Using a light source to temporarily saturate a camera sensor of a camera connected to a computer

ABSTRACT

In some examples, a computing system may include a computing device, a display device, and a camera. The computing device includes a processor and a memory. The display device may be (1) separate from and electronically connected to the computing device or (2) integrated into the computing device. A camera may be connected to the computing device. The camera may be (1) a standalone device or (2) integrated into the display device. The camera may include a lens, a sensor, and a light source. For example, the light source may be a light emitting diode (LED) or an organic LED (OLED). Providing power to the light source causes the light source to emit an amount of light sufficient to saturate the imaging sensor such that if the camera is accessed by an unauthorized user, the image data from the saturated sensor is distorted and unusable to obtain account-related data.

BACKGROUND OF THE INVENTION Field of the Invention

This invention relates generally to a computing device to which a camerais connected and, more particularly, to using a light source to saturatea sensor in the camera as security against a third party (e.g., hacker)hijacking the camera. Even if the third party is able to hijack thecamera, the image data provided by the saturated sensor may be unusable.

Description of the Related Art

As the value and use of information continues to increase, individualsand businesses seek additional ways to process and store information.One option available to users is information handling systems (e.g.,computing devices or computing systems). An information handling systemgenerally processes, compiles, stores, and/or communicates informationor data for business, personal, or other purposes thereby allowing usersto take advantage of the value of the information. Because technologyand information handling needs and requirements vary between differentusers or applications, information handling systems may also varyregarding what information is handled, how the information is handled,how much information is processed, stored, or communicated, and howquickly and efficiently the information may be processed, stored, orcommunicated. The variations in information handling systems allow forinformation handling systems to be general or configured for a specificuser or specific use such as financial transaction processing, airlinereservations, enterprise data storage, or global communications. Inaddition, information handling systems may include a variety of hardwareand software components that may be configured to process, store, andcommunicate information and may include one or more computer systems,data storage systems, and networking systems.

Many computer users employ a camera for applications, such asvideoconferencing. To facilitate such applications, many computingdevices, such as laptop computing devices, tablet computing devices, andwireless phones, integrate at least one (e.g., forward-facing) cameraand sometimes two (e.g., forward-facing and rear-facing) cameras. Inaddition, users of a desktop computing device may connect an externalcamera suitable for applications such as videoconferencing.

A major concern for a user of a computing device that has a cameraconnected to the computing device, is camera security and privacybecause such cameras can be easily hijacked by an unknown party, such asa hacker. For example, a hacker may remotely hijack a camera of acomputing device to view confidential information (e.g., the user's username and password) or to surreptitiously captures images (e.g.,photographs or video) of the user in a potentially compromisingsituation. Because of how easily cameras connected to a computing devicecan be hijacked, many users take security precautions when the users arenot using the camera. For example, the security precautions may preventhackers from viewing or recording information even if the hackers manageto hijack the camera. However, these security precautions are typicallycrude, such as manually placing an opaque sticker over the camera. Inaddition, such solutions rely on the user remembering to manuallyperform the security precaution. If the user forgets to take thesecurity precaution, e.g., because the user is pressed for time etc.,then the user's camera may be vulnerable to being hijacked.

SUMMARY OF THE INVENTION

This Summary provides a simplified form of concepts that are furtherdescribed below in the Detailed Description. This Summary is notintended to identify key or essential features and should therefore notbe used for determining or limiting the scope of the claimed subjectmatter.

In some examples, a computing system may include a computing device, adisplay device, and a camera. The computing device includes a processorand a memory. The display device may be (1) separate from andelectronically connected to the computing device or (2) integrated intothe computing device. A camera may be connected to the computing device.The camera may be (1) a standalone device or (2) integrated into thedisplay device. The camera may include a lens, a sensor, and a lightsource. For example, the light source may be a light emitting diode(LED) or an organic LED (OLED). Providing power to the light sourcecauses the light source to emit an amount of light sufficient tosaturate the imaging sensor such that if the camera is accessed by anunauthorized user, the image data from the saturated sensor is distortedand unusable to obtain account-related data.

BRIEF DESCRIPTION OF THE DRAWINGS

A more complete understanding of the present disclosure may be obtainedby reference to the following Detailed Description when taken inconjunction with the accompanying Drawings. In the figures, theleft-most digit(s) of a reference number identifies the figure in whichthe reference number first appears. The same reference numbers indifferent figures indicate similar or identical items.

FIG. 1 is a block diagram of a computing system that includes a displaydevice, a camera, and a light source according to some embodiments.

FIG. 2 is a block diagram of an architecture of a computing device thatincludes an organic light emitting diode (LED) according to someembodiments.

FIG. 3 is a block diagram of a display device that includes an OLED filmplaced over a camera lens according to some embodiments.

FIG. 4 is a block diagram of a display device that includes an OLED filmplaced around a camera lens according to some embodiments.

FIG. 5 is a block diagram of a camera lens integrated into a bezel of adisplay device according to some embodiments.

FIG. 6 is a block diagram of a camera lens integrated into a displaydevice according to some embodiments.

FIG. 7 is a block diagram of a camera that includes an OLED film andthat is connected to a computing device according to some embodiments.

FIG. 8 is a block diagram illustrating an OLED sheet according to someembodiments.

FIG. 9 is a block diagram illustrating layers of an OLED stack accordingto some embodiments.

FIG. 10 illustrates an example configuration of a computing device thatcan be used to implement the systems and techniques described herein.

FIG. 11 is a flowchart of a login process according to some embodiments.

FIG. 12 is a flowchart of a process that includes launching anapplication according to some embodiments.

DETAILED DESCRIPTION

For purposes of this disclosure, an information handling system mayinclude any instrumentality or aggregate of instrumentalities operableto compute, calculate, determine, classify, process, transmit, receive,retrieve, originate, switch, store, display, communicate, manifest,detect, record, reproduce, handle, or utilize any form of information,intelligence, or data for business, scientific, control, or otherpurposes. For example, an information handling system may be a personalcomputer (e.g., desktop or laptop), tablet computer, mobile device(e.g., personal digital assistant (PDA) or smart phone), server (e.g.,blade server or rack server), a network storage device, or any othersuitable device and may vary in size, shape, performance, functionality,and price. The information handling system may include random accessmemory (RAM), one or more processing resources such as a centralprocessing unit (CPU) or hardware or software control logic, ROM, and/orother types of nonvolatile memory. Additional components of theinformation handling system may include one or more disk drives, one ormore network ports for communicating with external devices as well asvarious input and output (I/O) devices, such as a keyboard, a mouse,touchscreen and/or video display. The information handling system mayalso include one or more buses operable to transmit communicationsbetween the various hardware components.

