interactions associated with aseparate device. For example, the user may be viewing content via aportable device (e.g., a smartphone) and then tap the closed portablecomputer 100 with the portable device to cause the portable computer 100to open and begin rendering the content rendered via the portabledevice. As another example, a user may virtually (e.g., through aphysical gesture of the user's hand) pick up an object (e.g., adocument, an image, etc.) rendered on a portable device and virtuallydrop it on to a closed portable computer 100 to cause the portablecomputer 100 to open up and provide the moved object via the primarydisplay 114. In such examples, the physical gesture of the user's handmay be detected by analyzing images captured by the world facing camera124 on the portable computer 100. In some examples, the separateportable device, which may already be communicatively coupled to theportable computer 100 (e.g., via a Bluetooth pairing) may transmit asignal to the portable computer 100 to cause the world facing camera 124to turn on to detect the gesture based on the portable device firstdetecting the user's gesture to virtually pick up the object. In someexamples, the gesture, tapping of devices, and or other actions by theuser may trigger the portable device and the portable computer 100 tocommunicatively connect so that the content from the portable device maybe shared with the portable computer 100 for rendering via the primarydisplay 114 once the lid 106 is opened.

In some examples, the lid 106 may begin to open when the user did notintend to open the portable computer 100. In some examples, the user mayprovide an additional command (via voice, touch, or gesture) to reversethe operation. In some such examples, the lid 106 may automaticallyreverse its direction and return to the closed position.

FIG. 18 illustrates an example process flow to automatically open thelid 106 of the portable computer 100 based on an indication of intent ofan authenticated user to access content via the primary display 114. Theexample process begins with the computer lid 106 closed. At block 1802,one or more of the example camera input analyzer 506, the example audioinput analyzer 508, the touch-based input analyzer detects an indicationof user intent to access content via the primary display 114. At block1804, the example system controller 522 determines whether to obtainverification of the user intent. In some examples, verification may beobtained to avoid false positives in detecting an intent to open the lidbased on a single sensor or single associated user input. If the examplesystem controller 522 determines to obtain verification, controladvances to block 1806 where the example system controller 522determines whether verification was received? If so, control advances toblock 1808 where the example login controller 512 determines whether theuser is an authorized user. If so, control advances to block 1810, wherethe example lid controller 520 automatically opens the computer lid 106.At block 1812, the example primary display controller 516 renderspersonalized content (e.g., a home screen) on the primary display 114.

At block 1814, the example system controller 522 determines whetherparticular content to be accessed by the user is identifiable.Particular content may be identifiable if the content is being sharedfrom a separate electronic device (e.g., a smartphone in communicationwith the portable computer 100) or identified based on user interactionswith the secondary display 116. Particular content may not be identifiedwhere the user had merely indicated an intent to open the portablecomputer 100 without reference to how the user intends to use theportable computer 100 thereafter. If particular content to be accessedby the user is identifiable, control advances to block 1816 where theexample system controller 522 retrieves the particular content. The wayin which the content is retrieved may depend on the nature of thecontent and the way in which the user indicated an intent to access thecontent. For instance, in some examples, the content may be stored onthe portable computer 100 and is identified by the user based on atouch-based selection of the content via the secondary display 116. Insuch examples, the example system controller 522 may retrieve thecontent from the memory of the portable computer 100. In anotherexample, the particular content may be transferred (e.g., retrieved)from a separate device (e.g., the user's smartphone) that is local toand communicatively coupled to the portable computer 100. In otherexamples, the desired content may be requested based on a voice commandthat involve the portable computer 100 launching a web browser thatretrieves the particular content by accessing a remote server. At block1818, the example system controller 522 initiates an application toenable the rendering of the particular content via the primary display114.

Thereafter, control advances to block 1820. If no indication of userintent is detected at block 1802, no verification is received at block1806, the user is not authorized at block 1808, or there is noparticular content that is identifiable at block 1814, control advancesdirectly to block 1820. At block 1820, the example system controller 522determines whether to continue the process. If so, control returns toblock 1802. Otherwise, the example process of FIG. 18 ends.

