Display visibility block

ABSTRACT

Methods, apparatuses, and non-transitory machine-readable media for displaying information and/or images on a display of a computing device based on received data. Apparatuses can include a display screen, a memory resource, a recognition sensor, and a controller. An example controller can receive data and activate information and/or images on a display screen based in part on the received data. In another example, a method can include storing recognition data in a memory resource, receiving primary recognition data, comparing the primary recognition data to the stored recognition data, and activating the display screen for a viewing angle responsive to authentication of the primary recognition data through the comparison of the primary recognition data and the stored recognition data.

TECHNICAL FIELD

The present disclosure relates generally to apparatuses, non-transitorymachine-readable media, and methods for determining screen visibility ona display of a computing device based on authentication of data.

BACKGROUND

Images can be viewed on computing devices. A computing device is amechanical or electrical device that transmits or modifies energy toperform or assist in the performance of human tasks. Examples includethin clients, personal computers, printing devices, laptops, mobiledevices (e.g., e-readers, tablets, smartphones, etc.),internet-of-things (IoT) enabled devices, heads-up displays, augmentedreality and virtual reality devices, and gaming consoles, among others.An IoT enabled device can refer to a device embedded with electronics,software, sensors, actuators, and/or network connectivity which enablesuch devices to connect to a network and/or exchange data. Examples ofIoT enabled devices include mobile phones, smartphones, tablets,phablets, computing devices, implantable devices, vehicles, homeappliances, smart home devices, monitoring devices, wearable devices,devices enabling intelligent shopping systems, among othercyber-physical systems.

A computing device can include a display used to view images and/ortext. The display can be a touchscreen display that serves as an inputdevice. When a touchscreen display is touched by a finger, digital pen(e.g., stylus), or other input mechanism, associated data can bereceived by the computing device. The touchscreen display may includepictures and/or words, among others that a user can touch to interactwith the device.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a functional block diagram in the form of an apparatus havinga display screen, a recognition sensor, a memory resource, and acontroller in accordance with a number of embodiments of the presentdisclosure.

FIG. 2 is a diagram representing an example computing device including avisible image on a display screen in the form of a mobile device inaccordance with a number of embodiments of the present disclosure.

FIG. 3 is diagram representing an example computing device including adisplay screen, recognition sensors, a memory resource, and a controllerin form of a mobile device in accordance with a number of embodiments ofthe present disclosure.

FIG. 4 is a block diagram for an example of activating a display screenof a computing device in accordance with a number of embodiments of thepresent disclosure.

FIG. 5 is a functional diagram representing a processing resource incommunication with a memory resource having instructions written thereonin accordance with a number of embodiments of the present disclosure.

FIG. 6 is flow 660 diagram representing an example of a display screenactivation in accordance with a number of embodiments of the presentdisclosure.

FIG. 7 is a flow diagram representing an example method for activating adisplay screen of a computing device in accordance with a number ofembodiments of the present disclosure.

DETAILED DESCRIPTION

Apparatuses, machine-readable media, and methods related to displayingimages on a display screen of a computing device based on received dataare described herein. Computing device display screen (e.g., monitors,mobile device screens, laptop screens, etc.) can be used to viewinformation and/or images (e.g., static images, video images, and/ortext) on the display screen. Information and/or images can be receivedby the computing device from another device and/or generated by thecomputing device. A user of a computing device may view private and/orconfidential information and/or images on the display screen (e.g.,viewing location) of the computing device. The private and/orconfidential information and/or images may be viewed on a computingdevice by the user in public locations. For instance, a computing devicecan include a controller and a memory resource to organize and displaythe information and/or images on a display screen based on data the userprovides the computing device. The data provided by the user may causethe controller to display information and/or images on a display screen.In an example, a method can include storing recognition data in a memoryresource, receiving primary recognition data, comparing the primaryrecognition data to the stored recognition data, and activating thedisplay screen for a viewing angle, measured from a plane normal to thedisplay screen, responsive to authentication of the primary recognitiondata through the comparison of the primary recognition data and thestored recognition data.

As used herein, the term “viewing location” refers to a display screenof a computing device. A user may view static images, video images,and/or text at the viewing location of the computing device. Forexample, a user may view information and/or images including staticimages, video images, and/or text at the viewing location of thecomputing device. That is, the information and/or images may bedisplayed on a display screen.

However, viewing information and/or images on a computing device in apublic location may allow unauthorized users to view the informationand/or images that are displayed on the display screen. For example, anauthorized user may view information and/or images on a computing devicewhile in a public location. In some instances, an unauthorized user maybe near the authorized user and may view the display screen of thecomputing device while the authorized user is viewing the displayscreen. An authorized user may view private and/or confidentialinformation and/or images on a computing device when in a publiclocation and/or when others are around them. An unauthorized user mayhave access to the display screen of a computing device being used by anauthorized user when near an authorized user. Thus, giving anunauthorized user access to the private and/or confidential informationand/or images on the display screen of the computing device being usedby the authorized user.

As used herein, the term “recognition data” refers to data used toidentify an authorized user. For instance, recognition data may includefingerprint identification, facial identification, retinaidentification, alphanumerical identification, and/or patternidentification, for example. As used herein, the term “storedrecognition data” refers to recognition data that is stored in a memoryresource of a computing device. The stored recognition data may becompared to primary recognition data and/or secondary recognition datato identify an authorized user. A user may manually enter recognitiondata into the computing device and the computing device may store therecognition data in the memory resource of the computing device forlater reference and identification of an authorized user. A user withstored recognition data in the computing device may be an authorizeduser. For example, a user may provide recognition data to store in amemory resource before a selective block is enabled. The recognitiondata provided by the user may identify the user as an authorized user toactivate a display screen when a selective block is enabled. Forinstance, the recognition data provided may allow the computing deviceto identify a specific user and the specific user may be an authorizeduser.

As used herein, the term “primary recognition data” refers torecognition data used to identify an authorized user and activate adisplay screen from a deactivated state.

For example, a user may input the recognition data to a computing devicesuch as a mobile device (e.g., a smartphone) equipped with a recognitionsensor (e.g., a camera, fingerprint reader, retina scanner, etc.) toactivate a display screen of a computing device within a viewing angle.A computing device may receive (or otherwise obtain) recognition datafrom a user and authenticate the primary recognition data prior toactivating the display screen within a viewing angle. The computingdevice may identify an authorized user with primary recognition databefore displaying information and/or images on the display screen. Asused herein, the term “secondary recognition data” refers to recognitiondata used to identify an authorized user and maintain an activate adisplay screen.

As used herein, the term “authorized user” refers to a user with storedrecognition data in the memory resource of the computing device. Forexample, a user may provide recognition data to a computing device andthe computing device may store the recognition data in the memory of thecomputing device. The computing device may compare primary recognitiondata and/or secondary recognition data to stored recognition data todetermine if a user is an authorized user. As used herein, the term“unauthorized user” refers to a user without stored recognition data inthe memory resource of the computing device.