The systems and techniques described herein may use a light source tosaturate a sensor of a camera that is integrated into (or connected to)a computing device. Saturating the camera sensor may provide a securityfeature that prevents a hacker from discerning meaningful informationfrom image data provided by the overloaded sensor even if the hacker isable to hijack the camera. The sensor may be saturated sufficiently thatimage data provided by the sensor is undecipherable. For example, whensaturated, the image data may be a snow-like pattern, a monochrome image(e.g., a white image, a black image, or the like), or undecipherableshapes. The saturation is sufficient to prevent a hacker viewing theimage data from the hijacked camera from viewing or capturing any usableinformation. For example, the hacker viewing the image data from thesaturated sensor may be unable to discern what action(s) the user isperforming and may therefore be unable to view passwords or otherconfidential information that the user is entering. Similarly, thehacker may be unable to capture viewable images or video of the user ina potentially compromising situation. When the camera's sensor issaturated, images or video captured by the hijacked camera may onlyinclude unrecognizable shapes.

The light from the light source may include visible spectrum light toenable the user to visually confirm that the security feature (e.g.,saturating the camera sensor) is on. For example, when the securityfeature is on, the user may see a color (e.g., red, green, white, oranother color) indicator that indicates that the light source iscurrently on and saturating the camera sensor. Thus, if the user desiresto turn off the security feature (e.g., to use the camera), the user canvisually confirm that the security feature has been turned off byobserving that the color indicator is no longer visible. In some cases,the light source may emit both visible spectrum and light spectrum(e.g., infrared, ultraviolet, or the like) that is not visible to thehuman eye. For example, the visible spectrum portion of the light fromthe light source may provide the color indicator indicating that thesecurity feature is enabled and the non-visible spectrum portion of thelight from the light source, in combination with the visible light, besufficient to saturate the camera sensor.

The camera may be integrated into a computing device (e.g., a tablet, aphone, a laptop, or the like) or the camera may be a standalone devicethat is connected to the computing device (e.g., a desktop computingdevice or a laptop computing device that does not have an integratedcamera).

In some cases, a light pipe (or similar mechanism) may take light from alight source, such as a light emitting diode (LED) or the like, andcarry the light to a lens of the camera to saturate the camera sensor.In other cases, an organic LED (OLED) may be applied over or around thecamera lens to saturate the camera sensor. For example, a thin (0.2 mmor less) OLED film may be applied over (e.g., on top of) the cameralens. Alternately, if the OLED film adversely affects the image quality,the OLED film may include an opening through which the camera lensprotrudes. In this way, the OLED film does not affect the image qualityof the lens. Applying power to the OLED film may cause the OLED film toemit sufficient light as to saturate the camera sensor. The lightemitted by the OLED film may provide the user with a visual indicatorthat the security feature (e.g., saturating the camera sensor) has beenenabled.

In some cases, the OLED film may be manufactured with capacitive touchproperties. For example, the user may touch the OLED film to turn thesecurity on or off. To illustrate, when the OLED film is not emittinglight, the user may touch the OLED film, causing power to be provided tothe OLED film, causing the OLED film to emit light (e.g. securityfeature is on). When the OLED film is emitting light, the user may touchthe OLED film to stop power from being provided to the OLED film,thereby causing the OLED film to no longer emit light (e.g. securityfeature is off).

The security feature may be turned on and off manually by the user orautomatically by software applications. For example, the user may use anapplication (e.g., a control panel) to manually turn the securityfeature on or off. In addition, the security feature may beautomatically (e.g., without human interaction) controlled by softwareapplications. For example, during a login process, the operating systemmay automatically (e.g., without human interaction) disable the securityfeature to enable the camera to be used for login using a facialrecognition application (e.g., Microsoft® Windows® Hello, Intel®RealSense®, or the like). For example, during the login, one or moreimages of the user who has powered on the computing device may becaptured and the captured images compared to one or more previouslystored images. If the captured images differ from the stored images byless than a predetermined amount, the user is logged in, otherwise theuser is not allowed to login using facial recognition. After the loginis completed, the operating system may check a settings file and thenset the security feature on or off based on the settings file. Forexample, if the settings file indicates that the security feature is tobe on (e.g., default setting) then, after the login process has beencompleted, the operating system may automatically turn the securityfeature on. When the user starts a type of application that uses thecamera (e.g., a videoconferencing application, an image captureapplication used to capture photos or videos using the camera, or thelike), the application may automatically (e.g., without humaninteraction) turn off the security feature.

The settings file may include one or more of a default setting, a userspecified setting, or an override setting. The default setting may be asetting that is used when neither a user specified setting nor anoverride setting is present in the settings file. The user specifiedsetting may be a setting that the user specifies. For example, a userwho is concerned about security may set the user setting to “securityfeature on” such that the security feature is on except when turned offby the operating system (e.g., during login) or by an application, suchas a video conferencing or image capture application. The overridesetting may be a setting specified by an information technology (IT)department of an enterprise (e.g., company) and used for computingdevices provided to employees by the enterprise. For example, theenterprise may specify an override setting that the security featureremain on except when the camera is used for corporatevideoconferencing. As another example, the enterprise may specify anoverride setting that the security feature remain on in certainlocations. The operating system may use a global positioning satellite(GPS) sensor or other mechanism built in to the computing device todetermine a location of the computing device. The settings file mayidentify locations (e.g., where confidential information that should notbe made public is present) where the security feature is to be on andwhere the user is unable to manually turn off the security feature. Forexample, the override settings may turn the security feature on (andprevent the user and applications from turning off the security feature)in a research lab where intellectual property is being developed orwhere other confidential information is present. After the user exitsthe research lab and goes to a meeting room, the user may manually turnoff the security feature or launch an application that turns off thesecurity feature. In this way, the enterprise may (i) protect againstindustrial espionage, (ii) prevent others (e.g., hackers) from learningaccess codes to the enterprise's internal systems and networks.

In a first example, a computing system may include (i) a computingdevice, (ii) a display device, and (iii) a camera. The computing devicemay include a processor and a memory. The camera may include (i) a lightsource, (ii) a lens, and (iii) an imaging sensor. Providing power to thelight source may cause the light source to emit an amount of lightsufficient to saturate the imaging sensor. Image data provided by thesaturated imaging sensor may include unrecognizable information and maytherefore be unusable. The light source may be a light emitting diode(LED), an organic LED (OLED) film, or another type of light source. Insome cases, the OLED film may be geometrically shaped (e.g., circle,square, triangle, or the like) and placed over the lens. In other cases,the OLED film may be geometrically shaped and include an opening (e.g.,a hole) through which the lens protrudes, enabling the OLED film to beplaced around the lens. A thickness of the OLED film may be 0.2millimeters or less. In some cases, the OLED film may have a capacitivesensing property such that touching the OLED film may cause the OLEDfilm to transition (i) from an on state to an off state when the OLEDfilm is emitting light or (ii) from an off state to an on state when theOLED film is not emitting light. If the light source is not an OLEDfilm, a light pipe may be used to transport light from the light source(e.g., LED) to a location that is sufficiently near the lens to causethe sensor to be saturated when the light source is emitting light. Insome cases, the camera may be a standalone device that is connected tothe computing device. In other cases, the camera may be either (i)integrated into a bezel of the display device or (ii) integrated into adisplay surface of the display device.