FIG. 19 is a block diagram of an example processor platform 1900structured to execute the instructions of FIGS. 12A, 12B, and 13-18 toimplement the example portable computer 100 of FIGS. 1, 2 , and/or 5.The processor platform 1900 of the illustrated example includes a firstprocessor 1910 and a second processor 1912. The processors 1910, 1912 ofthe illustrated example are hardware. For example, the processors 1910,1912 can be implemented by one or more integrated circuits, logiccircuits, microprocessors, GPUs, DSPs, or controllers from any desiredfamily or manufacturer. The hardware processors may be a semiconductorbased (e.g., silicon based) device. The separate processors enable thefunctions of the portable computer 100 to be performed when the lid 106is closed with less power (e.g., using the second processor 1912) thanwhen the portable computer 100 is opened and operating in a full powermode (e.g., using the first processor 1910). In some such examples, theprocessor platform 1900 includes a first power supply 1906 to providepower to the first processor 1910 and other components when the systemis operating in a full power mode and a second power supply 1908 toprovide power to the second processor 1912 and other components when thesystem is operating in a low power mode. In the illustrated example ofFIG. 19 , the first processor 1910 implements the example camera inputanalyzer 506, the example audio input analyzer 508, the exampletouch-based input analyzer 510, the example login controller 512, theexample push notification controller 514, the example primary displaycontroller 516, the example lid controller 520, and the example systemcontroller 522. Further, in the illustrated example, the secondprocessor 1912 implements the example secondary display controller 518,and the example system controller 522. The example system controller 522is described as being implemented by both processors 1910 because thefunctionality of the system controller 522 is shared across bothprocessors. In some examples, different functions of the systemcontroller 522 may be implement exclusive on one of the processors 1910,1912. In other examples, functionality of the system controller 522 maybe redundantly implemented on both processors 1910, 1912. Although notrepresented in the illustrated example, one or more of the examplecamera input analyzer 506, the example audio input analyzer 508, theexample touch-based input analyzer 510, the example login controller512, the example push notification controller 514, the example primarydisplay controller 516, and/or the example lid controller 520 may beimplemented in whole or in part by the second processor 1912 instead ofor in addition to the first processor 1910. In some examples, the secondprocessor 1912 may be omitted and the first processor 1910 may implementeach of the example camera input analyzer 506, the example audio inputanalyzer 508, the example touch-based input analyzer 510, the examplelogin controller 512, the example push notification controller 514, theexample primary display controller 516, the example secondary displaycontroller 518, the example lid controller 520, and the example systemcontroller 522.

The processor 1910 of the illustrated example includes a local memory1911 (e.g., a cache) and the processor 1912 of the illustrated exampleincludes a local memory 1913 (e.g., a cache). The processors 1910, 1912of the illustrated example are in communication with a main memoryincluding a volatile memory 1914 and a non-volatile memory 1916 via abus 1918. The volatile memory 1914 may be implemented by SynchronousDynamic Random Access Memory (SDRAM), Dynamic Random Access Memory(DRAM), RAMBUS® Dynamic Random Access Memory (RDRAM®) and/or any othertype of random access memory device. The non-volatile memory 1916 may beimplemented by flash memory and/or any other desired type of memorydevice. Access to the main memory 1914, 1916 is controlled by a memorycontroller.

The processor platform 1900 of the illustrated example also includes aninterface circuit 1920. The interface circuit 1920 may be implemented byany type of interface standard, such as an Ethernet interface, auniversal serial bus (USB), a Bluetooth® interface, a near fieldcommunication (NFC) interface, and/or a PCI express interface. In thisexample, the interface circuit 1920 implements the example communicationinterface(s) 504.

In the illustrated example, one or more input devices 1922 are connectedto the interface circuit 1920. The input device(s) 1922 permit(s) a userto enter data and/or commands into the processor 1910. The inputdevice(s) can be implemented by, for example, an audio sensor, amicrophone, a camera (still or video), a keyboard, a button, a mouse, atouchscreen, a track-pad, a trackball, isopoint and/or a voicerecognition system.

One or more output devices 1924 are also connected to the interfacecircuit 1920 of the illustrated example. The output devices 1924 can beimplemented, for example, by display devices (e.g., a light emittingdiode (LED), an organic light emitting diode (OLED), a liquid crystaldisplay (LCD), a cathode ray tube display (CRT), an in-place switching(IPS) display, a touchscreen, etc.), a tactile output device, a printerand/or speaker. The interface circuit 1920 of the illustrated example,thus, typically includes a graphics driver card, a graphics driver chipand/or a graphics driver processor.

The interface circuit 1920 of the illustrated example also includes acommunication device such as a transmitter, a receiver, a transceiver, amodem, a residential gateway, a wireless access point, and/or a networkinterface to facilitate exchange of data with external machines (e.g.,computing devices of any kind) via a network 1926. The communication canbe via, for example, an Ethernet connection, a digital subscriber line(DSL) connection, a telephone line connection, a coaxial cable system, asatellite system, a line-of-site wireless system, a cellular telephonesystem, etc.

The processor platform 1900 of the illustrated example also includes oneor more mass storage devices 1928 for storing software and/or data.Examples of such mass storage devices 1928 include floppy disk drives,hard drive disks, compact disk drives, Blu-ray disk drives, redundantarray of independent disks (RAID) systems, and digital versatile disk(DVD) drives. In this example, the mass storage devices 1928 includesthe example database(s) 524.

