Public viewing security for public computer users

ABSTRACT

Methods and systems for activating a display security application and initiating a privacy measure on a computing device are provided. A user opens and turns on an application on the computing device, which monitors the security of the screen. The security feature recognizes when an unauthorized user is within viewing range of the display of the computing device. The user is prompted to initiate a privacy measure or ignore the unauthorized user. If the user initiates the privacy measure, the unauthorized user is prevented from seeing the content on the display. The user may terminate the privacy measure when the unauthorized user is no longer within viewing range of the display.

BACKGROUND OF THE INVENTION

Field of the Invention

This invention generally relates to displays, and more particularly toproviding security measures for portable computing device displays.

Description of the Related Art

Due to the increase in the availability of portable computing devicessuch as laptops, tablets, and mobile devices, work that used to beperformed solely on desktop computers can now be performed in almost anyplace at almost any time. Users of portable devices often findthemselves utilizing their devices in public settings such as airplanes,coffee shops, and libraries. The user of such devices is oftenperforming work or viewing content that is confidential or that the userotherwise does not otherwise wish to share with persons the peoplearound them in public spaces.

One solution to this problem is monitor filter screens, which are alsoknown as privacy screens. Such screens are physical accessories that arephysically coupled to portable device displays. These screens filter outlight reflected from displays and decrease the viewing angle of thedisplay. This allows the user some degree of privacy by preventing thecontents of the display from being viewed from certain angles to thesides of the display. The screens are typically made from polycarbonate,acrylic, or mesh. A drawback to these screens—mesh screens, inparticular—is that they degrade the image quality of the contents on thedisplay.

Privacy screens suffer a number of other drawbacks as well. For example,in some instances, while the user who is sitting in front of the displaycan see the screen, people sitting next to the user, affiliated with theuser, and working concurrently on a certain document or discussing aparticular piece of content cannot see the same. Further, such screensdo not prevent people who are walking by or sitting behind the user fromviewing the content of the display on the portable device. Thus, privacycan be obviated by an unauthorized user simply repositioning themselves.

Therefore, there is a need for improved security and privacy fordisplays on portable devices used in public.

SUMMARY OF THE CLAIMED INVENTION

Embodiments of the present invention provide for activating a displaysecurity monitoring application on a computing device. A user isprompted to open a display security monitoring application on thecomputing device. The user is prompted to select an option to startusing the display security monitoring application, and may optionallyselect preferences regarding the operation of application. Theselections are stored in memory and the application begins to monitorthe security of the display.

Various embodiments of the present invention include methods forinitiating a privacy measure. Such methods may include recognizing anunauthorized user within viewing range of a display of a computingdevice. The authorized user is prompted to initiate a privacy mode. Theprivacy mode is initiated by triggering a privacy measure. The securityfeature recognizes when the unauthorized user is no longer withinviewing range of the display and notifies the authorized user. Theauthorized user is prompted to terminate the privacy mode, and theprivacy measure is deactivated.

Further embodiments include systems for activating a display securityfeature and initiating a privacy measure. Such systems may include amemory and a computing device with a display. The display includes acamera that can detect faces and/or retinas of humans. A processorexecutes instructions stored in memory, wherein execution of theinstructions by the processor to activate the display securitymonitoring and initiate a privacy measure to prevent unauthorized usersfrom viewing content on the display.

Some embodiments of the present invention further includecomputer-readable storage media having embodied thereon programsexecutable by processors to perform methods for activating a securityfeature and initiating a privacy feature.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a method for activating a display security monitoringapplication.

FIG. 2 illustrates a method for initiating a privacy measure.

FIG. 3A illustrates a graphical interface for opening a display securitymonitoring application.

FIG. 3B illustrates a graphical interface for selecting an option tostart using a display security monitoring application.

FIG. 3C illustrates a graphical interface for selecting and savingpreferences regarding the operation of the display security monitoringapplication.

FIG. 3D illustrates a graphical interface for selecting an option toturn on display security monitoring.

FIG. 4A illustrates a graphical interface for sending a notificationregarding the detection of an unauthorized viewer.

FIG. 4B illustrates a graphical interface for triggering a privacymeasure.

FIG. 4C illustrates a graphical interface for notifying a user that anunauthorized viewer is no longer detected.

FIG. 5 illustrates a computing system that may be used to implement thevarious methodologies disclosed herein.