In a second example, a computing device may include a processor, amemory storing computer executable instructions (e.g., an operatingsystem and one or more applications) and data (e.g., one or moresettings), a display device, and a camera. The camera may include alens, an imaging sensor, and an OLED film. Providing power to the OLEDfilm may cause the OLED film to emit an amount of light sufficient tosaturate the imaging sensor. Image data provided by the saturatedimaging sensor may include unrecognizable information that is unusablefor any purpose. For example, someone (e.g., a hacker) viewing the imagedata is not able to identify account information (e.g., username andpassword) or other sensitive/confidential information from the imagedata. The operating system may temporarily prevent power from beingprovided to the OLED film during a login process to enable the loginprocess to use the camera to perform facial recognition. For example, afacial recognition login process (e.g., part of the operating system)may capture one or more current images of the user and compare thecurrent images with one or more previously stored images of the user. Ifthe current images differ from the previously stored images by less thana threshold amount, the user may be logged in by the operating system.If the current images differ from the previously stored images by atleast the threshold amount, the user may not be logged in using facialrecognition. After the login process is complete, the operating systemmay access a settings file and provide (or stop providing) power to theOLED film based at least in part on one or more settings in the settingsfile. For example, the settings file may include at least one of thefollowing settings: (i) an override setting that specifies one or moreconditions that, when satisfied, cause the operating system to providethe power to the OLED film, (ii) a user setting that specifies when toapply the power to the OLED film, wherein when the override setting isincluded in the settings file, the override setting is used by theoperating system instead of the user setting to determine when toprovide the power to the OLED file, or (iii) a default setting thatspecifies when to apply the power to the OLED film when the settingsfile does not include (i) the user settings and (ii) the overridesettings. As another example, the override setting may includeconditions, such as particular locations, where the OLED film is not tobe provided power to enable the camera to be used for applications thatuse the camera. The one or more applications may include at least one ofa video conferencing application or an image capture application and maybe capable of instructing the operating system to stop providing powerto the OLED film to enable the applications to use the camera toparticipate in a video conference, view or capture image data, or thelike. The OLED film may be geometrically shaped and may be placed overor around the lens. In some cases, the OLED film has a capacitivesensing property such that touching the OLED film causes the OLED filmto change from a first state to a second state. For example, if the OLEDfilm is on (e.g., first state=emitting light), touching the OLED filmmay cause the power to be cut off, causing the OLED film to go off(e.g., second state=stop emitting light). If the OLED film is off (e.g.,first state=not emitting light), touching the OLED film may cause thepower to be provided to the OLED film, causing the OLED film to turn on(e.g., second state=emit light).

In a third example, a computing device may include a processor, amemory, a display device, and a camera. The camera may include a lens,an imaging sensor, and OLED film that, when provided power, emits anamount of light sufficient to saturate the imaging sensor. The lightemitted by the OLED film may provide a visual indication that the lightsource is causing the imaging sensor to be saturated. For example, thelight emitted by the OLED film may include a band of frequencies (e.g.,in the range of about 430 to about 770 terahertz (THz)) that are visibleto a user. In some cases, touching the OLED film may cause a capacitancesensing property of the OLED film to turn the OLED film on (e.g., if theOLED film was previously off) or off (e.g., if the OLED film waspreviously on).

FIG. 1 is a block diagram of a computing system 100 that includes adisplay device, a camera, and a light source according to someembodiments. For example, a computing device 102 may be connected to adisplay device 104. When the computing device 102 comprises a desktopcomputer, the display device 104 may be in a first housing and thecomputing device 102 may be in a second housing that is separate fromthe first housing. In a laptop computer, the display device 104 may bein a first housing and the computing device 102 may be in a secondhousing that is attached to the first housing. In a tablet computer orwireless phone, the display device 104 may be integrated with thecomputing device 102 in a single housing.

The display device 104 may include a camera 106 and a light source 108.In some cases (e.g., depending on the type of the light source 108), alight pipe 110 may be used to carry light emitted by the light source108 to the camera 106. The camera 106 may include a lens 112 and asensor 114 that receives an image (or series of images in the case ofvideo) from the lens 112 and converts the image (or series of images)into digital image data 132 that is sent to the computing device 102 forstorage and/or transmission to another computing device. The camera 106may be integrated into the display device 104 (e.g., as illustrated inFIG. 1) or the camera 106 may be a standalone device that is connected(e.g., using universal serial bus (USB), Bluetooth®, or the like) to thecomputing device 102 (e.g., as illustrated in FIG. 7). While a singlerepresentative camera 106 is illustrated, it should be understood thatthe systems and techniques described herein may be used with a computingdevice to which multiple cameras are connected. For example, in somecases, a tablet computing device or wireless phone may have both afront-facing camera and a rear-facing camera. In such cases, the systemsand techniques described herein to provide security may be used on oneor both cameras.

The computing device 102 may include a central processing unit (CPU)116, a memory 118, an embedded controller 120, and a hardware driver 122(e.g., for the light source 108). The memory 118 may include one or moresettings 124 (e.g., default setting, user setting, override setting, andthe like), one or more software applications (e.g., image captureapplication, videoconferencing application, and the like), and anoperating system 128 (e.g., Windows®, Android®, Linux®, MacOS®, or thelike). The applications 126 and operating system 128 may includesoftware instructions that are executable by the CPU 116. The computingdevice 102 may include one or more additional sensors 130, such as alocation sensor (e.g., Global Positioning Satellite (GPS)), that canprovide information to determine a location of the computing device 102.

The embedded controller 120 may receive instructions from the CPU 116.The instructions may cause the embedded controller 120 to provide powerto the light source 108 causing the light source 108 to emit light andsaturating the sensor 114, thereby preventing a hacker from capturing orviewing useful information from the data 132 if the hacker hijacks thecamera 106. For example, the EC 120 may provide power to the driver 122,causing the light source 108 to emit light. The instructions may causethe embedded controller 120 to stop providing power to the light source108 causing the light source 108 to stop emitting light, therebyenabling use of the camera 106.

The EC 120 may control a security feature that causes the light source108 to emit light (or stop emitting light) near the lens 112. The lightemitted by the light source 108 may be sufficient to saturate the imagesensor 114. Thus, the security feature is enabled (on) when power isprovided to the light source 108, causing the light source 108 to emitenough light to saturate the sensor 114. The security feature isdisabled (off) when power is not provided to the light source 108,causing the light source 108 to not emit light, enabling the sensor 114to provide digital image data for use by the applications 126 or theoperating system 128. Saturating the sensor 114 may provide the securityfeature to prevent a hacker from discerning meaningful information fromthe image data 132 provided by the overloaded sensor 114 even if thehacker is able to hijack the camera 106. The sensor 114 may be saturatedsufficiently that the image data 132 is undecipherable. For example,when saturated, the image data 132 may be a snow-like pattern, amonochrome image (e.g., a white image, a black image, or the like), orundecipherable shapes. The saturation is sufficient to prevent a hackerviewing the image data 132 from the hijacked camera 106 from viewing orcapturing any usable information. For example, the hacker viewing theimage data 132 from the saturated sensor 114 may be unable to discernwhat action(s) the user is performing and may therefore be unable toview passwords or other confidential information that the user isentering. Similarly, the hacker may be unable to capture usable imagesor video of the user in a potentially compromising situation becausewhen the camera's sensor 114 is saturated, the image data 132 capturedby the hijacked camera 106 may only include unrecognizable shapes.