The machine executable instructions 1932 of FIGS. 12A, 12B, and 13-18may be stored in the mass storage device 1928, in the volatile memory1914, in the non-volatile memory 1916, and/or on a removablenon-transitory computer readable storage medium such as a CD or DVD.

From the foregoing, it will be appreciated that example methods,apparatus and articles of manufacture have been disclosed that enable auser to interact with and/or operate a portable computer while the lidis closed and the computer is in a lower power state than when thecomputer is opened and operating in a full power mode. This is achievedin part by a low power secondary display that is visible to the userwhen the computer lid is closed. Examples disclosed herein enable a userto be recognized and/or authenticated to be logged into the computerbefore the user has opened the lid to provide a more seamless userexperience with the computer. Further, in some examples, the computermay automatically open from a closed position without the user having tomanually lift the lid to further assist a user in being able to quicklyopen and access content via a primary display. Disclosed methods,apparatus and articles of manufacture are accordingly directed to one ormore improvement(s) in the functioning of a computer.

Example methods, apparatus, systems, and articles of manufacture tooperate closed-lid portable computers are disclosed herein. Furtherexamples and combinations thereof include the following:

Example 1 includes an apparatus, comprising a camera input analyzer toanalyze image data captured by a world facing camera on a portablecomputer when a lid of the portable computer is in a closed position,the world facing camera on a first side of the lid, the portablecomputer including a primary display on a second side of the lidopposite the first side, and a secondary display controller to rendercontent via a secondary display of the portable computer in response tothe analysis of the image data, the secondary display controller torender the content on the secondary display while the lid of theportable computer is in the closed position and the primary display isturned off.

Example 2 includes the apparatus of example 1, wherein the secondarydisplay is disposed in a base of the portable computer, the lidrotatable relative to the base about a hinge connecting the lid to thebase.

Example 3 includes the apparatus of example 2, wherein the hinge is toautomatically open the lid in response to the analysis of the image dataauthenticating a user.

Example 4 includes the apparatus of any one of examples 1-3, wherein thecamera input analyzer is to perform facial recognition analysis on theimage data to identify a person captured by the world facing camera, andfurther including a login controller to login the person in response tothe camera input analyzer recognizing the person as an authorized userof the portable computer, the login controller to login the personbefore the lid is moved from the closed position.

Example 5 includes the apparatus of example 4, wherein the contentrendered via the secondary display includes personalized informationcorresponding to the authorized user.

Example 6 includes the apparatus of example 4, wherein the contentrendered via the secondary display includes generic information when thecamera input analyzer is unable to recognize the person.

Example 7 includes the apparatus of any one of examples 1-6, furtherincluding a human presence sensor to detect a presence of a personnearby the portable computer, the human presence sensor to triggeractivation of the world facing camera.

Example 8 includes the apparatus of any one of examples 1-7, wherein thecontent is first content, and further including an audio input analyzerto analyze a voice command spoken when the lid is in the closedposition, a microphone on the portable computer to capture the voicecommand when the lid is in the closed position and the voice command isspoken by a person within audible range of the microphone, the secondarydisplay controller to render second content via the secondary display inresponse to the analysis of the voice command.

Example 9 includes the apparatus of example 8, wherein the audio inputanalyzer is to perform voice recognition analysis of the voice commandwithout communicating with a remote server.

Example 10 includes the apparatus of example 9, wherein the secondcontent rendered via the secondary display includes personalizedinformation corresponding to the person when the audio input analyzerrecognizes the voice command as corresponding to a voice of anauthorized user of the portable computer.

Example 11 includes the apparatus of any one of examples 8-10, furtherincluding a system controller to determine whether third content is tobe rendered via the primary display as part of a response to the voicecommand, and a primary display controller to activate the primarydisplay while the lid is still closed and render the third content viathe primary display.

Example 12 includes the apparatus of example 11, further including a lidcontroller to automatically move the lid to an open position in responseto the voice command.

Example 13 includes the apparatus of any one of examples 1-12, whereinthe world facing camera has a field of view of at least 180 degrees.

Example 14 includes the apparatus of example 13, wherein the image datais first image data, the camera input analyzer to combine the firstimage data with second image data to form a 360 degree image of anenvironment surrounding the portable computer, the second image datacaptured by a user facing camera on the portable computer, the userfacing camera on the second side of the lid, the user facing camerahaving a field of view of at least 180 degrees.

Example 15 includes the apparatus of any one of examples 1-14, furtherincluding a communications interface to receive a push notification froma device separate from the portable computer while the lid is in theclosed position, the secondary display to render a graphic while the lidis in the closed position, the graphic including an option for a user torespond to the push notification.

Example 16 includes the apparatus of example 15, wherein the pushnotification corresponds to the device sharing data with the portablecomputer.

Example 17 includes the apparatus of any one of examples 1-16, furtherincluding a touch-based input analyzer to analyze user interactions withthe secondary display detected by a touch sensor associated with thesecondary display.

