CN-114139225-B - Display visibility obscuration
Abstract
The present disclosure relates to a display visibility block. Methods, apparatus, and non-transitory machine-readable media are provided for displaying information and/or images on a display of a computing device based on received data. The device may include a display screen, a memory resource, an identification sensor, and a controller. The example controller may receive data and activate information and/or images on the display screen based in part on the received data. In another example, a method may include storing identification data in a memory resource, receiving primary identification data, comparing the primary identification data with the stored identification data, and activating the display screen for a viewing angle in response to authentication of the primary identification data by the comparison of the primary identification data with the stored identification data.
Inventors
- B. Chabra
- CHRISTENSON CRAIG LEONARD
- R. Viswanatan
- Z. HUS enima Karem
Assignees
- 美光科技公司
Dates
- Publication Date
- 20260512
- Application Date
- 20210902
- Priority Date
- 20200904
Claims (20)
- 1. A method for displaying information, comprising: Storing the identification data in a memory resource (106, 506); receiving primary identification data by a first sensor; comparing the primary identification data with stored identification data; Determining, by a controller, a privacy threshold for an application running on a computing device and for information to be displayed on a display screen (102, 202, 302) of the computing device based on settings established by the controller and based on the application and the information displayed during use of the application; in response to authentication of the primary identification data by the comparison of the primary identification data with the stored identification data, activating the display screen (102, 202, 302) based on the determined privacy threshold such that the display screen can only be viewed by an authorized user within a specified viewing angle (212); analyzing a user's usage pattern of the computing device, and Secondary identification data from the user is received by a second sensor different from the first sensor at a frequency set based on the analyzed usage pattern of the computing device to ensure that the authorized user is still within the specified viewing angle.
- 2. The method of claim 1, wherein the specified viewing angle comprises an angle between 4 degrees and 26 degrees as measured from a plane normal to the display screen.
- 3. The method of claim 1, further comprising changing a polarization of the display screen to activate the display screen such that the display screen is viewable within the specified viewing angle.
- 4. The method of any of claims 1-3, further comprising maintaining an activated display screen such that the display screen is viewable within the specified viewing angle in response to: Receiving the secondary identification data; comparing the secondary identification data with the stored identification data, and Determining that the secondary identification data matches the stored identification data.
- 5. The method of any of claims 1-3, further comprising deactivating the display screen in response to an interrupt occurring when primary identification data is received.
- 6. The method of any of claims 1-3, further comprising applying a selective occlusion to the application running on the computing device.
- 7. The method of claim 6, further comprising applying the selective occlusion to the application based on a user pre-established setting, an expected privacy level, a pre-determined or machine-learned preference, or a combination thereof.
- 8. A non-transitory machine-readable medium comprising a processing resource (557) in communication with a memory resource (106, 506) having instructions executable to: storing the identification data to a memory resource (106, 506) of the computing device; receiving primary identification data by the first sensor to identify an authorized user (222); determining whether a user is the authorized user based on the received primary identification data (222); Determining, by a controller of the computing device, a privacy threshold for an application running on the computing device and for information to be displayed on a display screen of the computing device based on settings established by the controller and based on the application and the information displayed during use of the application; Based on the determining that the user is the authorized user (222), activating the display screen (102, 202, 302) based on the determined privacy threshold such that the display screen can only be viewed by the authorized user (222) within a specified viewing angle (212) measured from a plane normal to the display screen (102, 202, 302); analyzing a user's usage pattern of the computing device, and Secondary identification data from the user is received by a second sensor different from the first sensor at a frequency set based on the analyzed usage pattern of the computing device to ensure that the authorized user is still within the specified viewing angle.
- 9. The medium of claim 8, wherein the display screen is an organic light emitting diode, OLED, screen.
- 10. The medium of claim 8 further comprising instructions for authenticating the primary identification data.
- 11. The medium of claim 10, wherein authenticating the identification data includes comparing the primary identification data to stored identification data before activating the display screen and being viewable within the specified viewing angle.
- 12. The medium of any one of claims 8-10, further comprising instructions for authenticating the secondary identification data, wherein authenticating the secondary identification data includes comparing the secondary identification data to stored identification data while the display screen is activated and viewable within the specified viewing angle.
- 13. The medium of any of claims 8 to 10, wherein the identification data comprises a fingerprint identification, a retina identification, a facial identification, an alphanumeric identification code, a pattern identification code, or a combination thereof.