The light emitted by the light source 108 may include visible spectrumlight (e.g., in the range of about 430 to about 770 THz) to enable theuser to visually confirm that the security feature (e.g., saturating thecamera sensor) is on. For example, when the security feature is on, theuser may see a color (e.g., red, green, white, or another color)indicator (e.g., in the light emitted by the light source 108) thatindicates that the light source 108 is currently on and saturating thecamera sensor 114. Thus, if the user desires to turn off the securityfeature (e.g., to use the camera 106), the user can visually confirmthat the security feature has been turned off by observing that thecolor indicator is no longer visible (e.g., because the light source 108is no longer receiving power and therefore no longer emitting light). Insome cases, the light source 108 may emit both visible spectrum andspectrum that is not visible to the human eye, such as infrared (e.g.,from about 430 THz to about 300 gigahertz (Ghz)) or ultraviolet (e.g.,from about 30 petahertz (PHz) to about 750 Thz). For example, thevisible spectrum portion of the light from the light source 108 mayprovide the color indicator indicating that the security feature isenabled and the non-visible spectrum portion of the light from the lightsource 108 may, in combination with the visible light, be sufficient tosaturate the camera sensor 114.

The light source 108 may be one or more light emitting diodes (LED) orthe like. For particular types of light sources, such as LEDs, a lightpipe 110 (or a similar mechanism) may take light from the light source108 and carry the light to the lens 112 to saturate the camera sensor114.

The security feature may be turned on and off manually by the user orautomatically by the operating system 128 and the software applications126. For example, the user may use an application (e.g., a control panelof the applications 126) to manually turn the security feature on oroff. In addition, the security feature may be automatically (e.g.,without human interaction) controlled by the operating system 128 andthe software applications 126. For example, during a login process, theoperating system 128 may automatically (e.g., without human interaction)disable the security feature (e.g., disable power to the light source108 to stop the light source 108 from emitting light) to enable thecamera 106 to be used for login using a facial recognition application(e.g., Microsoft® Windows® Hello, Intel® RealSense®, or the like). Afterthe login is completed, the operating system 128 may check the settings124 and set the security feature on or off based on the settings 124.For example, if the settings 124 indicate that the security feature isto be on (e.g., default setting, user setting, or override setting)then, after the login process has been completed, the operating system128 may automatically turn the security feature on (e.g., provide powerto the light source 108 to cause the light source 108 to emit light andsaturate the sensor 114). When the user starts applications 126 that usethe camera 106 (e.g., a videoconferencing application, an image captureapplication used to capture photos or videos using the camera, or thelike), the applications 126 may automatically (e.g., without humaninteraction) turn off the security feature.

The settings 124 may include one or more of a default setting, a usersetting, an override setting, another type of setting for the securityfeature, or any combination thereof. The settings may be appliedhierarchically. For example, the override setting may take precedenceover the user setting and the default setting, and the user setting maytake precedence over the default setting. The default setting for thesecurity feature may be a setting that is used when neither a usersetting nor an override setting are present in the settings file. Theuser setting may be a setting that the user specifies and may be usedwhen an override setting is not present in the settings file. The usersetting may be used even if a default setting is present. For example, auser who is concerned about security may set the user setting to“security feature on” such that the security feature is on except whenturned off by the operating system (e.g., during login) or by anapplication, such as a video conferencing or image capture application.The override setting may be a setting specified by an informationtechnology (IT) department of an enterprise (e.g., company) and used forcomputing devices provided to employees by the enterprise. For example,the enterprise may specify an override setting that the security featureremain on except when the camera 106 is used for corporatevideoconferencing. As another example, the enterprise may specify anoverride setting that the security feature remain on in certainlocations. The operating system 128 may use one of the additionalsensors 130 (e.g., a global positioning satellite (GPS) sensor) todetermine a location of the computing device 102. The settings 124 mayidentify locations (e.g., where confidential information that should notbe made public is present) where the security feature is to be turned onand where the user is unable to manually turn off the security feature.In some cases, the operating system 128, the applications 126, or bothmay be unable to turn off the security feature. For example, theoverride settings may turn the security feature on and may prevent theuser, the operating system 128, and the applications 126 from turningoff the security feature in a particular location, such as a researchlab where intellectual property is being developed or where otherconfidential information is present. After the user exits the researchlab and goes to a meeting room, the user may manually turn off thesecurity feature or launch an application that turns off the securityfeature. In this way, the enterprise may (i) protect against industrialespionage, (ii) prevent others (e.g., hackers) from learning accesscodes to the enterprise's internal systems and networks.

In some cases, the override settings may be located in a firmware (e.g.,basic input output system (BIOS)) or a hardware component (e.g., inread-only memory) of the computing device 102 to prevent the overridesettings from being modified or deleted. In other cases, the overridesettings may be located in the memory 118 and may have access privilegesset such that the override settings are read-only to prevent theoverride settings from being modified or deleted.

Thus, a light source (e.g., LED or the like) may be placed near a lensof a camera that is integrated into a display device connected to (orintegrated into) a computing device. A security feature, when turned on,may provide power to the light source, causing the light source to emitlight. The amount of light that is emitted by the light source maysaturate a sensor of the camera. The security feature, when turned on,may prevent a hacker who has hijacked the camera from viewing orcapturing any data that is useful to the hacker. For example, the hackermay be unable to identify passwords from data provided by the camera andmay be unable to capture compromising images of the user due to thelight saturating the camera sensor. At least some of the light that isemitted may include a light spectrum that is visible to the human eye,thereby providing the user with a visual indicator that indicates whenthe security feature is on and when the security feature is off.

FIG. 2 is a block diagram of an architecture 200 of a computing devicethat includes an organic light emitting diode (LED) according to someembodiments. FIG. 2 illustrates a variation of the architecture 100 ofFIG. 1 in which the light source 108 of FIG. 1 comprises an OLED film202. The OLED film 202 may be applied over or around the lens 112.Therefore, when the OLED film 202 is used, the light pipe 110 of FIG. 1may not be used. In FIG. 2, the driver 122 of FIG. 1 may comprise anOLED driver 204.