Example 18 includes the apparatus of example 17, wherein the touchsensor is associated with a touchpad disposed on a base of the portablecomputer, the secondary display corresponding to an extension of thetouchpad, the secondary display to extend along a front edge of the baseto be visible when the lid is in the closed position.

Example 19 includes the apparatus of any one of examples 1-18, furtherincluding a primary display controller to render a primary userinterface via the primary display when the lid is open and the primarydisplay is powered, the primary user interface associated with anapplication running on the portable computer, the secondary display torender a secondary user interface associated with the application viathe secondary display.

Example 20 includes the apparatus of example 19, wherein the secondaryuser interface includes controls to enable a user to operate theapplication, the primary display controller to update the primary userinterface based on user interactions with the controls in the secondaryuser interface.

Example 21 includes the apparatus of example 20, wherein the secondarydisplay controller is to continue to render the secondary user interfacevia the secondary display after the lid is returned to the closedposition and the primary display is turned off, the controls in thesecondary user interface to enable the user to continue to operate theapplication when the lid is in the closed position.

Example 22 includes the apparatus of any one of examples 19-21, whereinthe primary display controller is implemented with a first processor andthe secondary display controller is implemented with a second processor.

Example 23 includes the apparatus of example 22, wherein the secondprocessor consumes less power than the first processor.

Example 24 includes a non-transitory computer readable medium comprisinginstructions that, when executed, cause a portable computer to at leastanalyze image data captured by a world facing camera on the portablecomputer when a lid of the portable computer is in a closed position,the world facing camera on a first side of the lid, the portablecomputer including a primary display on a second side of the lidopposite the first side, and render content via a secondary display ofthe portable computer in response to the analysis of the image data, theportable computer to render the content on the secondary display whilethe lid of the portable computer is in the closed position and theprimary display is turned off.

Example 25 includes the non-transitory computer readable medium ofexample 24, wherein the instructions further cause the portable computerto perform facial recognition analysis on the image data to identify aperson captured by the world facing camera, and login the person inresponse to recognition of the person as an authorized user of theportable computer before the lid is moved from the closed position.

Example 26 includes the non-transitory computer readable medium ofexample 25, wherein the content rendered via the secondary displayincludes personalized information corresponding to the authorized user.

Example 27 includes the non-transitory computer readable medium ofexample 25, wherein the content rendered via the secondary displayincludes generic information when the person is not recognized.

Example 28 includes the non-transitory computer readable medium of anyone of examples 24-27, wherein the instructions further cause theportable computer to detect a presence of a person nearby the portablecomputer, and trigger activation of the world facing camera.

Example 29 includes the non-transitory computer readable medium of anyone of examples 24-28, wherein the content is first content, theinstructions to further cause the portable computer to analyze a voicecommand when the lid is in the closed position, a microphone on theportable computer to capture the voice command when the lid is in theclosed position and the voice command is spoken by a person withinaudible range of the microphone on the portable computer, and rendersecond content via the secondary display in response to the analysis ofthe voice command.

Example 30 includes the non-transitory computer readable medium ofexample 29, wherein the instructions further cause the portable computerto perform voice recognition analysis of the voice command withoutcommunicating with a remote server.

Example 31 includes the non-transitory computer readable medium ofexample 30, wherein the second content rendered via the secondarydisplay includes personalized information corresponding to the personwhen the voice command is recognized as corresponding to a voice of anauthorized user of the portable computer.

Example 32 includes the non-transitory computer readable medium of anyone of examples 29-31, wherein the instructions further cause theportable computer to determine whether third content is to be renderedvia the primary display as part of a response to the voice command,activate the primary display while the lid is still closed, and renderthe third content via the primary display.

Example 33 includes the non-transitory computer readable medium ofexample 32, wherein the instructions further cause the portable computerto automatically move the lid to an open position in response to thevoice command.

Example 34 includes the non-transitory computer readable medium of anyone of examples 24-33, wherein the image data is first image data, theinstructions to further cause the portable computer to combine the firstimage data with second image data to form a 360 degree image of anenvironment surrounding the portable computer, the second image datacaptured by a user facing camera on the portable computer, the userfacing camera on the second side of the lid, each of the world facingcamera and the user facing camera having a field of view of at least 180degrees respectively.

Example 35 includes the non-transitory computer readable medium of anyone of examples 24-34, wherein the instructions further cause theportable computer to render a graphic while the lid is in the closedposition in response to receipt of a push notification from a deviceseparate from the portable computer, the graphic including an option fora user to respond to the push notification.

Example 36 includes the non-transitory computer readable medium ofexample 35, wherein the push notification corresponds to the devicesharing data with the portable computer.

Example 37 includes the non-transitory computer readable medium of anyone of examples 24-36, wherein the instructions further cause theportable computer to analyze user interactions with the secondarydisplay detected by a touch sensor associated with the secondarydisplay.