A computing device may activate a display screen within a viewing anglein the presence of an authorized user. For instance, before a user isable to view information and/or images on a computing device, the usermay input primary recognition data into the computing device. Thecomputing device may analyze the primary recognition data and determineif the user is an authorized user. For example, the computing device maycompare the primary recognition data from the user with the storedrecognition data to determine if the primary recognition data matchesthe stored recognition data. If the primary recognition data matches thestored recognition data, then the computing device identify the user asan authorized user and activate the display screen within a viewingangle for the authorized user. The activated display screen may allowthe authorized user to view information and/or images on the displayscreen within a viewing angle. If the primary recognition data does notmatch the stored recognition data, then the computing device mayidentify the user as an unauthorized user and the display screen mayremain deactivated. That is, the unauthorized user may not viewinformation and/or images on the display screen.

Examples of the present disclosures may provide privacy to a user of acomputing device by preventing unauthorized users from viewinginformation and/or images on a display screen. In an example embodiment,a user may activate the display screen of a computing device within aviewing angle by providing primary recognition data to the computingdevice. The activated display screen may be viewable within a viewingangle measured from a plane normal to the display screen. Saiddifferently, an authorized user may activate a display screen within aviewing angle and prevent unauthorized users outside of the viewingangle from viewing the information and/or images on the display screen.That is, an authorized user may view information and/or images on thedisplay screen of the computing device while preventing unauthorizedusers from view the same information and/or images on the displayscreen.

Further, the computing device may receive secondary recognition datawhile a user is viewing the information and/or images on the displayscreen. For example, the computing device may receive primaryrecognition data from a user to determine if the user is an authorizeduser. Once it is determined if a user is an authorized user, the usermay view information and/or images on the display screen within aviewing angle. Furthermore, the computing device may continue to receivesecondary recognition data as the user views the information and/orimages on the display screen within a viewing angle. That is, thecomputing device may scan for secondary recognition data substantiallycontinuously, periodically, or at scheduled intervals to ensure that theauthorized user is still within the viewing angle of the display screen.If it is determined that the authorized user is no longer within theviewing angle, the display screen may deactivate and the informationand/or images on the display screen may no longer be viewable.

A user may determine the frequency of the secondary recognition datascans. For example, a user may determine the frequency of the secondaryrecognition data scans by setting the frequency of the scan on thecomputing device. In another embodiment, the computing device mayanalyze the usage patterns of the user and set the frequency of thesecondary recognition data scans based on the usage patterns of theuser.

In the following detailed description of the present disclosure,reference is made to the accompanying drawings that form a part hereof,and in which is shown by way of illustration how one or more embodimentsof the disclosure can be practiced. These embodiments are described insufficient detail to enable those of ordinary skill in the art topractice the embodiments of this disclosure, and it is to be understoodthat other embodiments can be utilized and that process, electrical, andstructural changes can be made without departing from the scope of thepresent disclosure.

As used herein, designators such as “N,” “M,” etc., particularly withrespect to reference numerals in the drawings, indicate that a number ofthe particular feature so designation can be included. It is also to beunderstood that the terminology used herein is for the purpose ofdescribing particular embodiments only and is not intended to belimiting. As used herein, the singular forms “a,” “an,” and “the” caninclude both singular and plural referents, unless the context clearlydictates otherwise. In addition, “a number of,” “at least one,” and “oneor more” (e.g., a number of memory resources) can refer to one or morememory resources, whereas a “plurality of” is intended to refer to morethan one of such things. Furthermore, the words “can” and “may” are usedthroughout this application in a permissive sense (i.e., having thepotential to, being able to), not in a mandatory sense (i.e., must). Theterm “include,” and derivations thereof, means “including, but notlimited to.” The terms “coupled,” and “coupling” mean to be directly orindirectly connected physically or for access to and movement(transmission) of commands and/or data, as appropriate to the context.The terms “data” and “data values” are used interchangeably herein andcan have the same meaning, as appropriate to the context.

The figures herein follow a numbering convention in which the firstdigit or digits correspond to the figure number and the remaining digitsidentify an element or component in the figure. Similar elements orcomponents between different figures can be identified by the use ofsimilar digits. For example, 222 can reference element “22” in FIG. 2,and a similar element can be referenced as 322 in FIG. 3. As will beappreciated, elements shown in the various embodiments herein can beadded, exchanged, and/or eliminated so as to provide a number ofadditional embodiments of the present disclosure. In addition, theproportion and/or the relative scale of the elements provided in thefigures are intended to illustrate certain embodiments of the presentdisclosure and should not be taken in a limiting sense.

FIG. 1 is a functional block diagram in the form of an apparatus 100having a display screen 102, a recognition sensor 103, a memory resource106, and a controller 108 (e.g., a processor, control circuitry,hardware, firmware, and/or software) in accordance with a number ofembodiments of the present disclosure. The memory resource 106, in someembodiments, can include a non-transitory MRM.

The computing device 100 may include a display screen 102. The displayscreen 102 may be a touchscreen display of a mobile device such as asmartphone. In some embodiments, the computing device 100 may include alight emitting diode (OLED) screen, a micro light emitting diode (uLED)screen, or a liquid crystal display (LED) screen. The controller 108 maybe communicatively coupled to the memory resource 106 and/or the displayscreen 102. As used herein, “communicatively coupled” can includecoupled via various wired and/or wireless connections between devicessuch that data can be transferred in various directions between thedevices. The coupling need not be a direct connection, and in someexamples, can be an indirect connection.

The memory resource 106 can include non-volatile or volatile memory. Forexample, non-volatile memory can provide persistent data by retainingwritten data when not powered, and non-volatile memory types can includeNAND flash memory, NOR flash memory, read only memory (ROM),Electrically Erasable Programmable ROM (EEPROM), Erasable ProgrammableROM (EPROM), and Storage Class Memory (SCM) that can include resistancevariable memory, such as phase change random access memory (PCRAM),three-dimensional cross-point memory (e.g., 3D XPoint™), resistiverandom access memory (RRAM), ferroelectric random access memory (FeRAM),magnetoresistive random access memory (MRAM), and programmableconductive memory, among other types of memory. Volatile memory canrequire power to maintain its data and can include random-access memory(RAM), dynamic random-access memory (DRAM), and static random accessmemory (SRAM), among others.

A computing device can include a recognition sensor 103. The recognitionsensor 103 may detect, receive, and/or scan for recognition data. Forexample, the recognition sensor 103 may capture and/or receive input,such as recognition data, from a user and transmit that input to thecontroller 108 to be analyzed. The primary recognition data from anauthorized user may cause a display screen to activate within a viewingangle. The viewing angle may be within a 10 to 25 angle of the displayscreen. As used herein, the term “recognition sensor” refers to a deviceused to receive and/or scan for recognition data from a user.

A user may cause a display screen 102 of a computing device 100 toactivate within a viewing angle by inputting primary recognition datainto the recognition sensor 103. The controller 108 of the computingdevice 100 may analyze the primary recognition data and determine if theuser is an authorized user. If the controller 108 determines that theuser is an authorized user, the controller 108 may cause the displayscreen 102 of the computing device 100 to activate within a viewingangle. That is, the display screen 102 may show information and/orimages within a specified viewing angle of the display screen 102. Saiddifferently, the controller 108 may activate a display screen 102 in amanner that prevents others outside of a viewing angle from seeing theinformation and/or images on the display screen 102, providing the userof the computing device 100 with privacy when others are nearby. As usedherein, the term “viewing angle” refers to a specified angle from adisplay screen that information and/or images may be viewable on adisplay screen. That is, outside the specified angle information and/orimages may not be viewable on the display screen 102.