The OLED film 202 may be applied over or around the lens 112. Forexample, if applying the OLED film 202 over the lens 112 does notdiscernably or measurably degrade an image quality of the data 132, thenthe OLED film 202 may be applied over the lens 112. Discernably means auser is unable to see a difference between a first image taken when theOLED film 202 is not applied and a second image taken when the OLED film202 is applied. Measurably means a first image taken when the OLED film202 is not applied may be determined to differ from a second image takenwhen the OLED film 202 is applied by less than a predetermined amount.If applying the OLED film 202 over the lens 112 discernably ormeasurably degrades the image quality of the data 132, then the OLEDfilm 202 may be applied around the lens 112. For example, a circularshaped (or other geometrically shaped) OLED film 202, with an opening(e.g., a hole) in the middle to accommodate the lens 112, may beapplied.

In some cases, the OLED film 202 may be manufactured with capacitivetouch properties, enabling the user to touch the OLED film 202 to turnthe security on or off. To illustrate, when the OLED film 202 is notemitting light, the user may touch the OLED film 202, causing power tobe provided to the OLED film 202, causing the OLED film 202 to emitlight (e.g. security feature is on). When the OLED film 202 is emittinglight, the user may touch the OLED film 202 to stop power from beingprovided to the OLED film 202, thereby causing the OLED film 202 to stopemitting light (e.g. security feature is off).

The security feature, the settings 114, and other operations of thecomputing device 102 and the display device 104 operate in FIG. 2 aspreviously described in FIG. 1.

Thus, an OLED film may be applied over or around a lens of a camera thatis integrated into a display device connected to (or integrated into) acomputing device. A security feature, when turned on, may provide powerto the light source (e.g., OLED film), causing the light source to emitlight. The amount of light that is emitted by the light source maysaturate a sensor of the camera. The security feature, when turned on,may prevent a hacker who has hijacked the camera from viewing orcapturing any data that is useful to the hacker. For example, the hackermay be unable to identify passwords from data provided by the camera andmay be unable to capture compromising images of the user due to thelight saturating the camera sensor. At least some of the light that isemitted may include a light spectrum that is visible to the human eye,thereby providing the user with a visual indicator that indicates whenthe security feature is on and when the security feature is off.

FIG. 3 is a block diagram 300 of a display device that includes an OLEDfilm placed over a camera lens according to some embodiments. A sideview of the display device 104 is illustrated in the top half of FIG. 3and a front view of the display device 104 is illustrated in the bottomhalf of FIG. 3. The OLED film 202 may be no more than 0.2 millimeters(mm) thick. The OLED film 202 may be applied over (e.g., on top of) thelens 112 if the OLED film 202 does not observably or measurably degradethe image data provided by the sensor 114 when the security feature isoff.

The display device 104 may include a surface 302, such as a bezel of thedisplay device 104 or a glass (or clear plastic) of the display device104. If the surface 302 is a bezel of the display device 104, thesurface 302 may have an opening (e.g., a hole) through which the lens112 passes (e.g., as illustrated by the solid line of lens 112 in FIG.2). If the surface 302 is a transparent material, such as glass or clearplastic, the lens 112 may be located just below the surface 302 (asillustrated by the dashed line of lens 112 in FIG. 2).

The OLED film 202 may be applied over the lens 112, as illustrated inthe front view in the bottom of FIG. 3. For example, the OLED 202 may begeometrically shaped, such as the circular shape shown in FIG. 3. TheOLED 202 may have a diameter that is at least the same or greater thanthe diameter of the lens 112. After applying the OLED 202, the lens 112is completed covered by (e.g., is underneath) the OLED film 202.

FIG. 4 is a block diagram of a display device that includes an OLED filmplaced around a camera lens according to some embodiments. A side viewof the display device 104 is illustrated in the top half of FIG. 4 and afront view of the display device 104 is illustrated in the bottom halfof FIG. 4. The OLED film 202 may be no more than 0.2 millimeters (mm)thick. The OLED film 202 may be applied around the lens 112 if the OLEDfilm 202 observably or measurably degrades the image data provided bythe sensor 114 when the security feature is off.

The display device 104 may include the surface 302, such as a bezel ofthe display device 104 or a glass (or clear plastic) of the displaydevice 104. The OLED film 202 may be applied around the lens 112, asillustrated in the front view in the bottom of FIG. 3. For example, theOLED film 202 may be geometrically shaped, such as the toroidal(“doughnut”) shape, e.g., a circle with a circular opening in themiddle, shown in FIG. 3. The OLED film 202 may have a diameter that isgreater than the diameter of the lens 112 and may include an opening inthe OLED film 202 through which the lens 112 protrudes. The diameter ofthe opening in the OLED film 202 may be approximately the same lengthand width as the lens 112 to enable the lens to protrude through theOLED film 112. After applying the OLED film 202, the lens 112 protrudesthrough and is surrounded (but not covered) by the OLED film 202.

FIG. 5 is a block diagram 500 of a camera lens integrated into a bezelof a display device according to some embodiments. FIG. 5 illustrateshow the lens 112 may protrude through a bezel 502 of the display device104 (e.g., when the computing device 102 is a tablet or mobile phone).The OLED film 202 may be placed over (e.g., as show in in FIG. 3) oraround (e.g., as shown in FIG. 4) the lens 112. The bezel 502 may framea display surface 504 of the display device 104.

FIG. 6 is a block diagram 600 of a camera lens integrated into a displaydevice according to some embodiments. FIG. 6 illustrates how the lens112 may be located in (e.g., integrated into) the display surface 504(e.g., glass or clear plastic) of the display device 104. The lens 112may be located below the display surface 504 of the display device 104or the display surface 504 may have a, opening (e.g., hole) throughwhich the lens 112 protrudes. The OLED film 202 may be placed over(e.g., as show in in FIG. 3) or around (e.g., as shown in FIG. 4) thelens 112.

FIG. 7 is a block diagram 700 of a camera that includes an OLED film andthat is connected to a computing device according to some embodiments.FIG. 7 illustrates a standalone version of the camera 106 that isconnected to the display device 104 (or the computing device 102). Insome cases, the camera 106 may be wirelessly connected (e.g.,Bluetooth®, ZigBee® or other wireless data transfer protocol) to thedisplay device 104 (or the computing device 102). In other cases, thecamera 106 may be connected to a port 702 of the display device 104 (orthe computing device 102) via a cable 704 (e.g., USB or othercable-based data transfer protocol). The OLED film 202 may be placedover the lens 112 (e.g., as show in in FIG. 3) or around the lens 112(e.g., as shown in FIG. 4).

FIG. 8 is a block diagram illustrating an OLED film according to someembodiments. For example, the OLED film 202 may include several layers,including a top moisture barrier 802, an OLED stack 804, a bottommoisture barrier 806, and plastic (e.g., polyethylene naphthalate orsimilar) 808. The total width of the OLED sheet 202 may be 0.2 mm orless. The OLED stack 804 may be about 100-200 nanometers (nm) in width.

The moisture barriers 802, 806 may be made of plastic (e.g.,polyethylene or the like), polymer-based barrier, atomic layerdeposition (ALD), or another type of moisture barrier suitable for OLED.The light emitted by the OLED stack 804 may travel through the bottommoisture barrier 806 and the plastic 808. The plastic 808 may betransparent or translucent to enable the light from the OLED stack 804to be transmitted through the plastic 808.