DETAILED DESCRIPTION

Embodiments of the present invention provide a system and method forutilizing a display security feature for public viewing on a portabledevice. FIG. 1 illustrates a method for activating a display securitymonitoring application. The steps identified in FIG. 1 (and the orderthereof) are exemplary and may include various alternatives,equivalents, or derivations thereof including but not limited to theorder of execution of the same. The steps of the method of FIG. 1 (andits various alternatives) may be embodied in hardware or softwareincluding a non-transitory computer-readable storage medium (e.g., anoptical disc or memory card) having instructions executable by aprocessor of a computing device.

A display security feature may be implemented by one or more processorsthat execute instructions stored in memory mediums. The executed codemay result in the processor(s) generating one or more graphicalinterfaces.

Referring now to FIG. 1, illustrates a method for activating a displaysecurity monitoring application 100 is illustrated. A user is promptedto open a display security monitoring application 305 (FIG. 3A) in acomputing device, such as a laptop, at step 105. In step 110, the useris prompted to select an option to start using a display securityfeature on the computing device by activating an start button 310 (FIG.3B).

Optionally, the user may also be prompted to select preferences withregard to the operation of the display security feature at step 115.Preferences regarding the type of display security feature may include ascreen saver, a power down function, a blocked screen area, or an activeshutter three-dimensional function. Preferences regarding initiation ofthe display security feature may include automatic initiation orinitiation only after the user is prompted to initiate the feature.Preferences regarding termination of the display security feature mayinclude automatic termination or termination after the user is promptedto terminate the feature (See FIG. 3C).

In step 120, the user selection(s) (e.g., the selection to start usingthe display security feature and/or user preference selection) arereceived and stored in memory 510 (FIG. 5). In step 130, the user turnson display security monitoring using the stored preferences byactivating an “on” or similar button 340 (FIG. 3D).

Referring now to FIG. 2, a method for initiating a privacy measure 200is illustrated. At step 205, an integrated tracking camera of thecomputing device recognizes, for example, a face or a set of eyes thatdoes not belong to the user associated with the computing device. Intypical tracking cameras, infrared non-collimated light is reflectedfrom the eye and sensed by an optical sensor. The information is thenanalyzed to extract eye rotation from changes in reflections.Camera-based trackers focus on one or both eyes and records theirmovement as the viewer looks at some type of stimulus. Camera-based eyetrackers use the center of the pupil and light to create cornealreflections (CRs). The vector between the pupil center and the CR can beused to compute the point of regard on surface or the gaze direction. Asimple calibration procedure of the viewer may be needed before usingthe tracking camera.

Alternatively, more sensitive trackers use reflections from the front ofthe cornea and that back of the lens of the eye as features to trackover time. Even more sensitive trackers image features from inside theeye, including retinal blood vessels, and follow these features as theeye rotates.

Most tracking cameras use a sampling rate of at least 30 Hz, although50/60 Hz is most common. Some tracking cameras run as high as 1250 Hz,which is needed to capture detail of very rapid eye movement.

A range camera may instead be used with the present invention to capturegestures made by the user and is capable of facial recognition. A rangecamera is typically used to capture and interpret specific gestures.This technology may use an infrared projector, a camera, a depth sensor,and a microchip to track the movement of objects and individuals inthree dimension. This system employs a variant of image-basedthree-dimensional reconstruction.

Alternatively, the integrated tracking camera may utilize a chargecoupled device (CCD) or a complementary metal oxide semiconductor(CMOS). Both CCDs and CMOSs are commonly used image sensors that convertlight into electronic signals. The electric signals are converted into adigital value, allowing the camera to detect an object in the field ofview.

At step 210, the user selects a choice with regard to a privacy mode.The user may choose to initiate the privacy mode, thereby triggering aprivacy measure at step 215. A privacy measure may include blockingportions of the screen where the non-authorized user is within viewingrange, initiating a screen saver, or another privacy measure.Alternatively, the user may choose to ignore the non-authorized userand, therefore, not trigger the privacy measure. For example, the usermay choose to forego initiating of the privacy measure when the userknows the non-authorized user and/or is not concerned about the privacyof the content on the screen (e.g., the user is using the computingdevice for entertainment, such as playing a game or watching a movie)(See FIGS. 4A-4B).

At step 220 the user is notified (e.g., by a screen prompt on acomputing device) that the non-authorized user is no longer detectedwhen the integrated tracking camera recognizes that the set of eyes orface is no longer within viewing range of the display. At step 225, theuser may be prompted choose to turn the privacy measure off because thesecurity threat is no longer present (See FIG. 4C).