The controller 108 of the computing device 100 may regulate thepolarization of the display screen 102 to increase and/or decrease thevisibility of information and/or images on a display screen 102. Forexample, the controller may cause the display screen 102 to transitionbetween opaque and transparent based on the signals that are provided.As such, the controller may regulate the portion of the display screen102 that is visible. The controller 108 may regulate the polarization ofthe display screen 102 to increase the visibility of the informationand/or images within a specified viewing angle and decrease thevisibility of the information and/or images outside of the specifiedviewing angle. Said differently, user may provide a computing device 100with primary recognition data and a controller 108 may analyze theprimary recognition data received by a recognition sensor 103 toauthenticate the primary recognition data and identify an authorizeduser. Display screen 102 can include a polarizer, such as a wire gridpolarizer. The polarizer can be activated to increase the visibility ofthe information and/or images within a specified viewing angle and/ordecrease the visibility of the information and/or images outside of thespecified viewing angle. The polarizer can be configured, whenactivated, to have a bi-direction scatter function (BDSF) that limitsthe angle at which light is emitted from display screen 102 andtherefore decreases the visibility of the information and/or imagesoutside of the specified viewing angle that corresponds to the angle oflight being emitted from the display screen. The viewing angle of thedisplay screen when the polarizer is activated can correspond to theBDSF of the polarizer. The BDSF of the polarizer can be based on thematerials comprising the polarizer, the depth of the material formingwire grid (e.g., the trench dept of the wire grid), and/or design (e.g.,shape and/or spacing) of the wire grid, which can be configured, alongwith the cover (e.g., glass) of the display screen 102, such that thedisplay screen can have a particular viewing angle when the polarizer isactivated. When a user is determined to be an authorized user by thecontroller 108, the controller 108 may adjust the polarization on thedisplay screen 102 (e.g., activate a polarizer) so that the informationand/or images on the display screen 102 are visible within a viewingangle ranging from about 10 to 25 degrees from the display screen. Inaddition, the controller 108 may adjust the polarization of the displayscreen 102 (e.g., activate a polarizer) in a manner that makes theinformation and/or images on the display screen 102 unable to be seenoutside of the viewing angle. Said differently, the controller 108 mayadjust the polarization on the display screen 102 so that theinformation and/or images on the display screen 102 are visible to theauthorized user and not an unauthorized user outside the viewing angle.

The recognition sensor 103 may receive primary recognition data and/orsecondary recognition data from a user. The controller 108 uses theprimary recognition data received from the recognition sensor 103 todetermine if a user is authorized to view the information and/or imageson the display screen 102. For example, a recognition sensor 103 can becoupled to the display screen 102 either directly or indirectly via thecontroller 108. The controller 108 can be configured to receive aninput, such as primary recognition data and/or secondary recognitiondata, from the recognition sensor 103 when determining if a user is anauthorized user. In some embodiments, the recognition sensor 103 may bea camera and may provide input to the controller 108 as facialidentification. The controller 108 may use the facial identification toidentify a user. For example, the recognition sensor 103 may be a cameraof a mobile device (e.g., a smartphone) configured to receive facialidentification. The camera (e.g., recognition sensor 103) may send thereceived facial identification to the controller 108.

In a non-limiting example, a user can provide recognition data to therecognition sensor 103 (e.g., camera) in the form of facialidentification. That is, the controller 108 may determine if a user isan authorized user with facial identification provided by therecognition sensor 103 (e.g., camera). If the facial identification isauthenticated by the controller 108 and determined to be from anauthorized user, the controller 108 may activate the display screen 102within a viewing angle allowing a user within the viewing angle to viewinformation and/or images on the display screen 102 and preventing usersoutside the viewing angle from viewing the information and/or images onthe display screen 102.

In another embodiment, the recognition sensor 103 may be a fingerprintreader. For example, the recognition sensor 103 can be a portion of amobile device including a fingerprint reader. In some embodiments, therecognition sensor 103 in the form of a fingerprint reader may beconnected to the display screen. In other embodiments, the fingerprintreader may be on other portions of a mobile device (e.g., the back ofthe smartphone).

In another non-limiting example, a user can provide primary recognitiondata to the recognition sensor 103 (e.g., fingerprint reader) in theform of fingerprint identification. That is, the controller 108 maydetermine if a user is an authorized user with fingerprintidentification provided by the recognition sensor 103 in the form of afingerprint reader. The controller 108 may activate a screen visibilitywithin a viewing angle with received fingerprint identification from anauthorized user. Activating the screen visibility of a display screen102 within a viewing angle may allow a user within the viewing angle toview information and/or images on the display screen 102. The viewingangle may be a 10 to 25 degree angle from the display screen 102 of thecomputing device 100. Activating the screen visibility within a viewingangle gives a user within the viewing angle privacy and ensures thatothers outside of the viewing angle cannot see the information and/orimages on the display screen 102.

In another embodiment, the recognition sensor 103 may be a retinascanner and may provide recognition data input to the controller 108 asretina identification to identify a user. For example, the recognitionsensor 103 may be a portion of a mobile device including a retinascanner. In some examples, the retina scanner may be a camera connectedto the computing device 100.

In yet another non-limiting example, a user can provide primaryrecognition data to the recognition sensor 103 in the form of retinaidentification. The retina identification may be used to activate adisplay screen 102 of a computing device within a viewing angle. Forexample, a user may look into a recognition sensor 103 in the form of acamera to provide the recognition sensor 103 with recognition data inthe form of retina identification. The primary recognition data may beused to identify a user as an authorized user. The controller 108 maythen activate the display screen 102 within a viewing angle for theauthorized user and other users within the viewing angle.

In some embodiments, the recognition sensor 103 may be an alphanumericidentification code and may provide recognition data to the controller108 in the form of an alphanumeric identification code input to identifyan authorized user. For example, the recognition sensor 103 may be partof a touch display screen 102 of a mobile device. The display screen 102may allow a user to input an alphanumeric identification code and thecontroller 103 may authenticate the alphanumeric identification code todetermine if the user is an authorized user.

The alphanumeric identification code may be used to activate a displayscreen 102 of a computing device and allow a user to view informationand/or images on the display screen 102 within a viewing angle. Thedisplay screen 102 may be activated within a specified viewing angle andmay prevent others outside of the specified viewing angle from viewingthe information and/or images on the display screen 102. Preventingothers from viewing information and/or images on a display screen 102may provide an authorized user with added security when viewingconfidential and/or private information and/or images in public and/orin the presence of other people.

In another embodiment, the recognition sensor 103 may be a patternidentification code and may provide recognition data to the controller108 as a pattern identification code input to identify a user. Forexample, the display screen 102 may act as a touch display screenincluding an input for a pattern identification code. As a user inputsthe pattern identification code a controller 108 may unlock thecomputing device 100 and allow an authorized user to view informationand/or images on the display screen 102 within a viewing angle. Theidentified authorized user may privately view the information and/orimages on the display screen 102 within a viewing angle even in thepresence of others. That is, the controller 108 may allow users within aspecified angle to view the information and/or images on the displayscreen 102 while preventing others outside the specified angle fromviewing the information and/or images on the display screen 102.

