Computing devices, such as laptop computers, desktop computers, and smartphones, may include a camera (e.g., webcam). The camera may capture electronic images such as photos and/or video images. The camera may capture the electronic images responsive to an input such as an input provided by a user and/or an application, among other possibilities. The cameras may be located on an external surface of the computing device, in order to promote capture of the electronic images. In addition to the camera, the external surface of the computing devices may include a microphone for capturing audio.
Privacy is a concern for users of such computing devices including cameras and/or microphones. For instance, control may be gained of a camera or microphone in a computing device for a variety of undesired reasons. For instance, control may be acquired of the camera included in the computing device and/or access may be gained to electronic images captured by the camera, unbeknownst to a user of the computing device. In some approaches, this may be possible because the camera may be visible and accessible to the user at all times during operation of the computing device. For example, in some approaches the camera (or microphone) may be mounted on an exterior portion of the computing device (e.g., on a display of the computing device), where it may be visible and accessible to the user during operation of the computing device.
Examples disclosed herein provide a cover for obscuring an opening found on the computing device, such as for a lens of the camera or the microphone, according to an example. By having the ability to physically obscure the opening via the cover, rather than via software or electronically, the user of the computing has physical assurance that the opening, such as for the camera lens or microphone, is covered, addressing the privacy concerns described above. For example, even if the webcam or microphone is hacked, where images or audio can be captured without knowledge of the user, using the cover to physically obscure or shutter the opening where the webcam or microphone is located prevents such capture from occurring. As will be further described, a first end of the cover may be fixed to the computing device, and a second end of the cover opposite the first end may be swiveled in either a first position that obscures the viewing portion of the opening, or a second position that exposes the viewing portion.
With reference to the figures,
In order to switch the cover 108 between a first position that obscures a viewing portion of the opening 106 and a second position that exposes the viewing portion of the opening 106, the housing 102 may include features to assist in swiveling the cover 108 between the two positions. Referring to
As an example, in order to prevent the cover 108 from moving beyond the first position that obscures the viewing portion of the opening 106, or the second position that exposes the viewing portion, the housing 102 may include tabs 118 on the bezel 104 that interacts with another tab 120 on the cover 108. Interaction between the tab 120 and one of the tabs 118 prevents the cover from swiveling past the tab 118, as will be further described. Placement of tabs 118, 120 may vary. For example, tabs 118, 120 may be located in the internal volume of the housing 102 instead, behind the bezel 104, where the tabs 118, 120 may be incorporated with the pin 110, to prevent the cover 108 from swiveling past the first or second positions. As an example of the features assisting the cover 108 to swivel between the two positions, first and second magnets 116 may be found in the internal volume of the housing 102, behind the bezel 104. One of the magnets 116 may be positioned on a first side of the opening 106, and the other magnet 116 may be positioned on a second side of the opening 106 that is opposite the first side of the opening 106. Placing the magnets 116 on either end of opening 106 allows for the cover 108 to swivel between the first and second positions, as will be further described.
Referring to
As an example, when the user desires to use the camera or microphone, the user may then flick or push the cover 108 with a force that overcomes the magnetic attraction between the cover 108 and magnet 116 positioned to the right of the opening 106. The force required for overcoming the magnetic attraction may be based on the field strength of the magnet 116, which may be controlled. As an example, upon overcoming the magnetic attraction, when the second end of the cover 108 (i.e., opposite the first end where the pin 110 is located) is pushed away from the first position illustrated in
Referring to
As an example, when the user desires to maintain privacy (i.e., back to the first position illustrated in
Referring to
Referring to
It is appreciated that examples described may include various components and features. It is also appreciated that numerous specific details are set forth to provide a thorough understanding of the examples. However, it is appreciated that the examples may be practiced without limitations to these specific details. In other instances, well known methods and structures may not be described in detail to avoid unnecessarily obscuring the description of the examples. Also, the examples may be used in combination with each other.
Reference in the specification to “an example” or similar language means that a particular feature, structure, or characteristic described in connection with the example is included in at least one example, but not necessarily in other examples. The various instances of the phrase “in one example” or similar phrases in various places in the specification are not necessarily all referring to the same example.
It is appreciated that the previous description of the disclosed examples is provided to enable any person skilled in the art to make or use the present disclosure. Various modifications to these examples will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other examples without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the examples shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2017/043842 | 7/26/2017 | WO | 00 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2019/022727 | 1/31/2019 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5117249 | Spector | May 1992 | A |
7520687 | Tsai | Apr 2009 | B2 |
7568848 | Ho | Aug 2009 | B2 |
D669112 | Gustaveson | Oct 2012 | S |
8531832 | Wu et al. | Sep 2013 | B2 |
9465276 | Jonsson et al. | Oct 2016 | B2 |
9535310 | Gonzalez et al. | Jan 2017 | B2 |
10317776 | Gustaveson, II | Jun 2019 | B2 |
20070253705 | Ho | Nov 2007 | A1 |
20130235462 | Haas | Sep 2013 | A1 |
20140016031 | Tsai | Jan 2014 | A1 |
20140198439 | Pietro | Jul 2014 | A1 |
20150059251 | Rinner | Mar 2015 | A1 |
20160105598 | Zeira | Apr 2016 | A1 |
20160161830 | Gonzalez et al. | Jun 2016 | A1 |
20170329206 | Gustaveson, II | Nov 2017 | A1 |
20180123631 | Hessabi | May 2018 | A1 |
20190204526 | Deng | Jul 2019 | A1 |
20200073073 | Lai | Mar 2020 | A1 |
20200196142 | Yang | Jun 2020 | A1 |
20200371406 | Hung | Nov 2020 | A1 |
Number | Date | Country |
---|---|---|
204496352 | Jul 2015 | CN |
202011106305 | Jan 2012 | DE |
133331 | Oct 2013 | RU |
Entry |
---|
“Nope—Simple and Elegant Magnetic Privacy Shield For Imacs, Macbooks, Laptops, and Desktops”, Erli Bird, Retrieved from internet—https://erlibird.com/go/nope, 2017, 6 Pages. |
Number | Date | Country | |
---|---|---|---|
20210208478 A1 | Jul 2021 | US |