- 14. An apparatus (100, 200, 300) for displaying information, comprising: memory resources (106, 506), and A controller (108) coupled to the memory resource (106, 506), wherein the controller (108) is configured to: an application that applies the selective occlusion to the computing device; Receiving primary identification data from a user by a first sensor; Authenticating the primary identification data by comparing the primary identification data with stored identification data; Determining a privacy threshold for the information to be displayed on a display screen of the computing device based on the settings established by the controller and based on the application running on the computing device and information displayed during use of the application; Activating the display screen (102, 302) based on the determined privacy threshold in response to the authentication of the primary identification data such that the display screen (102, 302) can only be viewed by an authorized user within a specified viewing angle (212) as measured from a plane normal to the display screen; analyzing a user's usage pattern of the computing device, and Secondary identification data from the user is received by a second sensor different from the first sensor at a frequency set based on the analyzed usage pattern of the computing device to ensure that the authorized user is still within the specified viewing angle.
- 15. The device of claim 14, wherein the controller is further configured to maintain the deactivated display screen in response to receiving primary identification data from an unauthorized user.
- 16. The device of claim 14, wherein the controller is further configured to authenticate the secondary identification data while activating the display screen such that the display screen is viewable within the viewing angle.
- 17. The apparatus of claim 14, wherein the controller is further configured to cause an identification sensor (103,203,303) to scan the secondary identification data substantially continuously, periodically, at predetermined intervals, or a combination thereof.
- 18. The apparatus of claim 17, wherein the controller is further configured to receive identification data from a plurality of identification sensors (103,203,303).
- 19. The device of claim 14, wherein the controller is further configured to deactivate the display screen in response to receiving the secondary identification data from an unauthorized user (224).
- 20. The device of claim 14, wherein the controller is further configured to apply the selective occlusion to the application based on the determined privacy threshold.
Description
Display visibility obscuration Technical Field The present disclosure relates generally to apparatus, non-transitory machine-readable media, and methods for determining screen visibility on a display of a computing device based on data authentication. Background The image may be viewed on a computing device. A computing device is a mechanical or electrical device that transmits or modifies energy for performing or assisting in performing an artificial task. Examples include thin clients, personal computers, printing devices, laptop computers, mobile devices (e.g., electronic readers, tablet computers, smartphones, etc.), internet of things (IoT) enabled devices, heads-up displays, augmented reality and virtual reality devices, and game consoles, among others. IoT enabled devices may refer to devices embedded with electronics, software, sensors, actuators, and/or network connectivity that enable such devices to connect to a network and/or exchange data. Examples of IoT enabled devices include mobile phones, smart phones, tablet computers, tablet phones, computing devices, implanted devices, vehicles, home appliances, smart home devices, monitoring devices, wearable devices, devices supporting smart shopping systems, and other network physical systems. The computing device may contain a display for viewing images and/or text. The display may be a touch screen display that acts as an input device. When the touch screen display is touched by a finger, a digital pen (e.g., a stylus), or other input mechanism, the relevant data may be received by the computing device. The touch screen display may contain pictures and/or text, as well as other content that the user may touch to interact with the device. Disclosure of Invention Embodiments of the present disclosure provide a method comprising storing identification data in a memory resource, receiving primary identification data, comparing the primary identification data with the stored identification data, and activating a display screen for a viewing angle in response to authentication of the primary identification data by the comparison of the primary identification data with the stored identification data. Another embodiment of the present disclosure provides a non-transitory machine-readable medium comprising a processing resource in communication with a memory resource having instructions executable to store identification data to a memory resource coupled to the computing device, receive primary identification data to identify an authorized user, determine whether a user is the authorized user based on the received primary identification data, and activate a display screen to enable viewing of the display screen within a viewing angle measured from a plane normal to the display screen based on the determination that the user is the authorized user. Yet another embodiment of the present disclosure provides an apparatus comprising a memory resource, and a controller coupled to the memory resource, wherein the controller is configured to apply a selective occlusion to an application on a computing device, receive primary identification data from a user, authenticate the primary identification data by comparing the primary identification data to stored identification data, and activate a display screen to enable viewing of the display screen within a viewing angle as measured from a plane normal to the screen in response to the authentication of the primary identification data. Drawings Fig. 1 is a functional block diagram in the form of a device having a display screen, an identification sensor, a memory resource, and a controller, according to various embodiments of the present disclosure. Fig. 2 is a diagram of an example computing device in the form of a mobile device containing a visible image on a display screen, according to various embodiments of the present disclosure. Fig. 3 is a diagram of an example computing device in the form of a mobile device including a display screen, an identification sensor, memory resources, and a controller, according to various embodiments of the present disclosure. Fig. 4 is a block diagram of an example of activating a display screen of a computing device in accordance with various embodiments of the present disclosure. Fig. 5 is a functional diagram representing processing resources in communication with a memory resource having instructions written thereon, in accordance with various embodiments of the present disclosure. Fig. 6 is a flow chart representing an example of display activation in accordance with various embodiments of the present disclosure. Fig. 7 is a flowchart of an example method for activating a display screen of a computing device, according to various embodiments of the present disclosure. Detailed Description Apparatuses, machine-readable media, and methods related to displaying images on a display screen of a computing device based on received data are described herein. Computing device display sc