In some embodiments, the computing device 100 may include number ofrecognition sensors 103. For example, the computing device 100 mayinclude a recognition sensor to receive the facial identification,fingerprint identification, retina identification, alphanumericidentification code, pattern identification code, or a combinationthereof to identify an authorized user. The controller 108 mayauthenticate a primary recognition data to activate a display screen 102within a viewing angle, where the viewing angle is measured from a planenormal to the display screen 102, and authenticate a secondaryrecognition data to maintain the activated display screen 102.

The controller 108 may determine if a user is an authorized user bycomparing the received primary recognition data and/or secondaryrecognition data with stored recognition data. If the received primaryrecognition data and/or secondary recognition data matches the storedrecognition data, then the primary recognition data and/or secondaryrecognition data may be authenticated and the user may be determined tobe an authorized user. In some embodiments, a user may store recognitiondata in the memory resource 106 of the computing device 100 as areference. That is, a user may store recognition data in the memoryresource 106 of the computing device 100 to identify a user as anauthorized user. The user may store recognition data in the memoryresource 106 of the computing device 100 before enabling a selectiveblock. As used herein, the term “selective block” refers to the act ofmaking information and/or images on a display screen visible within aspecified angle. The recognition data stored in the memory resource 106of the computing device 100 is used to authenticate a primaryrecognition data and/or secondary recognition data by comparing receivedprimary recognition data and/or secondary recognition data with therecognition data stored in the memory resource 106 and determining thatthe primary recognition data and/or secondary recognition data wasprovided from an authorized user.

For example, a user may select via a menu displayed on the displayscreen 102 which recognition data (e.g., the facial identification,fingerprint identification, retina identification, alphanumericidentification code, pattern identification code, etc.) to store. Such amenu may give the user options as to what recognition data the userwants to store and/or use to identify an authorized user. The user canmanually select and customize which recognition data and recognitionsensor 103 to be used by the controller 108 when authenticating aprimary recognition data and/or secondary recognition data. In someembodiments, a user may input a number of recognition data and select anumber of recognition sensors to identify an authorized user.

FIG. 2 is a diagram representing an example computing device 200including a visible image 214 on a display screen 202 in the form of amobile device in accordance with a number of embodiments of the presentdisclosure. While the depiction of FIG. 2 includes an illustration of astar as image 214, any static image, video image, text, or informationcould be used. FIG. 2 illustrate a display screen 202 which is analogousto the display screen 102 of FIG. 1. The display screen 202 may be partof a computing device 200 and may be coupled to a controller (e.g., thecontroller 108 of FIG. 1) and a memory resource (e.g., the memoryresource 106 of FIG. 1). FIG. 2 includes an image 214. FIG. 2 alsoillustrate an authorized user 222 and an unauthorized user 224. Whilethe FIG. 2 is illustrated as including two users, there may be more orless users. Further, while the depiction of FIG. 2 includes anillustration of a human, any animal or device could be used.

FIG. 2 illustrates the display screen 202 including the visible image214. In the illustration in FIG. 2, the computing device 200 is in aninitial position where the authorized user 222 may be facing the displayscreen 202 such that the image 214 is visible to the authorized user222.

In FIG. 2, the image 214 is visible to the authorized user 222 withinthe viewing angel 212. In contrast, the image 214 is not visible to theunauthorized user 224 outside of the viewing angel 212. The controllerof the computing device 200 may adjust the polarization of the displayscreen 202 based on the set viewing angle when a selective block isenabled. Said differently, the controller of the computing device 200may alter the polarization of the display screen to regulate which users(e.g., authorized user 222 or unauthorized user 224) are able to viewthe image 212 on the display screen 202. The controller of the computingdevice 200 may alter the polarization of the display screen 202 so thatimages 214 are only visible within the viewing angle 212. That is, usersoutside the viewing angle 212 (e.g., unauthorized user 224) cannot viewthe image 214 on the display screen 202. While the position of theauthorized user 222 is in front of the computing device 200, theauthorized user 222 could be oriented anywhere within the viewing angle212 and view the image 214 on the display screen 202.

In a number of embodiments, display screen 202 can include a polarizer215, such as a wire grid polarizer. The polarizer 215 can be activatedto increase the visibility of the information and/or images within aspecified viewing angle and/or decrease the visibility of theinformation and/or images outside of the specified viewing angle. Thepolarizer 215 can be configured, when activated, to have a bi-directionscatter function (BDSF) that limits the angle at which light is emittedfrom display screen 202 and therefore decreases the visibility of theinformation and/or images outside of the specified viewing angle thatcorresponds to the angle of light being emitted from the display screen.The viewing angle of the display screen when the polarizer 215 isactivated can correspond to the BDSF of the polarizer 215. The BDSF 215of the polarizer can be based on the materials comprising the polarizer,the depth of the material forming wire grid (e.g., the trench dept ofthe wire grid), and/or design (e.g., shape and/or spacing) of the wiregrid, which can be configured, along with the cover (e.g., glass) of thedisplay screen 202, such that the display screen can have a particularviewing angle when the polarizer 215 is activated.

In some examples, the viewing angle 212 may be from about 5 to about 25degrees from the display screen 202. In another example, the viewingangle 212 may be from about 10 to about 20 degrees from the displayscreen 202. Viewing angle can be measured from a plane that isperpendicular (e.g., normal) to the surface of the display screen 202.Viewing angle 212 can be comprised of a first angle 216, which can be 10degrees, and a second angle 218, which can be 10 degrees, for a viewingangle of 20 degrees. First angle 216 can be the same or difference fromsecond angle 218, such that first angle 216 can be 10 degrees and secondangle 218 can be 5 degrees for a viewing angle of 15 degrees. The planethat is perpendicular to the display screen from which the viewing angleis measured can be at any location on the display screen and can beoriented at any angle relative to the edge of the display screen. Forexample, in FIG. 2, the plane is approximately parallel to the top andbottom edges of the display screen 202, but the plane could beperpendicular to the tope and bottom edges of the display screen 202 orat a 15 degree angle to the top and bottom edges of the display screen202. In yet another example, the viewing angle 212 may be from about 10to about 15 degrees from the display screen 202. The viewing angle maybe set by a user before enabling a selective block. However, thisdisclosure is not so limited. In some examples, the viewing angle may bea default viewing angle set by the controller 108.

The computing device 200 may include recognition sensor 203 to receiverecognition data 210 from a user (e.g., an authorized user 222). Thecontroller of the computing device 200 may use the received primaryrecognition data 210, obtained from the recognition sensor 203, todetermine if the user is an authorized user 222. If a user is determinedto be an authorized user 222, the controller may activate a screenvisibility and cause an image 214 to be visible within the viewing angle212.