Thus, according to an embodiment of the present invention, the user isnotified of potential security threats and is given control over when aprivacy measure is activated to protect the security of the contentdisplayed on the computing device.

FIGS. 3A-3D illustrate interfaces for the method of initiating privacymonitoring 100 (FIG. 1).

Referring now to FIG. 3A, a graphical interface for opening a displaysecurity feature application is illustrated. A user may select to open adisplay security feature on a computing device by, for example,selecting the application 305 from a list of applications on thecomputing device, as described in step 110 (FIG. 1).

Referring now to FIG. 3B, a graphical interface for selecting an optionto start using a display security feature is illustrated. After a userselects the application 305 shown in FIG. 3A, a user may be prompted toselect an option to start using a display security feature, using button“YES” 310 or button “NO” 315.

Referring now to FIG. 3C, a graphical interface for selecting and savingpreferences regarding the operation of the display security feature isillustrated. When the user selects the “YES” button 310 shown in FIG.3B, a user may be prompted to select preferences with regard to theoperation of the display security feature, as described in step 115(FIG. 1).

The available preferences may include, for example, the type of privacymeasure 320, such as a screen saver, powering down the device, blockinga portion of the screen from viewing, or implementing an active shutter3D system. An active shutter 3D system (alternatively known as analternate frame sequencing, alternate image, AI, alternating field,field sequential, or eclipse method) is a method of displayingstereoscopic three-dimensional (3D) images. An image is presented thatis intended to be viewed only by the left eye while blocking the view ofthe right eye. The right eye is then presented with an image intended tobe viewed only by the right eye while blocking the view of the left eye.These steps are repeated rapidly, such that the interruptions do notinterfere with the perceived fusion of the two images into a single 3Dimage. Active shutter 3D systems generally require the use of liquidcrystal (LC) shutter classes (also known as LCS glasses, LCS 3D classes,LC shutter glasses, or active shutter glasses). The glasses arecontrolled by a timing signal that allows the glasses to alternatelyblock one eye and then the other, in synchronization with the refreshrate of the screen.

The display security preferences may also include preferences regardinginitiation of the privacy measure 325, as described more fully below inFIG. 2. The privacy measure may be initiated automatically or only uponthe selection of a prompt by the user. For example, a user may wish toutilize the automatic initialization feature when he is away from hiscomputing device so that the display is protected from unauthorizedviewers in his absence.

The display security preferences may also include preferences regardingtermination of the privacy measure 330, as described more fully below inFIG. 2. The privacy measure may be terminated when the threat is nolonger present or only upon selection of a prompt by the user. A usermay be prompted to save the preferences regarding the display securityfeature by choosing button “SAVE” 335, as described in steps 120 and 125(FIG. 1).

Referring now to FIG. 3D, a graphical interface for selecting an optionto turn on display security monitoring. After a user selects and savespreferences in FIG. 3C, a user may be prompted to select an option toturn on display security monitoring using button “ON” 340 or button“OFF” 345.

FIGS. 4A-4C illustrate interfaces for the method for initiating aprivacy measure 200 (FIG. 2) when the display security monitoring hasbeen turned on (FIGS. 1 and 3).

Referring now to FIG. 4A, a graphical interface for sending anotification regarding the detection of an unauthorized viewer isillustrated. A user is notified via a prompt 405 on the computing devicethat an unauthorized user has been detected within viewing range of thedisplay of the computing device, as described in step 205 (FIG. 2). Theuser may select button “INITIATE PRIVACY MEASURE” 410, which triggersthe privacy feature as described in step 215 (FIG. 2).

Alternatively, the user may select button “IGNORE” 415, in which casethe privacy measure will not be initiated and the user may continue touse the computing device. However, other viewers within the field ofview may be able to see the display of the computing device. Thus, thecontents on the display may not be secure.

Referring now to FIG. 4B, a graphical interface for triggering a privacymeasure is illustrated. If the user chooses to initiate the privacymeasure by selecting button 410 (FIG. 4A), a privacy measure 420 istriggered, as described in step 215 (FIG. 2).