Example 38 includes the non-transitory computer readable medium of anyone of examples 24-37, wherein the instructions further cause theportable computer to render a primary user interface via the primarydisplay when the lid is open and the primary display is powered, theprimary user interface associated with an application running on theportable computer, and render a secondary user interface associated withthe application via the secondary display.

Example 39 includes the non-transitory computer readable medium ofexample 38, wherein the secondary user interface includes controls toenable a user to operate the application, the instructions to furthercause the portable computer to update the primary user interface basedon user interactions with the controls in the secondary user interface.

Example 40 includes the non-transitory computer readable medium ofexample 39, wherein the instructions further cause the portable computerto continue to render the secondary user interface via the secondarydisplay after the lid is returned to the closed position and the primarydisplay is turned off, the controls in the secondary user interface toenable the user to continue to operate the application when the lid isin the closed position.

Example 41 includes a method comprising analyzing, by executed aninstruction with at least one processor, image data captured by a worldfacing camera on a portable computer when a lid of the portable computeris in a closed position, the world facing camera on a first side of thelid, the portable computer including a primary display on a second sideof the lid opposite the first side, and rendering, by executed aninstruction with the at least one processor, content via a secondarydisplay of the portable computer in response to the analysis of theimage data, the portable computer to render the content on the secondarydisplay while the lid of the portable computer is in the closed positionand the primary display is turned off.

Example 42 includes the method of example 41, further includingperforming facial recognition analysis on the image data to identify aperson captured by the world facing camera, and logging in the person inresponse to recognition of the person as an authorized user of theportable computer before the lid is moved from the closed position.

Example 43 includes the method of example 42, further includingrendering the content via the secondary display to include personalizedinformation corresponding to the authorized user.

Example 44 includes the method of example 42, further includingrendering the content via the secondary display to include genericinformation when the person is not recognized.

Example 45 includes the method of any one of examples 41-44, furtherincluding detecting a presence of a person nearby the portable computer,and triggering activation of the world facing camera.

Example 46 includes the method of any one of examples 41-45, wherein thecontent is first content, the method further including analyzing a voicecommand when the lid is in the closed position, a microphone on theportable computer to capture the voice command when the lid is in theclosed position and the voice command spoken by a person within audiblerange of the microphone on the portable computer, and rendering secondcontent via the secondary display in response to the analysis of thevoice command.

Example 47 includes the method of example 46, further includingperforming voice recognition analysis of the voice command withoutcommunicating with a remote server, the second content rendered via thesecondary display includes personalized information corresponding to theperson when the voice command is recognized as corresponding to a voiceof an authorized user of the portable computer.

Example 48 includes the method of any one of examples 46 or 47, furtherincluding determining whether third content is to be rendered via theprimary display as part of a response to the voice command, activatingthe primary display while the lid is still closed, and rendering thethird content via the primary display.

Example 49 includes the method of example 48, further includingautomatically moving the lid to an open position in response to thevoice command.

Example 50 includes the method of any one of examples 41-49, wherein theimage data is first image data, the method further including combiningthe first image data with second image data to form a 360 degree imageof an environment surrounding the portable computer, the second imagedata captured by a user facing camera on the portable computer, the userfacing camera on the second side of the lid, the world facing camerahaving a field of view of at least 180 degrees and the user facingcamera having a field of view of at least 180 degrees.

Example 51 includes the method of any one of examples 41-50, furtherincluding rendering a graphic while the lid is in the closed position inresponse to receipt of a push notification from a device separate fromthe portable computer, the graphic including an option for a user torespond to the push notification.

Example 52 includes the method of example 51, wherein the pushnotification corresponds to the device sharing data with the portablecomputer.

Example 53 includes the method of any one of examples 41-52, furtherincluding analyzing user interactions with the secondary displaydetected by a touch sensor associated with the secondary display.

Example 54 includes the method of any one of examples 41-53, furtherincluding rendering a primary user interface via the primary displaywhen the lid is open and the primary display is powered, the primaryuser interface associated with an application running on the portablecomputer, and rendering a secondary user interface associated with theapplication via the secondary display.

Example 55 includes the method of example 54, wherein the secondary userinterface includes controls to enable a user to operate the application,the method further including updating the primary user interface basedon user interactions with the controls in the secondary user interface.

Example 56 includes the method of example 55, further includingcontinuing to render the secondary user interface via the secondarydisplay after the lid is returned to the closed position and the primarydisplay is turned off, the controls in the secondary user interface toenable the user to continue to operate the application when the lid isin the closed position.

Example 57 includes the method of any one of examples 54-56, wherein theat least one processor includes a first processor to control renderingof content via the primary display and a second processor to controlrendering of content via the secondary display.

Example 58 includes the method of example 57, wherein the secondprocessor consumes less power than the first processor.