In some examples, the recognition sensor 203 may scan for secondaryrecognition data 210 while the display screen is activated within aviewing angle 212. Said differently, the recognition sensor 203 maycontinue to receive and/or scan for secondary recognition data 210 afterthe controller has determined that an authorized user 222 provided theprimary recognition data 210 and activated the display screen 202. Thatis, the recognition sensor 203 may receive and/or scan for secondaryrecognition data 210 substantially continuously, periodically, or atscheduled intervals to ensure that the authorized user 222 is stillviewing the display screen within a viewing angle 212. As used herein,the term “substantially” refers to a characteristic does not have to beabsolute but is close enough so as to achieve the characteristic. Forexample, “substantially continuously” is not limited to absolutelycontinuous. As used herein, the term “periodically” refers to aregularly occurring time. For example, the recognition sensor 203 mayobtain secondary recognition data from a user every 2 minutes, 5minutes, or every 10 minutes, or every 15 minutes. As used herein, theterm “scheduled intervals” refers to varying time gaps set by a userand/or controller. For example, a user may set the recognition sensor203 to scan for recognition data 2 minutes after a display screen isactivated and then 5 minutes after the last scan was obtained.

In a non-limiting example, a user (e.g., authorized user 222) mayprovide the recognition sensor 203 with primary recognition data 210.The controller of the computing device 200 may authenticate the receivedrecognition data 210 to determine if the user is an authorized user 222.The controller may determine that the user is an authorized user 222 andactivate the display screen 202 allowing the authorized user 222 to viewthe image 214 on the display screen 202 with in a viewing angle 212. Insome examples, the recognition sensor 203 may perform substantiallycontinuously scan for secondary recognition data 210 after anauthentication has occurred to ensure that the authorized user is stillwithin the viewing angle 212 of the display screen 202. If it isdetermined that the authorized user 222 is still within the viewingangle 212, the display screen 202 may remain activated. If it isdetermined that the authorized user 222 is no longer within the viewingangle 212, the display screen 202 may deactivate.

In another non-limiting example, the recognition sensor 203 may performperiodic scan for secondary recognition data 210 after an authenticationhas occurred to ensure that the authorized user is still within theviewing angle 212 of the display screen 202. If it is determined thatthe authorized user 222 is no longer within the viewing angle 212 and anunauthorized user 224 is within the viewing angle 212, the displayscreen 202 may deactivate.

In yet another non-limiting example, a user (e.g., unauthorized user224) may provide the recognition sensor 203 with primary recognitiondata 210. The controller of the computing device 200 may attempt toauthenticate the received primary recognition data 210 to determine ifthe user is an authorized user 222. However, if the received primaryrecognition data 210 does not match the recognition data stored in thememory resource of the computing device 200, the control may cause thedisplay screen 202 to remain deactivated.

FIG. 3 is diagram representing an example computing device 300 includinga display screen 302, recognition sensors 303, a memory resource 306,and a controller 308 in the form of a mobile device in accordance with anumber of embodiments of the present disclosure. The computing device300 may include a controller 308 which may be analogous to controller108 described in FIG. 1. The computing device 300 may be communicativelycoupled to one or more recognition sensors in the form of a frontrecognition sensors 303-1 and 303-N and a back recognition sensors 303-2and 303-M which can be generally referred to as the recognition sensors303 and be analogous to recognition sensors 103 and 203 described inconnection with FIGS. 1 and 2, respectively. The computing device 300can include a memory resource 306 which can be analogous to memoryresource 106 described in connection with FIG. 1. Embodiments includingmemory resource 306 may include any number or combination of memorymedia types (e.g., non-volatile and/or volatile).

The example computing device 300 is in the form of a mobile device(e.g., an IoT enabled device). An IoT enabled device may include mobilephones, smart phones, tablets, phablets, computing devices, implantabledevices, vehicles, home appliances, smart home devices, monitoringdevices, wearable devices, devices enabling intelligent shoppingsystems, among other cyber-physical systems. The recognition sensors 303may include multiple types of recognition sensors (e.g., a camera,fingerprint reader, retina scanner, etc.) located on the computingdevice 300 in the form of a mobile device.

For example, a user may provide the computing device 300 withrecognition data in the form of facial identification, fingerprintidentification, retina identification, alphanumeric identification code,pattern identification code, etc. The controller 308 may store theinitial recognition data in the memory resource 306. In some examples,the computing device 300 in the form of a mobile device may include anumber of recognition sensors 303. Further, a user may provide thecomputing device 300 with a number of recognition data to store andscan. In addition, the controller 308 may store a number of recognitiondata in the memory resource 306.

In some embodiments, to ensure that an authorized user is still viewingthe display screen 302, the recognition sensors 303 may continue toreceive and/or scan for recognition data after the controller 308determines that an authorized user has provided the recognition data.The controller may perform secondary authentication of the user toensure that the information and/or images on the display screen 302 areviewed by an authorized user. In some examples, the controller 308 mayreceive recognition data from a number of recognition sensors 303. Forexample, a user may provide recognition data to a back recognitionsensor 303-2 to activate a display screen 302 within a viewing angle.After a specified amount of time has passed the controller 308 may causea front recognition sensor 303-1 to scan for secondary recognition datato ensure that the authorized user is within the viewing angle. If anauthorized user is no longer within the viewing angle, the controller308 may deactivate the display screen 302. If an authorized user isstill within the viewing angle, the display screen 302 will remainactivated.

In another non-limiting example, the controller 308 may receiverecognition data from a front recognition sensor 303-1 to activate adisplay screen 302 within a viewing angle. The controller may then causefront recognition sensor 303-1 to substantially continuously scan forrecognition data to ensure that an authorized user is within the viewingangle. In yet another non-limiting example, the controller 308 mayreceive recognition data from a front recognition sensor 303-1 toactivate a display screen 302 within a viewing angle. The controller 308may then cause front recognition sensor 303-N to scan for secondaryrecognition data periodically to ensure that an authorized user iswithin the viewing angle.

In some embodiments, the controller 108 may enable a selective blockingof a display screen 302 on a computing device 300 based on receivedrecognition data. For example, the controller 308 may receive primaryrecognition data from a recognition sensor 303. The primary recognitiondata may be provided by a user in efforts to activate a display screen302 within a viewing angle and view information and/or images thereon.The controller 308 may analyze the primary recognition data by comparingthe received primary recognition data to the recognition data stored inthe memory resource 306. If it is determined that the received primaryrecognition data matches the stored recognition data, the controller 208may activate a displays screen 302 within a specified view angle. Thismay allow the user to view the information and/or images on the displayscreen 302 in private and prevent other users outside of the viewingangle from viewing the information and/or images on the display screen302.

In some embodiments, a computing device 300 may be a mobile deviceincluding a number of applications (e.g., picture gallery, email, textmessaging, games, social media, etc.). As used herein, the term“application” refers to a program designed to run on a computing device,such as a mobile device, smartphone, or tablet computer, for example.The controller 308 may enable selective blocking of a display screen 302for specified applications on the computing device 300. For example, thecontroller 308 may enable selective blocking of a display screen 302 fora first application and disable the selective blocking of the displayscreen 302 for a second application.

In a non-limiting example, a user may use a mobile device to play a gameapplication (e.g., second application). While the user is playing thegame application (e.g., second application), the display screen 302 maybe visible from all angles. That is, the controller 308 may disable aselective block when the game application (e.g., second application) isused. Once the user exits the game application (e.g., secondapplication) and enters a text messaging application (e.g., firstapplication) the controller 308 may cause the display screen 302 todeactivate until the primary recognition data is authenticated and theuser is determined to be an authorized user. That is, the controller 308may enable a selective blocking of the display screen 302 when the textmessaging application (e.g., first application) is used. If thecontroller 308 determines that the user is an authorized user, thecontroller 308 may activate the display screen 302 within a specifiedviewing angle, allowing users within the viewing angle to viewinformation and/or images on the display screen 302 while preventingusers outside the viewing angle from viewing the information and/orimages. When the user exits the messaging application (e.g., firstapplication), the controller 308 may disable the selective blocking ofthe display screen 302, allowing users from all angles to view thedisplay screen 302.