FIG. 9 is a block diagram illustrating layers of an OLED stack accordingto some embodiments. The OLED stack 804 may be between about 100 toabout 200 nanometers (nm) in width and may include a cathode (e.g.,negative terminal) 902, an electron injection layer 904, a hole blockinglayer 906, an emissive layer 908, an electron blocking layer 910, a holeinjection layer 912, and an anode (e.g., positive terminal) 914. Thecathode 902 may inject electrons into the emissive layer 908. The anode914 may remove electrons.

Power (e.g., direct current) is provided to the OLED stack 804 via theanode 914 and cathode 902. After power is applied, the cathode 902receives electrons from the power source and the anode removes them. Theadded electrons cause the emissive layer 908 to be negatively charged(similar to an n-type layer in a junction diode), while the conductivelayers (the layers 910, 912) become positively charged (similar top-type material). Positive holes jump boundary from the conductive layer(e.g., layers 904, 906) to the emissive layer 908. When a positive hole(a lack of an electron) meets an electron, the two cancel each otherout, thereby releasing a brief burst of electromagnetic energy in theform of light (e.g., a photon). This process of a positive hole meetingan electron occurs many times a second, causing the OLED stack 804 toproduce light when power is being applied to the cathode 902 and theanode 914.

FIG. 10 illustrates an example configuration of the computing device 102of FIG. 1 that can be used to implement the systems and techniquesdescribed herein. The computing device 102 may include one or moreprocessors 1002 (e.g., the CPU 116 of FIG. 1, graphics processing unit(GPU), and the like), the memory 118, communication interfaces 1006(e.g., Ethernet, Wi-Fi, and the like), the display device 104 (which, insome cases, may be connected to but separate from the computing device102), input devices 1010 (e.g., keyboard), other input/output (I/O)devices 1012 (e.g., additional sensors 130, such as a location (e.g.,GPS) sensor), and mass storage devices 1014, configured to communicatewith each other, such as via one or more system buses 1016 or othersuitable connections. While a single system bus is illustrated for easeof understanding, it should be understood that the system buses 1016 mayinclude multiple buses, such as a memory device bus, a storage devicebus (e.g., serial ATA (SATA) and the like), data buses (e.g., universalserial bus (USB) and the like), video signal buses (e.g., ThunderBolt®,DVI, HDMI, and the like), power buses, etc.

The processors 1002 are one or more hardware devices that may include asingle processing unit or a number of processing units, all of which mayinclude single or multiple computing units or multiple cores. Theprocessors 1002 may be implemented as one or more microprocessors,microcomputers, microcontrollers, digital signal processors, centralprocessing units, graphics processing units, state machines, logiccircuitries, and/or any hardware device that can manipulate signalsbased on operational instructions. Among other capabilities, theprocessors 1002 may be configured to fetch and execute computer-readableinstructions stored in the memory 118, mass storage devices 1014, orother computer-readable media.

Memory 118 and mass storage devices 1014 are examples of computerstorage media (e.g., memory storage devices) for storing instructionsthat can be executed by the processors 1002 to perform the variousfunctions described herein. For example, memory 118 may include bothvolatile memory and non-volatile memory (e.g., RAM, ROM, or the like)devices. Further, mass storage devices 1014 may include hard diskdrives, solid-state drives, removable media, including external andremovable drives, memory cards, flash memory, floppy disks, opticaldisks (e.g., CD, DVD), a storage array, a network attached storage, astorage area network, or the like. Both memory 118 and mass storagedevices 1014 may be collectively referred to as memory or computerstorage media herein, and may be any type of non-transitory mediacapable of storing computer-readable, processor-executable programinstructions as computer program code that can be executed by theprocessors 1002 as a particular machine configured for carrying out theoperations and functions described in the implementations herein.

The computing device 102 may also include one or more communicationinterfaces 1006 for exchanging data via a network. The communicationinterfaces 1006 can facilitate communications within a wide variety ofnetworks and protocol types, including wired networks (e.g., Ethernet,DOCSIS, DSL, Fiber, USB etc.) and wireless networks (e.g., WLAN, GSM,CDMA, 802.11, Bluetooth, Wireless USB, ZigBee, cellular, satellite,etc.), the Internet and the like. Communication interfaces 1006 can alsoprovide communication with external storage, such as a storage array,network attached storage, storage area network, cloud storage, or thelike.

A power source 1018 may provide power to the various components of thecomputing device 102 that use power. The power source 1018 may be apower supply (e.g., that converts alternating current to directcurrent), a battery pack, another type of power source, or anycombination thereof. For example, the power source 1018 may be used toprovide power to the light source 108 of FIG. 1 or the OLED film 202 ofFIG. 2.

The computer storage media, such as memory 118 and mass storage devices1014, may be used to store software and data. For example, the computerstorage media may be used to store the operating system 128, theapplications 126, and the settings 124. The operating system 128 mayinclude a login module 1020 that is executed when a user of thecomputing device 102 initiates a login (e.g., by booting up thecomputing device 102). The login module 1020 may store images ofauthorized users for use when the users login. For example, the loginmodule 1020 may store a representative saved image 1034. The loginmodule 1020 may capture the image data 132 (e.g., a current image of auser) using the camera 106 and compare the image data 132 with the savedimage 1034. If the image data 132 matches (e.g., differs by less than apredetermined amount from) the saved image 1034, the user may be loggedin. If the image data 132 does not match the saved image 1034, the usermay not be logged in. The applications 126 may include a videoconferencing application 1020, an image capture application 1022, andother software applications 1024. At least some of the applications 126,such as the video conferencing application 1020 and the image captureapplication 1022, may be capable of determining whether the securityfeature is on (e.g., whether the power source 1018 is providing power tothe light source 202) and turning off the security feature if thesecurity feature is on. The settings 124 may include at least one of anoverride setting 1026, a user setting 1028, or a default setting 1030.The override setting 1026 may specify one or more conditions 1032. Forexample, if the user or one of the applications 126 sends a request tothe operating system 128 to turn off the security feature, the operatingsystem 128 may determine whether at least one of the conditions 1032 issatisfied. If satisfied (e.g., the computing device 102 is in a locationwhere sensitive information is present), then the operating system 128may deny the request. If not satisfied (or the override setting 1026 isnot present in the settings 124), then the operating system 128 maygrant the request to enable the camera 106 to be used.

While the camera 106 is shown in FIG. 10 as being integrated into thedisplay device 104, in some cases the camera 106 may be a standalonedevice that is separate from the display device 104 (e.g., as per FIG.7). While the display device 104 is shown in FIG. 10 as being integratedinto the computing device 102 (e.g., in a tablet), in some cases thedisplay device 104 may be separate from the computing device 102 (e.g.,in a laptop or desktop).

FIG. 11 is a flowchart of a login process 1100 according to someembodiments. For example, the process 1100 may be performed by theoperating system 118 of FIG. 1, e.g., the login module 1020 of FIG. 10.