Example 59 includes a portable computer, comprising a base, a lid, ahinge to rotatably couple the lid to the base to enable movement of thelid between a closed position and an open position, a primary display ona first side of the lid, a world facing camera on a second side of thelid opposite the first side, the world facing camera to capture imagedata at least when the lid is in the closed position, and at least oneprocessor to initiate an operation on the portable computer in responseto analysis of the image data, the at least one processor to initiatethe operation while the lid is closed.

Example 60 includes the portable computer of example 59, wherein theoperation includes logging the user into the portable computer when theanalysis of the image data results in recognition of a user.

Example 61 includes the portable computer of example 59, wherein theoperation includes automatically moving the lid to the open positionwhen the analysis of the image data results in recognition of a user.

Example 62 includes the portable computer of any one of examples 59-61,further including a human presence sensor to trigger activation of theworld facing camera in response to detecting a presence of a user.

Example 63 includes the portable computer of any one of examples 59-62,wherein the world facing camera is a panamorphic camera having a fieldof view of at least 180 degrees.

Example 64 includes the portable computer of example 63, furtherincluding a user facing camera on the first side of the lid, the userfacing camera being a second panamorphic to enable the capture of a 360degree field of view when using both the world facing camera and theuser facing camera.

Example 65 includes the portable computer of any one of examples 59-64,further including a microphone to capture audio data corresponding to avoice command of a user, the at least one processor to recognize theuser based on the voice command without communicating with a remoteserver.

Example 66 includes the portable computer of example 65, furtherincluding at least one of a spring or a motor associated with the hingeto automatically move the lid to the open position in response to thevoice command.

Example 67 includes the portable computer of any one of examples 59-66,further including a secondary display on the base, the secondary displayvisible to a user when the lid is in the closed position, the secondarydisplay including a touch sensitive surface to enable user interactionswith the secondary display via touch.

Example 68 includes the portable computer of example 67, wherein theoperation includes rendering content via the secondary display on theportable computer.

Example 69 includes the portable computer of example 68, wherein thecontent rendered via the secondary display includes user specificinformation associated with the user.

Example 70 includes the portable computer of example 68, wherein the atleast one processor is to render generic information via the secondarydisplay when the at least one processor does not recognize the user.

Example 71 includes the portable computer of any one of examples 67-70,further including a touchpad disposed on the base to face the primarydisplay when the lid is in the closed position, the secondary displaycorresponding to an extension of the touchpad extending along a frontedge of the base.

Example 72 includes the portable computer of any one of examples 67-71,wherein the secondary display is to render content associated with anapplication running on the portable computer while the primary displayis turned off.

Example 73 includes the portable computer of any one of examples 67-72,wherein the at least one processor is to activate the primary display inresponse to user interactions with the secondary display while the lidis in the closed position.

Example 74 includes the portable computer of any one of examples 67-73,wherein the at least one processor is to render a primary user interfacevia the primary display when the lid is open, the primary user interfaceassociated with an application executed by the at least one processor,the secondary display to render a secondary user interface associatedwith the application via the secondary display.

Example 75 includes the portable computer of example 74, wherein thesecondary user interface includes user controls for the application.

Example 76 includes the portable computer of example 75, wherein the atleast one processor is to continue to render the secondary userinterface via the secondary display after the lid is returned to theclosed position and the primary display is turned off, the user controlsin the secondary user interface to enable the user to continue tocontrol the application when the lid is in the closed position.

Example 77 includes the portable computer of any one of examples 74-76,wherein the at least one processor includes a first processor to controlrendering of content via the primary display and a second processor tocontrol rendering of content via the secondary display.

Example 78 includes the portable computer of any one of examples 74-77,further including a communications interface to enable wirelesscommunications with a separate device in communication range of theportable computer, the secondary display to render a graphic while thelid is in the closed position, the graphic indicating an option totransfer data between the portable computer and the separate device, thecommunications interface to transfer the data between the portablecomputer and the separate device in response to the user selecting thegraphic on the secondary display while the lid is in the closedposition.

Example 79 includes an apparatus, comprising an audio input analyzer toanalyze a voice command captured by a microphone on a portable computer,the voice command spoken by a person within audible range of themicrophone when a lid of the portable computer is in a closed position,the portable computer including a primary display that is concealed whenthe lid is in the closed position, and a secondary display controller torender content via a secondary display of the portable computer inresponse to the analysis of the voice command, the secondary displaycontroller to render the content on the secondary display while the lidof the portable computer is in the closed position and the primarydisplay is turned off.

Example 80 includes the apparatus of example 79, wherein the secondarydisplay is disposed in a base of the portable computer, the lidrotatable relative to the base about a hinge connecting the lid to thebase.

Example 81 includes the apparatus of example 80, further including a lidcontroller to automatically open the lid in response to the analysis ofthe voice command recognizing the person as an authorized user of theportable computer.