In some embodiments, the controller 308 may enable a selective blockingof a display screen 302 for a first application and second applicationbut disable the selective blocking for a third application. In anotherembodiment, the controller 308 may enable a selective blocking for allapplications. In yet another embodiment, the controller 308 may enable aselective blocking based on the location of the user. In addition, thecontroller 308 may enable the selective blocking based on the locationof the user and the application being used. For example, the controller308 may enable the selective blocking when a user activates a firstapplication while in a public location.

In a non-limiting example, a user may use a mobile device to play a gameapplication (e.g., second application). However, when a user enters thegame application (e.g., second application) the controller 308 may causethe display screen 302 to deactivate until the primary recognition datais authenticated and the user is determined to be an authorized user. Ifthe controller 308 determines that the user is an authorized user, thecontroller 308 may activate the display screen 302 within a specifiedviewing angle. Once a user exits the game application (e.g., secondapplication) and enters a home screen the controller 308 may disableselective block, allowing the information and/or images on the displayscreen 302 to be viewed from all angles. Once the user enters a textmessaging application (e.g., first application) the controller 308 mayactivate the selective block and cause the display screen 302 todeactivate until the user is identified as an authorized user. If thecontroller 308 determines that the user is an authorized user, thecontroller 308 may activate the display screen 302 within a specifiedviewing angle, allowing only users within the viewing angle to viewinformation and/or images on the display screen 302. In some examples,the controller 308 may enable the selective blocking on all applicationsand the home screen.

In some embodiments, a controller 308 may enable and/or disableselective blocking of a display screen 302 for an application based onuser pre-established settings, an anticipated level of privacy,pre-determined or machine learned preference, or a combination thereof.That is, the controller 308 may determine a privacy threshold forapplications on a computing device 300. The privacy threshold maydetermine if a selective block should be enabled or disabled for anapplication. The controller 308 may determine the privacy thresholdbased on user pre-established settings, an anticipated level of privacy,pre-determined or machine learned preference, or a combination thereof.

For example, a controller 308 may determine that applications have ahigh privacy threshold and enable the selective blocking based on userselected applications. For instance, a user may select whichapplications of a mobile device should include a selective blocking andwhich application should not include a selective blocking. Theapplications selected by the user to include selective blocking may bedetermined, by the controller 308, to have a high privacy threshold. Incontrast, the applications selected by the user to not include selectiveblocking may be determined, by the controller 308, to have a low privacythreshold.

In a non-limiting example, a user may select a picture galleryapplication and a text messaging application to include selectiveblocking of the display screen 302 and select that the emailapplications and social media applications should not include selectiveblocking of the display screen 302. As a result, the controller 308 mayenable a selective blocking when the picture gallery application and thetext messaging application are initiated but not when the emailapplications and social media applications are initiated.

In some examples, a controller 308 may enable the selective blockingbased an anticipated level of privacy. For example, the controller 308may determine the privacy threshold of an application based onapplication description, information provide while using theapplication, etc. In a non-limiting example, a user may receive an emailin an email application with the words confidential in the body of theemail. The controller 308 may determine that the email application has ahigh privacy threshold and enable selective blocking for the emailapplication based on the information provided in the email. In anothernon-limiting example, a controller 308 may determine that a bankingapplication has a high privacy threshold, based on a descriptionmentioning bank account information, and enable selective blocking forthe banking application. In contrast, the controller 308 may determinethat a gaming application has a low privacy threshold since theapplication description mentions nothing of a confidential nature anddisable selective blocking for the gaming application.

In some examples, a controller 308 may determine the privacy thresholdof an application based on user input. For example, a controller 308 mayenable and/or disable selective blocking for an application based onpre-determined or machine learned preferences of a user. In non-limitingexample, a user may dim the brightness of the display screen 302 eachtime a picture gallery application is opened. The controller 308 maydetermine that the picture gallery application has a high privacythreshold, based on the input from the user, and enable selectiveblocking for the picture gallery application.

FIG. 4 is a block diagram 440 for an example of activating a displayscreen of a computing device in accordance with a number of embodimentsof the present disclosure. FIG. 4 describes an example of activating adisplay screen (e.g., the display screen 102 of FIG. 1) by a controller(e.g., the controller 108 of FIG. 1) based on receiving recognition datafrom an authorized user.

In an embodiment described in connection with FIG. 4, a controller canbe coupled to a computing device and a memory resource (e.g., the memoryresource 306 of FIG. 3). At 441, the block diagram 440, the controllermay store recognition data to a memory resource coupled to the computingdevice. A user may provide recognition data to a computing device toidentify them as an authorized user. The controller of the computingdevice may store the recognition data in the memory resource. In someexamples, the controller may store a number of recognition data in thememory resource of the computing device. Each stored recognition data ofthe number of stored recognition data may be used to identify a user asan authorized user. The stored recognition data may be used to identifyan authorized user when primary recognition data is received.

At 442, the block diagram 440, the controller may receive primaryrecognition data to identify an authorized user. To activate a displayscreen and view information and/or images thereon within a viewing anglea user my provide primary recognition data to a recognition sensor of acomputing device. In some examples, a computing device may include anumber of recognition sensors to receive different types of recognitiondata. For example, the computing device may receive recognition data inthe form of fingerprint identification, a retina identification, afacial identification, an alphanumerical identification code, a patternidentification code, or a combination thereof. The recognition sensormay send the primary recognition data to the controller for analysis.

At 443, the block diagram 440, the controller may determine if a user isan authorized user based on the received primary recognition data. Thecontroller may analyze received primary recognition data by comparingthe primary recognition data to the stored recognition data anddetermine if a user is an authorized user. That is, a controller mayauthenticate primary recognition data by comparing the primaryrecognition data with the stored recognition data.

If the user is determined to be an authorized user the controller mayactivate a display screen within a viewing angle, at block 444.Activating a display screen within a viewing angle may prevent othersnear the authorized user from viewing the information and/or images onthe display screen. That is, the authorized user may view private and/orconfidential information and/or images on the computing device whilepreventing others outside the viewing angle from seeing the privateand/or confidential information and/or images.

In contrast, if the controller determines that the user is anunauthorized user, the controller may refrain from activating thedisplay screen within a viewing angle, at block 445. The controller mayactivate a display screen when an authorized user is viewing the displayscreen. However, if an unauthorized user provides the recognition sensorwith primary recognition data, the controller may not activate thescreen to prevent the unauthorized user from viewing the private and/orconfidential information and/or images on the computing device.

FIG. 5 is a functional diagram representing a processing resource 557 incommunication with a memory resource 506 having instructions 551, 552,553, 554, 555, 556 written thereon in accordance with a number ofembodiments of the present disclosure. FIG. 5 describes an exampleincluding instructions to activate a display screen (e.g., the displayscreen 102 of FIG. 1) by a processing resource 557 based onauthentication of primary recognition data and performing a secondaryauthentication of secondary recognition data. The memory resource 506,in some embodiments, may be analogous to the memory resource 106described with respect to FIG. 1. The processing resource 557, in someexamples, may be analogous to the controller 108 describe with respectto FIG. 1.