At 1102, an instruction to initiate a boot sequence of a computingdevice may be received. At 1104, a login process may be initiated. Forexample, a user may provide input to the computing device 102 of FIG. 10to perform a “power on”, “resume from suspended state (e.g.,hibernation)”, or the like. In response, the computing device 102 mayinitiate a boot sequence. The boot sequence may initiate a login processto authenticate the user and prevent unauthorized access to thecomputing device. For example, the computing device 102 may initiateexecution of the login module 1020.

At 1106, a determination may be made whether the login process usesfacial recognition to login the user. If a determination is made, at1106, that the login process does not use facial recognition, theprocess may proceed to 1108, where the process initiates a conventionallogin process, e.g., prompting the user to enter a passcode, such as (i)a personal identification number (PIN) or (ii) a username and password.

If a determination is made, at 1106, that the login process uses facialrecognition, the process may proceed to 1110, where the process disablesa security feature that uses a light source to saturate a sensor of thecamera to prevent the camera from providing useful information when thecamera is hijacked. The security feature may be disabled to enable thelogin process to use the camera to capture a current image, at 1112. At1114, the current image may be compared to a saved image.

A determination may be made (e.g., based on the comparison), at 1116,whether the current image matches (e.g., differs by less than athreshold amount from) the saved image. If a determination is made, at1116, that the current image does not match (e.g., differs by at least athreshold amount from) the saved image, then the process may proceed to1118, where the user is denied from logging in, and the process proceedsto 1108, where the process initiates a conventional login process, e.g.,prompting the user to enter a passcode, such as (i) a personalidentification number (PIN) or (ii) a username and password.

If a determination is made, at 1116, that the current image matches(e.g., differs by less than a threshold amount from) the saved image,then the process may proceed to 1120, where the user is logged in. Thelogin module uses facial recognition to authenticate the user bycomparing the current image (captured from the camera) with a previouslystored image.

At 1122, a setting for a security feature (e.g., saturating the camerasensor to render images from a hijacked camera unusable) may bedetermined. At 1124, the security feature may be set based at least inpart on the setting. For example, after the login process has completed,a determination may be made whether or not to provide power to the lightsource (e.g., LED or OLED). For example, a default setting may specifythat the security feature is to be enabled (e.g., light source is on) bydefault to provide security against a hacker hijacking the camera. If auser setting is present, the user setting may override the defaultsetting. For example, if the user frequently uses applications (e.g.,videoconferencing applications, image capture applications or the like)that make use of the camera, the user may specify a user setting todisable the security feature (e.g., light source is to be off).Alternately, if the user is concerned about security and the defaultsetting is to disable (e.g., turn off) the security feature, the usermay specify a user setting to enable the security feature (e.g., lightsource is to be on).

In some cases, if the computing device is owned by a corporate (e.g.,enterprise), an override setting may specify conditions, that whensatisfied, cause the security feature to be enabled, regardless of thedefault setting or the user setting. For example, the conditions mayspecify that the security feature be enabled in locations wheresensitive information is present (e.g., the corporation's researchlabs). In some cases, when the conditions of the override setting aresatisfied, thereby causing the security setting to be enabled, the useras well as software (e.g., the operating system and applications) maynot be able to modify the security setting, e.g., the user and thesoftware may be unable to turn off (e.g., disable) the security setting.In other cases, when the conditions of the override setting are notsatisfied, the user setting may be used, if the user has specified one.If the user setting has not been specified, the default setting may beused. In such cases (e.g., conditions of the override setting do notapply), the user as well as software (e.g., the operating system andapplications) may be able to modify the security setting, e.g., the userand the software may be able to turn on (e.g., enable) or turn off(e.g., disable) the security setting. For example, when the userlaunches an application that uses the camera, the application maydisable the security feature (if the security feature was enabled). Whenthe application is shutting down, the application may re-enable thesecurity feature. Thus, when launched, the application may determinethat the security feature is enabled, disable the security feature, usethe camera to capture images, and then re-enable (e.g., restore) thesecurity feature when the application is shutting down.

FIG. 12 is a flowchart of a process 1200 that includes launching anapplication according to some embodiments. For example, the process 1200may be performed by one of the applications 126 or the operating system128.

At 1202, an application (e.g., one of the applications 126) may belaunched. At 1204, a determination may be made whether the applicationuses a camera. If a determination is made, at 1204, that the applicationdoes not use a camera, then the process proceeds to 1206, where thelaunch of the application is completed.

If a determination is made, at 1204, that the application uses a camera,then the process proceeds to 1208, where a determination is made whethera security feature is enabled. For example, the process may determinewhether power is being provided to a light source, causing the light tosaturate a sensor of the camera. If a determination is made, at 1208,that the security feature is not enabled, then the process proceeds to1206, where the launch of the application is completed.

If a determination is made, at 1208, that the security feature isenabled (e.g., causing the camera to render unusable image data), thenthe process proceeds to 1210, where the process sends a request todisable the security feature to an operating system. For example, theprocess may request that the operating system cause the EC 120 of FIG. 1to stop providing power to the light source to enable the camera toprovide usable image data for the application to use. In response toreceiving the request, the operating system may determine whether theconditions of an override setting are satisfied. For example, acorporation (e.g., enterprise) may use the override setting to specifythat, for each corporate computing device, the security feature beenabled at particular locations. The security feature may be enabled toprevent sensitive or confidential information from being viewed, in theevent that the camera of the computing device is hijacked.

At 1212, a response may be received from the operating system. Forexample, if the operating system determines that the conditions of theoverride setting are satisfied, the response may indicate that thesecurity cannot be disabled. If the operating system determines that theconditions of the override setting are not satisfied (e.g., do notapply), the operating system may disable the security feature, and senda response indicating that the security has been disabled. For example,the operating system may instruct an embedded controller to cut offpower to the light source, thereby causing the light source to stopemitting light, enabling the sensor to provide image data that theapplication can use.

At 1214, a determination is made whether the response from the operatingsystem indicates that the security feature has been disabled. Inresponse to determining, at 1214, that the security feature has beendisabled, the process may proceed to 1206 to complete the launch of theapplication. In response to determining, at 1214, that the securityfeature has not been disabled, at 1216, the process may display amessage to inform the user that the image-related features of theapplication are not be usable. For example, the process may display amessage indicating that at least some of the image-related features ofthe application are not be usable because conditions of the overridesetting have been satisfied. In some cases, the process may proceed to1206 and the launch of the application may be completed, even though atleast some of the image-related features of the application may not beusable. For example, the user may launch a video conferencingapplication. The user may be able to see the other participants in thevideo conference but the other participants may receive image data fromthe saturated imaging sensor of the camera (e.g., the other participantsmay not be able to see the user). In other cases, the process may endafter 1216, e.g., without completing the launch of the application. Forexample, the user may launch a data capture application (e.g., stillimage or video stream capture) that is not usable if the camera sensoris saturated. If the security feature cannot be disabled, theapplication may not complete launch and the message may explain that theapplication is not usable because the security feature cannot bedisabled (e.g., because the user is in a location where the user'semployer has specified that the security feature be enabled).