Example 82 includes the apparatus of any one of examples 79-81, whereinthe audio input analyzer is to perform voice recognition analysis of thevoice command without communicating with a remote server.

Example 83 includes the apparatus of example 82, wherein the contentrendered via the secondary display includes personalized informationcorresponding to the person when the audio input analyzer recognizes thevoice command as corresponding to a voice of an authorized user of theportable computer.

Example 84 includes the apparatus of any one of examples 79-83, furtherincluding a login controller to login the person in response to theaudio input analyzer recognizing the person as an authorized user of theportable computer, the login controller to login the person before thelid is moved from the closed position.

Example 85 includes the apparatus of any one of examples 79-84, furtherincluding a camera input analyzer to analyze image data captured by aworld facing camera on the portable computer when the lid is in theclosed position, the world facing camera on a first side of the lid, theprimary display on a second side of the lid opposite the first side.

Example 86 includes the apparatus of example 85, further including ahuman presence sensor to detect a presence of a person nearby theportable computer, the human presence sensor to trigger activation ofthe world facing camera.

Example 87 includes the apparatus of any one of examples 79-86, whereinthe content is first content, and further including a system controllerto determine whether second content is to be rendered via the primarydisplay as part of a response to the voice command, and a primarydisplay controller to activate the primary display while the lid isstill closed and render the second content via the primary display.

Example 88 includes the apparatus of example 87, further including a lidcontroller to automatically move the lid to an open position in responseto the voice command.

Example 89 includes the apparatus of any one of examples 79-88, furtherincluding a communications interface to receive a push notification froma device separate from the portable computer while the lid is in theclosed position, the secondary display controller to render a graphic onthe secondary display while the lid is in the closed position, thegraphic including an option for a user to respond to the pushnotification.

Example 90 includes the apparatus of example 89, wherein the pushnotification corresponds to the device sharing data with the portablecomputer.

Example 91 includes the apparatus of any one of examples 79-90, furtherincluding a touch-based input analyzer to analyze user interactions withthe secondary display detected by a touch sensor associated with thesecondary display.

Example 92 includes the apparatus of example 91, wherein the touchsensor is associated with a touchpad disposed on a base of the portablecomputer, the secondary display corresponding to an extension of thetouchpad, the secondary display to extend along a front edge of the baseto be visible when the lid is in the closed position.

Example 93 includes the apparatus of any one of examples 79-92, furtherincluding a primary display controller to render a primary userinterface via the primary display when the lid is open and the primarydisplay is powered, the primary user interface associated with anapplication running on the portable computer, the secondary display torender a secondary user interface associated with the application viathe secondary display.

Example 94 includes the apparatus of example 93, wherein the secondaryuser interface includes controls to enable a user to operate theapplication, the primary display controller to update the primary userinterface based on user interactions with the controls in the secondaryuser interface.

Example 95 includes the apparatus of example 94, wherein the secondarydisplay controller is to continue to render the secondary user interfacevia the secondary display after the lid is returned to the closedposition and the primary display is turned off, the controls in thesecondary user interface to enable the user to continue to operate theapplication when the lid is in the closed position.

Example 96 includes the apparatus of any one of examples 93-95, whereinthe primary display controller is implemented with a first processor andthe secondary display controller is implemented with a second processor.

Example 97 includes the apparatus of example 96, wherein the secondprocessor consumes less power than the first processor.

Although certain example methods, apparatus and articles of manufacturehave been disclosed herein, the scope of coverage of this patent is notlimited thereto. On the contrary, this patent covers all methods,apparatus and articles of manufacture fairly falling within the scope ofthe claims of this patent.