A system 550 may be a server or a computing device (among others) andcan include the processing resource 557. The system 790 may furtherinclude the memory resource 506 (e.g., a non-transitory MRM), on whichmay be stored instructions, such as instructions 551, 552, 553, 554,555, and 556. Although the following descriptions refer to a processingresource and a memory resource, the descriptions may also apply to asystem with multiple processing resources and multiple memory resources.In such examples, the instructions may be distributed (e.g., stored)across multiple memory resources and the instructions may be distributed(e.g., executed by) across multiple processing resources.

The memory resource 506 may be electronic, magnetic, optical, or otherphysical storage device that stores executable instructions. Thus, thememory resource 506 may be, for example, a non-transitory MRM comprisingRandom Access Memory (RAM), an Electrically-Erasable Programmable ROM(EEPROM), a storage drive, an optical disc, and the like. The memoryresource 506 may be disposed within a controller and/or computingdevice. In this example, the executable instructions 551, 552, 553, 554,555, and 556 may be “installed” on the device. Additionally, and/oralternatively, the memory resource 792 can be a portable, external, orremote storage medium, for example, that allows the system 550 todownload the instructions 551, 552, 553, 554, 555, and 556 from theportable/external/remote storage medium. In this situation, theexecutable instructions may be part of an “installation package”. Asdescribed herein, the memory resource 506 may be encoded with executableinstructions for display screen visibility based on identification of anauthorized user.

The instructions 551, when executed by a processing resource such as theprocessing resource 557, may include instructions to apply, by acontroller coupled to a computing device, a selective block to anapplication on a computing device. A controller may determine whichapplications of a computing device should include a selective block. Thecontroller may determine which applications include a selective blockbased on pre-established settings, pre-determined or machine learnedpreference, and/or user input. In some embodiments, the controller mayuse a combination of pre-established settings, an anticipated level ofprivacy, and/or, pre-determined or machine learned preference, todetermine which applications should include a selective block. In someexample, the controller may apply the selective block to allapplications on a computing device. In other examples, the controllermay apply the selective block to application with a high privacythreshold.

The instructions 552, when executed by a processing resource such as theprocessing resource 557, may include instructions to receive, by acontroller coupled to a computing device, primary recognition data froman authorized user to activate a display screen within a viewing angle.The controller of the computing device may activate a display screenwithin a viewing angle when an authorized user provides primaryrecognition data through a recognition sensor. For example, if anapplication on the computing device includes a selective block, anauthorized user may have to provide primary recognition data beforeaccessing the application.

The instructions 553, when executed by a processing resource such as theprocessing resource 557, may include instructions to authenticate, by acontroller coupled to a computing device, the primary recognition databy comparing the primary recognition data to stored recognition data.Continuing with the previous example, after a user provides primaryrecognition data, the controller may authenticate the primaryrecognition data by comparing the primary recognition data to the storedrecognition data. If the primary recognition data matches the storedrecognition data, the controller may determine that the user is anauthorized user and activate the display screen.

The instructions 554, when executed by a processing resource such as theprocessing resource 557, may include instructions to activate, by acontroller coupled to a computing device, the display screen within aviewing angle responsive to the authentication of the primaryrecognition data. In some examples, after the controller determines thata user is an authorized user, the controller may activate the displayscreen. However, the controller may activate the viewing screen in amanner that allows only users within a viewing angle to view theinformation and/or images on the display screen. Activating a displayscreen within a viewing angle provides privacy to the user of thecomputing device when in the presence of others.

The instructions 555, when executed by a processing resource such as theprocessing resource 557, may include instructions to authenticate, by acontroller coupled to a computing device, secondary recognition datawhile the display screen is activated within a viewing angle. In someexamples, the controller may cause a recognition sensor to scan forsecondary recognition data after the display screen has been activated.That is, the controller may receive secondary recognition data from arecognition sensor and perform secondary authentications of thesecondary recognition data while the display screen is activated withina viewing angle. Performing secondary authentications of secondaryrecognition data may ensure that an authorized user is still within theviewing angle while the display screen is activated. Performingsecondary authentications may increase the security of the computingdevice. For example, a user may provide a recognition sensor withprimary recognition data. The controller may authentication the primaryrecognition data and activate the display screen within a viewing angle.After some time has passed an authorized user may put the computingdevice down and an unauthorized user may pick up the computing deviceand gain access to the information and/or images on the display screen.However, if the controller performs a secondary authentication withsecondary recognition data received after the display screen has beenactivated within a viewing angle, an authorized user may not gain accessto the information and/or images on the display screen.

The instructions 556, when executed by a processing resource such as theprocessing resource 557, may include instructions to deactivate, by acontroller coupled to a computing device, the display screen responsiveto receiving recognition data from an unauthorized user. In someexamples, a controller may perform a number of authentications while acomputing device is in use. For example, the controller may perform anauthentication of the primary recognition data before activating adisplay screen within a viewing angle. In addition, the controller mayperform an authentication of secondary recognition data after thedisplay screen is activated within a viewing angle. In some examples, ifthe controller receives secondary recognition data from an unauthorizeduser after a display screen has been activated the controller maydeactivate the display screen to prevent the unauthorized user fromaccessing the private and/or confidential information and/or images onthe computing device.

FIG. 6 is flow diagram 660 representing an example of a display screenactivation in accordance with a number of embodiments of the presentdisclosure. FIG. 6 describes an example of applying a selective block toa display screen to prevent unauthorized users from viewing the displayscreen. As described herein in connection with FIG. 4, a controller(e.g., controller 208 of FIG. 2) can be coupled to a computing device(e.g., computing device 300 of FIG. 3) and a memory resource (e.g., thememory resource 306 of FIG. 1).

At 661, the block diagram 660, the controller may receive primaryrecognition data to activate a display screen within a viewing angle. Toensure that the information and/or images of the computing device remainsecure the controller may identify an authorized user with primaryrecognition data before activating a display screen within a viewingangle. At 662, the block diagram 660, the controller may authenticatethe primary recognition data by comparing the primary recognition datato stored recognition data. The controller may compare both recognitiondata and determine if the authorized user provided the primaryrecognition data. If the primary recognition data is from an authorizeduser, the primary recognition data may allow a user to view informationand/or images on a display screen within a viewing angle.

At 663, the block diagram 660, the controller may display an informationand/or image on the display screen, viewable by the authorized userwithin a 10 to 25 degree angle. If a controller determines that thereceived primary recognition data belongs to an authorized user, thecontroller may activate the display screen within a viewing angle. Forexample, the viewing angle may be a 25 degree angle from the displayscreen. In some examples, the viewing angle may be a 20 degree anglefrom the display screen. That is, a user within a 20 degree angle fromthe display screen may be able to view the information and/or images onthe display screen. While a user outside of the angle that is 20 degreesfrom the display screen may not be able to view the information and/orimages on the display screen. In other examples, the viewing angle maybe a 15 degree angle from the display screen. In yet another example,the viewing angle may be a 10 degree angle from the display screen.