Referring now to FIG. 4C, a graphical interface for notifying a userthat an unauthorized viewer is no longer detected is illustrated. Whenthe user triggers the privacy measure 420 (FIG. 4A), the user isnotified via prompt 425 that the non-authorized user is no longerdetected, as described in step 220 (FIG. 2). The user may select button“TURN PRIVACY MEASURE OFF” 430 or button “CONTINUE USING PRIVACYMEASURE” 435. The user may optionally be required to input credentials440, such as a username and/or password, to terminate the privacymeasure.

Referring now to FIG. 5, a computing system 500 is shown that may beused to implement various embodiments of the present invention. Thecomputing system 500 of FIG. 5 includes one or more processors 505 andmemory 510. Main memory 510 stores, in part, instructions and data forexecution by processor 505. Main memory 504 can store the executablecode when in operation. The system 500 of FIG. 5 further includes a massstorage device 515, portable storage medium drive(s) 520, output devices525, user input devices 530, a graphics display 535, and peripheraldevices 540. The computing system further includes a camera 545 that maybe integrated into computing system 500 or attached to computing system500 as a peripheral device 540, as shown.

The components shown in FIG. 5 are depicted as being connected via asingle bus 550. The components, however, may be connected through one ormore data transport means. For example, processor unit 505 and mainmemory 510 may be connected via a local microprocessor bus, and the massstorage device 515, peripheral device(s) 540, portable storage device520, and display system 535 may be connected via one or moreinput/output (I/O) buses.

Mass storage device 515, which may be implemented with a magnetic diskdrive or an optical disk drive, is a non-volatile storage device forstoring data and instructions for use by processor unit 505. Massstorage device 515 may store the system software for implementingembodiments of the present invention for purposes of loading softwareinto main memory 510.

Portable storage device 520 operates in conjunction with a portablenonvolatile storage medium, such as a floppy disk, compact disk orDigital video disc, to input and output data and code to and from thecomputer system 500 of FIG. 5. The system software for implementingembodiments of the present invention may be stored on such a portablemedium and input to the computer system 500 via the portable storagedevice 520.

Input devices 530 provide a portion of a user interface. Input devices530 may include an alpha-numeric keypad, such as a keyboard, forinputting alpha-numeric and other information, or a pointing device,such as a mouse, a trackball, stylus, or cursor direction keys.Additionally, the system 500 as shown in FIG. 5 includes output devices525. Examples of suitable output devices include speakers, printers,network interfaces, and monitors.

Display system 535 may include a liquid crystal display (LCD) or othersuitable display device. Display system 535 may receive textual andgraphical information, and process the information for output to thedisplay device.

Peripherals 540 may include any type of computer support device to addadditional functionality to the computer system. For example, peripheraldevice(s) 540 may include a modem or a router.

The components contained in the computing system 500 of FIG. 5 are thosetypically found in computer systems that may be suitable for use withembodiments of the present invention and are intended to represent abroad category of such computer components that are well known in theart. Thus, the computing system 500 of FIG. 5 may be a personalcomputer, hand held computing device, tablet device, telephone, mobilecomputing device, workstation, server, minicomputer, mainframe computer,or any other computing device. The computer may also include differentbus configurations, networked platforms, multi-processor platforms, etc.Various operating systems may be used including Unix, Linux, WindowsMobile, or iOS. The steps of the methods of FIGS. 1 and 2 (and theirvarious alternatives) may be performed by a module or engine stored on acomputer readable storage medium (e.g., optical disc, memory card, etc.)comprising instructions executable by a processor of a computing device.

The invention has been described above with reference to specificembodiments. It will, however, be evident that various modifications andchanges may be made thereto without departing from the broader spiritand scope of the invention as set forth in the appended claims. Theforegoing description and drawings are, accordingly, to be regarded inan illustrative rather than a restrictive sense.