What is claimed is:
 1. A portable compute device comprising: amicrophone; a speaker; a first camera to face a first direction; asecond camera to face a second direction, the second direction oppositethe first direction; communications circuitry; a first display; a seconddisplay separate from the first display; a hinge to enable the firstdisplay to rotate relative to the second display between an openposition and a closed position, at least a portion of the second displaycapable of being visible when the first display is rotated about thehinge to the closed position, the portion of the second display to bemultiple times longer in a third direction than in a fourth directionperpendicular to the third direction, the third direction extendingparallel to an axis of rotation of the hinge; memory; and processorcircuitry.
 2. The portable compute device of claim 1, further includinginstructions, the processor circuitry to execute the instructions tocause display of information on the portion of the second display whenthe first display is in the closed position, the information to indicatea time of day.
 3. The portable compute device of claim 2, wherein theinformation is first information and the processor circuitry is to causedisplay of second information on the portion of the second display whenthe first display is in the closed position, the second informationdifferent than the first information.
 4. The portable compute device ofclaim 3, wherein the second information indicates a battery levelassociated with the compute device.
 5. The portable compute device ofclaim 3, wherein the second information indicates an incoming call. 6.The portable compute device of claim 3, wherein the communicationcircuitry is to receive a push notification from a second device whilethe first display is in the closed position, the second device separatefrom the compute device, the processor circuitry to cause the display ofthe second information in response to the receipt of the pushnotification, the second information to indicate the receipt of the pushnotification.
 7. The portable compute device of claim 3, wherein theportion of the second display is an extension of a touch sensitivesurface, the touch sensitive surface to face toward and be at leastpartially covered by the first display when the first display is in theclosed position.
 8. The portable compute device of claim 7, wherein theportion of the second display is to extend away from the touch sensitivesurface in a direction that is nonplanar to the touch sensitive surface.9. A foldable compute device comprising: a microphone; a speaker; afirst camera on a first side of a housing; a second camera on a secondside of the housing, the second side opposite the first side;communications circuitry; a display screen; a touch display separatefrom the display screen; a hinge to enable the compute device to befolded about an axis of rotation into different positions, a firstposition corresponding to an open position and second positioncorresponding to a closed position, at least a portion of the touchdisplay visible while the compute device is in the closed position, theportion of the touch display to be multiple times longer in a firstdirection than in a second direction perpendicular to the firstdirection, the first direction extending parallel to the axis ofrotation; memory; and processor circuitry.
 10. The foldable computedevice of claim 9, further including instructions, the processorcircuitry to execute the instructions to cause presentation ofinformation on the portion of the touch display with the compute devicein the closed position, the information to indicate a time of day. 11.The foldable compute device of claim 10, wherein the information isfirst information and the processor circuitry is to cause presentationof second information on the portion of the touch display with thecompute device in the closed position, the second information differentthan the first information.
 12. The foldable compute device of claim 11,wherein the second information indicates a battery level associated withthe compute device.
 13. The foldable compute device of claim 11, whereinthe second information indicates an incoming call.
 14. The foldablecompute device of claim 11, wherein the communication circuitry is toreceive a push notification from a second device with the compute devicein the closed position, the second device separate from the computedevice, the processor circuitry to cause the presentation of the secondinformation in response to the receipt of the push notification, thesecond information to indicate the receipt of the push notification. 15.The foldable compute device of claim 11, wherein the touch displayincludes a touch pad and a display area, the display area is anextension of the touch pad, the portion of the touch display correspondsto the display area, the touch pad to face toward and be at leastpartially covered by the display screen with the compute device in theclosed position.
 16. The foldable compute device of claim 15, whereinthe display area of the touch display is to extend away from the touchpad in a direction that is nonplanar to the touch pad.
 17. An apparatuscomprising: a housing including different first and second parts; meansfor sensing audio; means for generating audio; first means for capturingan image; second means for capturing an image, both the first and secondimage capturing means to be on opposite sides of one of the first partof the housing or the second part of the housing; means forcommunicating; first means for displaying information, the firstdisplaying means carried by the first part of the housing; second meansfor displaying information, the second displaying means carried by thesecond part of the housing; a hinge for rotatably coupling the firstpart of the housing to the second part of the housing to enable theapparatus to be adjusted between an open position and a closed position,the first and second parts of the housing to extend alongside oneanother while the apparatus is in the closed position, the first andsecond parts of the housing to extend away from one another while theapparatus is in the open position, at least a portion of the seconddisplaying means to remain visible while the apparatus is adjusted tothe closed position, the portion of the second displaying means to bemultiple times longer in a first direction than in a second directionperpendicular to the first direction, the first direction extendingparallel to an axis of rotation of the hinge; means for storing data;and means for processing.
 18. The apparatus of claim 17, furtherincluding instructions, the processing means to execute the instructionsto cause information to be rendered on the portion of the seconddisplaying means while the apparatus is adjusted to the closed position,the information to indicate a time of day.
 19. The apparatus of claim18, wherein the information is first information and the processingmeans is to cause second information to be rendered on the portion ofthe second displaying means while the apparatus is in the closedposition, the second information different than the first information.20. The apparatus of claim 19, wherein the second information indicatesa charge level.
 21. The apparatus of claim 19, wherein the secondinformation indicates an incoming call.
 22. The apparatus of claim 19,wherein the communicating means is to receive a push notification from adevice while the apparatus is in the closed position, the deviceseparate from the apparatus, the processing means to cause the secondinformation to be rendered in response to the receipt of the pushnotification, the second information to indicate the receipt of the pushnotification.
 23. The apparatus of claim 19, wherein the portion of thesecond displaying means is an extension of a means for sensing touch,the touch sensing means to face toward and be at least partially coveredby the first displaying means while the apparatus is adjusted to theclosed position.
 24. The apparatus of claim 23, wherein the portion ofthe second displaying means is to extend away from the touch sensingmeans in a direction that is nonplanar to the touch sensing means.