At 664, the block diagram 660, the controller may prompt the recognitionsensor to scan for secondary recognition data to ensure that theauthorized user is still within the viewing angle. The controller mayreceive the secondary recognition data from a recognition sensor anddetermine if the secondary recognition data was provided by anauthorized user. Based on the determination that an authorized user isstill within the viewing angle, at 667, the controller may maintain thedisplay screen visibility within the viewing angle. However, if it isdetermined that an authorized user is no longer within the viewingangle, at 668, the controller may deactivate the display screen.

FIG. 7 is a flow diagram representing an example method 770 foractivating a display screen of a computing device in accordance with anumber of embodiments of the present disclosure. At 771, the method 770,includes storing recognition data in a memory resource of a computingdevice. A user may provide a computing device with recognition data tobe stored in a memory resource before a selective blocking of a displayscreen is enabled. The stored recognition data may allow the controllerto identify an authorized user when primary recognition data isreceived. That is, the primary recognition data may be compared to thestored recognition data to determine if the same user provided bothrecognition data.

At 772, the method 770, includes receiving primary recognition data toactivate a display screen within a viewing angle. The recognition sensormay receive primary recognition data from a user. The controller mayobtain the primary recognition data from the recognition sensor todetermine if the received primary recognition data is from an authorizeduser.

At 773, the method 770, includes comparing the primary recognition datato the stored recognition data. The controller may determine if a useris an authorized user by comparing the received primary recognition datawith stored recognition data. A user may be identified as an authorizeduser if the received primary recognition data matches the storedrecognition data. In some examples, recognition data may beauthenticated a number of times during the same use cycle. That is, therecognition sensor may obtain primary recognition data to activate adisplay screen within a viewing angle and then obtain secondaryrecognition data from a user substantially continuously, periodically,or at scheduled intervals during a use cycle. Each time primaryrecognition data and/or secondary recognition data are obtained it iscompared to the stored recognition data to ensure that an authorizeduser is within the viewing angle.

At 774, the method 770, includes activating the display screen within aviewing angle responsive to authentication of the primary recognitiondata through the comparison of the primary recognition data and thestored recognition data. If the controller determines that the user isan authorized user based on the received primary recognition data, thecontroller may cause the display screen to activate within a viewingangle. An activated display screen may allow information and/or imagesto be seen within a specified angle range of the display screen.Activating the display screen within a specified angle range may preventusers outside the specified viewing range from viewing the informationand/or images on the display screen.

Although specific embodiments have been illustrated and describedherein, those of ordinary skill in the art will appreciate that anarrangement calculated to achieve the same results can be substitutedfor the specific embodiments shown. This disclosure is intended to coveradaptations or variations of one or more embodiments of the presentdisclosure. It is to be understood that the above description has beenmade in an illustrative fashion, and not a restrictive one. Combinationof the above embodiments, and other embodiments not specificallydescribed herein will be apparent to those of skill in the art uponreviewing the above description. The scope of the one or moreembodiments of the present disclosure includes other applications inwhich the above structures and processes are used. Therefore, the scopeof one or more embodiments of the present disclosure should bedetermined with reference to the appended claims, along with the fullrange of equivalents to which such claims are entitled.

In the foregoing Detailed Description, some features are groupedtogether in a single embodiment for the purpose of streamlining thedisclosure. This method of disclosure is not to be interpreted asreflecting an intention that the disclosed embodiments of the presentdisclosure have to use more features than are expressly recited in eachclaim. Rather, as the following claims reflect, inventive subject matterlies in less than all features of a single disclosed embodiment. Thus,the following claims are hereby incorporated into the DetailedDescription, with each claim standing on its own as a separateembodiment.

What is claimed is:
 1. A method, comprising: storing recognition data ina memory resource; receiving primary recognition data; comparing theprimary recognition data to the stored recognition data; and activatinga display screen for a viewing angle responsive to authentication of theprimary recognition data through the comparison of the primaryrecognition data and the stored recognition data.
 2. The method of claim1, wherein the viewing angle comprises an angle of between 4 and 26degrees as measured from a plane normal to the display screen.
 3. Themethod of claim 1, further comprising altering the polarization of thedisplay screen to activate the display screen such that the displayscreen is viewable within the viewing angle.
 4. The method of claim 1,further comprising maintaining the activated display screen such thatthe display screen is viewable within the viewing angle responsive to:receiving additional primary recognition data; comparing the additionalprimary recognition data to the stored recognition data; and determiningthat the additional primary recognition data matches the storedrecognition data.
 5. The method of claim 1, further comprisingdeactivating the display screen responsive to an interruption inreceiving primary recognition data.
 6. The method of claim 1, furthercomprising applying a selective block to an application on the computingdevice.
 7. The method of claim 6, further comprising applying theselective block to the application based on a user pre-establishedsettings, an anticipated level of privacy, pre-determined or machinelearned preference, or a combination thereof.
 8. A non-transitorymachine-readable medium comprising a processing resource incommunication with a memory resource having instructions executable to:store recognition data to a memory resource coupled to the computingdevice; receive primary recognition data to identify an authorized user;determine if a user is the authorized user based on the received primaryrecognition data; and activate a display screen such that the displayscreen is viewable within a viewing angle measured from a plane normalto the display screen based on the determination that the user is theauthorized user.
 9. The medium of claim 8, wherein the computing deviceincludes an organic light emitting diode (OLED) screen.
 10. The mediumof claim 8, further comprising the instructions to authenticate theprimary recognition data.
 11. The medium of claim 10, whereinauthenticating recognition data includes comparing the primaryrecognition data to the stored recognition data before the displayscreen is activated and viewable within the viewing angle.
 12. Themedium of claim 8, further comprising the instructions to authenticatesecondary recognition data, wherein authenticating secondary recognitiondata includes comparing the secondary recognition data to the storedrecognition data while the display screen is activated and viewablewithin a viewing angle.
 13. The medium of claim 8, wherein recognitiondata comprises a fingerprint identification, a retina identification, afacial identification, an alphanumerical identification code, a patternidentification code, or a combination thereof.
 14. An apparatus,comprising: a memory resource; and a controller coupled to the memoryresource, wherein the controller is configured to: apply a selectiveblock to an application on a computing device; receive primaryrecognition data from a user; authenticate the primary recognition databy comparing the primary recognition data to stored recognition data;and activate the display screen such that the display screen is viewablewithin the viewing angle as measured from a plane normal to the screenresponsive to the authentication of the primary recognition data. 15.The apparatus of claim 14, wherein the controller is further configuredto maintain a deactivated display screen responsive to receiving primaryrecognition data from an unauthorized.
 16. The apparatus of claim 14,wherein the controller is further configured to authenticate secondaryrecognition data while the display screen is activated such that thedisplay screen is viewable within the viewing angle.
 17. The apparatusof claim 14, wherein the controller is further configured to cause arecognition sensor to scan for secondary recognition data substantiallycontinuously, periodically, at scheduled interval, or a combinationthereof.
 18. The apparatus of claim 17, wherein the controller isfurther configured to receive recognition data from a number ofrecognition sensors.
 19. The apparatus of claim 14, wherein thecontroller is further configured to deactivate the display screenresponsive to receiving secondary recognition data from an unauthorizeduser.
 20. The apparatus of claim 14, wherein the controller is furtherconfigured to apply a selective block to the application based on aprivacy threshold.