The example systems and computing devices described herein are merelyexamples suitable for some implementations and are not intended tosuggest any limitation as to the scope of use or functionality of theenvironments, architectures and frameworks that can implement theprocesses, components and features described herein. Thus,implementations herein are operational with numerous environments orarchitectures, and may be implemented in general purpose andspecial-purpose computing systems, or other devices having processingcapability. Generally, any of the functions described with reference tothe figures can be implemented using software, hardware (e.g., fixedlogic circuitry) or a combination of these implementations. The term“module,” “mechanism” or “component” as used herein generally representssoftware, hardware, or a combination of software and hardware that canbe configured to implement prescribed functions. For instance, in thecase of a software implementation, the term “module,” “mechanism” or“component” can represent program code (and/or declarative-typeinstructions) that performs specified tasks or operations when executedon a processing device or devices (e.g., CPUs or processors). Theprogram code can be stored in one or more computer-readable memorydevices or other computer storage devices. Thus, the processes,components and modules described herein may be implemented by a computerprogram product.

Furthermore, this disclosure provides various example implementations,as described and as illustrated in the drawings. However, thisdisclosure is not limited to the implementations described andillustrated herein, but can extend to other implementations, as would beknown or as would become known to those skilled in the art. Reference inthe specification to “one implementation,” “this implementation,” “theseimplementations” or “some implementations” means that a particularfeature, structure, or characteristic described is included in at leastone implementation, and the appearances of these phrases in variousplaces in the specification are not necessarily all referring to thesame implementation.

Although the present invention has been described in connection withseveral embodiments, the invention is not intended to be limited to thespecific forms set forth herein. On the contrary, it is intended tocover such alternatives, modifications, and equivalents as can bereasonably included within the scope of the invention as defined by theappended claims.

What is claimed is:
 1. A computing device comprising: one or moreprocessors; and one or more non-transitory computer-readable storagemedia storing instructions executable by the one or more processors to:determine that a security feature is enabled, the security featurecomprising a light source to saturate a camera that is connected to thecomputing device, wherein the camera provides distorted data to anunauthorized user accessing the camera after the security feature isenabled; based on determining that the security feature is enabled,provide power to the light source to cause the light source to emitlight, thereby causing the camera to provide distorted data; initiateexecution of a software application; based on determining that thesoftware application uses the camera, automatically disable the securityfeature to enable the software application to use the camera; and basedon determining that the software application is no longer executing,automatically re-enable the security feature.
 2. The computing device ofclaim 1, wherein the light source comprises an organic light emittingdiode (OLED) film.
 3. The computing device of claim 2, wherein: the OLEDfilm is placed around or over a lens of the camera; and the OLED filmhas a thickness of 0.2 millimeters or less.
 4. The computing device ofclaim 2, wherein: the OLED film has a capacitive sensing property; andtouching the OLED film causes the OLED film to transition (i) from apower on state to a power off state when the OLED film is emitting lightor (ii) from the power off state to the power on state when the OLEDfilm is not emitting light.
 5. The computing device of claim 1, furthercomprising: a light pipe to transport light from the light source to alocation that is sufficiently near the camera to cause an imaging sensorof the camera to become saturated when the light source is emittinglight.
 6. The computing device of claim 1, wherein the softwareapplication comprises one of: an operating system that uses facialrecognition during a login process; a video conferencing application; ora camera application.
 7. The computing device of claim 1, wherein: thecamera is a standalone device that is connected to the computing device;the camera is integrated into a bezel of a display device, or the camerais integrated into a display surface of the display device.
 8. One ormore non-transitory computer-readable storage media to storeinstructions executable by one or more processors of a computing deviceto: determine that a security feature is enabled, the security featurecomprising a light source to saturate a camera that is connected to thecomputing device, wherein the camera provides distorted data to anunauthorized user accessing the camera after the security feature isenabled; based on determining that the security feature is enabled,provide power to the light source to cause the light source to emitlight, causing the camera to provide distorted data; initiate executionof a software application; based on determining that the softwareapplication uses the camera, automatically disable the security featureto enable the software application to use the camera; and based ondetermining that the software application is no longer executing,automatically re-enable the security feature.
 9. The one or morenon-transitory computer-readable storage media of claim 8, wherein lightemitted by the light source comprises: a first set of light frequenciesthat are visible to a user to provide a visual indication that thesecurity feature is enabled; and a second set of light frequencies thatare not visible to the user.
 10. The one or more non-transitorycomputer-readable storage media of claim 8, wherein the light sourcecomprises an organic light emitting diode (OLED) film.
 11. The one ormore non-transitory computer-readable storage media of claim 10, whereinthe instructions are further executable by the one or more processors ofthe computing device to: determine that the security feature is enabled;and based on determining that the OLED film has been touched, disablingthe security feature.
 12. The one or more non-transitorycomputer-readable storage media of claim 10, wherein the instructionsare further executable by the one or more processors of the computingdevice to: determine that the security feature is disabled; and based ondetermining that the OLED film has been touched, enabling the securityfeature.
 13. The one or more non-transitory computer-readable storagemedia of claim 8, wherein the software application comprises one of: anoperating system that uses facial recognition during a login process; avideo conferencing application; or a camera application.
 14. The one ormore non-transitory computer-readable storage media of claim 8, wherein:the camera is a standalone device that is connected to the computingdevice; the camera is integrated into a bezel of a display device, orthe camera is integrated into a display surface of the display device.15. A method comprising: determining, by one or more processors of acomputing device, that a security feature is enabled, the securityfeature comprising a light source to saturate a camera that is connectedto the computing device, wherein the camera provides distorted data toan unauthorized user accessing the camera after the security feature isenabled; based on determining, by the one or more processors, that thesecurity feature is enabled, providing power to the light source tocause the light source to emit light, causing the camera to providedistorted data; initiating, by the one or more processors, execution ofa software application; based on determining, by the one or moreprocessors, that the software application uses the camera, automaticallydisabling the security feature to enable the software application to usethe camera; and based on determining, by the one or more processors,that the software application is no longer executing, automaticallyre-enabling the security feature.
 16. The method of claim 15, whereinthe light source comprises an organic light emitting diode (OLED) film.17. The method of claim 16, wherein: the OLED film is placed around orover a lens of the camera; and the OLED film has a thickness of 0.2millimeters or less.
 18. The method of claim 16, wherein: the OLED filmhas a capacitive sensing property; and touching the OLED film causes theOLED film to transition (i) from a power on state to a power off statewhen the OLED film is emitting light or (ii) from the power off state tothe power on state when the OLED film is not emitting light.
 19. Themethod of claim 15, wherein the software application comprises one of:an operating system that uses facial recognition during a login process;a video conferencing application; or a camera application.
 20. Themethod of claim 15, wherein: the camera is a standalone device that isconnected to the computing device; the camera is integrated into a bezelof a display device, or the camera is integrated into a display surfaceof the display device.