What is claimed is:
 1. A method for initiating a privacy measure, themethod comprising: calibrating a computing device to recognize one ormore eyes of an authorized user of the computing device; detecting oneor more unrecognized eyes within viewing range of a screen of thecomputing device based on camera-based eye trackers that compute a gazedirection towards the screen based on a vector from a corneal reflectionof the unrecognized eyes, and wherein the unrecognized eyes aredetermined not to belong to the authorized user to whom the computingdevice is calibrated; notifying the authorized user that one or moreunrecognized eyes have been detected; receiving user input from theauthorized user initiating a display security monitoring applicationthat includes an active shutter 3D system; executing the active shutter3D system to distort an image on a display of the computing device bygenerating two or more different versions of the image on the display ofthe computing device, and alternating between displays of the generatedversions, wherein a peripheral device corresponding to the activeshutter 3D system is required to view the image on display of thecomputing device in an undistorted form during execution of the activeshutter 3D system; detecting that the one or more unrecognized eyes areno longer within viewing range of the computing device; notifying theauthorized user that the one or more unrecognized eyes are no longerwithin viewing range of the computing device; receiving user input fromthe authorized user associated with the computing device terminating theactive shutter 3D system; and deactivating the active shutter 3D systembased on the received user input.
 2. The method of claim 1, wherein thedisplay security monitoring application computing device furtherincludes a screen saver.
 3. The method of claim 1, wherein the displaysecurity monitoring application for the computing device is furtherexecutable to power down the computing device.
 4. The method of claim 1,wherein the display security monitoring for the computing device isfurther executable to block a portion of the display on the computingdevice.
 5. The method of claim 1, further comprising sensing infrarednon-collimated light reflected from the one or more unrecognized eyesvia the camera-based trackers.
 6. The method of claim 1, furthercomprising tracking reflections from the front of the cornea and back ofthe lens of the unrecognized eyes via the camera-based trackers.
 7. Themethod of claim 1, further comprising imaging retinal blood vesselswithin the unrecognized eyes via the camera-based trackers.
 8. Themethod of claim 1, wherein the received user input indicates when theactive shutter 3D system is to be activated.
 9. The method of claim 1,wherein the received user input includes a selection of the displaysecurity monitoring application from a list of applications on thecomputing device displayed on a graphical interface.
 10. The method ofclaim 1, wherein the peripheral device includes liquid crystal shutterglasses.
 11. A non-transitory computer-readable storage medium havingembodied thereon a program, the program being executable by a processorto perform a method for initiating a privacy measure, the methodcomprising: calibrating a computing device to recognize one or more eyesassociated with an authorized user of the computing device; detectingone or more unrecognized eyes within viewing range of a screen thecomputing device based on camera-based eye trackers that compute a gazedirection towards the screen based on a vector from a corneal reflectionof the unrecognized eyes, and wherein the unrecognized eyes aredetermined not to belong to the authorized user to whom the computingdevice is calibrated; notifying the authorized user that one or moreunrecognized eyes have been detected; receiving user input from theauthorized user initiating a security monitoring application thatincludes an active shutter 3D system for the computing device; executingthe active shutter 3D system distort an image on a display of thecomputing device by generating two or more different versions of theimage on the display of the computing device, and alternating betweendisplays of the generated versions, wherein a peripheral devicecorresponding to the active shutter 3D system is required to view theimage on the display of the computing device in an undistorted formduring execution of the active shutter 3D system; detecting that the oneor more unrecognized eyes are no longer within viewing range of thecomputing device; notifying the authorized user that the one or moreunrecognized eyes are no longer within viewing range of the computingdevice; receiving user input from the authorized user associated withthe computing device terminating the active shutter 3D system; anddeactivating the active shutter 3D system based on the received userinput.
 12. The non-transitory computer-readable storage medium of claim11, wherein the display security monitoring application computing devicefurther includes a screen saver.
 13. The non-transitorycomputer-readable storage medium of claim 11, wherein the displaysecurity monitoring application for the computing device is furtherexecutable to power down the computing device.
 14. The non-transitorycomputer-readable storage medium of claim 11, wherein the displaysecurity monitoring for the computing device is further executable toblock a portion of the display on the computing device.
 15. Thenon-transitory computer-readable storage medium of claim 11, furthercomprising instructions executable to sense infrared non-collimatedlight reflected from the one or more unrecognized eyes via thecamera-based trackers.
 16. The non-transitory computer-readable storagemedium of claim 11, further comprising instructions executable to trackreflections from the front of the cornea and back of the lens of theunrecognized eyes via the camera-based trackers.
 17. The non-transitorycomputer-readable storage medium of claim 11, further comprisinginstructions executable to image retinal blood vessels within theunrecognized eyes via the camera-based trackers.
 18. The non-transitorycomputer-readable storage medium of claim 11, wherein the received userinput indicates when the active shutter 3D system is to be activated.19. The non-transitory computer-readable storage medium of claim 11,wherein the received user input includes a selection of the displaysecurity monitoring application from a list of applications on thecomputing device displayed on a graphical interface.
 20. Thenon-transitory computer-readable storage medium of claim 11, wherein theperipheral device includes liquid crystal shutter glasses.