Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
COVER APPARATUS AND METHOD FOR OBSTRUCTING MOBILE DEVICE CAMERA
Document Type and Number:
WIPO Patent Application WO/2019/005735
Kind Code:
A1
Abstract:
Provided herein are covers for obstructing the camera function of a mobile device and methods of using these covers. In certain embodiments, these covers allow access to and/or use of one or more non-camera functions of the device. The mobile device can detect obstruction of one or more cameras associated with a camera cover and determine that the camera cover is engaged. Upon determining that the camera cover is engaged, the mobile device can update security settings to allow access to the mobile device while the camera cover is engaged.

Inventors:
TRUEX PAUL (US)
KOZUCH JAMES (US)
Application Number:
PCT/US2018/039411
Publication Date:
January 03, 2019
Filing Date:
June 26, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
TRUEX PAUL FRANCIS (US)
KOZUCH JAMES MICHAEL (US)
International Classes:
B65D33/34; G03B11/00
Foreign References:
DE102005001274B32006-07-20
US8196442B12012-06-12
US20160267851A12016-09-15
US20160045005A12016-02-18
US20160259377A12016-09-08
US20150156301A12015-06-04
Attorney, Agent or Firm:
DICATO, Michael, J. et al. (US)
Download PDF:
Claims:
CLAIMS

What is claimed is:

I . A cover for storing a mobile device comprising:

a pouch component configured to receive a mobile device, wherein the pouch component comprises an obstructing material that obstructs usage of a camera function of the mobile device while allowing usage of one or more non-camera functions of the mobile device; and

a locking component configured to secure the mobile device inside the pouch component.

2. The cover of claim 1, wherein said obstructing material is a one-way see- through obstmcting material that inhibits light from reaching a camera lens or image sensor on the mobile device when the mobile device is inside the pouch component.

3. The cover of claim 2, wherein said one-way see-through obstructing material inhibits light from reaching the camera lens or image sensor by obstructing, interfering with, or distorting the light.

4. The cover of claim 3, wherein said one-way see-through obstructing material interferes with an autofocus function of the camera lens or image sensor.

5. The cover of claim 1, wherein said obstructing material is a film.

6. The cover of claim 1, wherein said obstructing material comprises a plastic coating.

7. The cover of claim 1, wherein said obstructing material includes a

characteristic selected from the group consisting of reflective, mirrored, iridescent, painted, and opaque.

8. The cover of claim 1, wherein said obstructing material is polarized.

9. The cover of claim 1 , wherein said obstmcting material is flexible.

10. The cover of claim 9, wherein said pouch component is flexible.

I I . The cover of claim 1, wherein said obstructing material is non-flexible.

12. The cover of claim 1, wherein said locking component is openabie using a combination, key, or electronic sensor.

13. The cover of claim 2, wherein attempting to open the locking component without authorization triggers a visible indicator.

14. The cover of claim 12, wherein attempting to open the locking component without authorization results in damage to the cover and/or the mobile device.

15 , The cover of cl aim 1 , wherein sai d cover i s di sposable.

16. The cover of claim 1, wherein said cover is reusable.

17. The cover of claim 1 , wherein said cover further comprises:

an adaptor component connectable to a port of the mobile device.

18. The cover of claim 17, wherein said adaptor component allows for charging of the mobile device while the mobile device is inside the pouch component.

19. The cover of claim 17, wherein said adaptor component obstructs one or more functions of the mobile device.

20. The cover of claim 19, wherein said one or more functions are selected from a group comprising a camera function, a wireless antenna function, and a cellular antenna function.

2 . A method of obstructing usage of a camera function of a mobile device comprising:

receiving a mobile device by a pouch component of a cover, wherein the pouch component comprises an obstructing material that obstructs usage of a camera function of the mobile device while allowing usage of one or more non-camera functions of the mobile device; and securing, by a locking component of the cover, the mobile device within the cover.

22. The method of claim 21, wherein said obstructing material is a one-way see- through obstructing material that inhibits light from reaching a camera lens or image sensor on the mobile device when the mobile device is inside the pouch component.

23. The method of claim 22, wherein said one-way see-through obstructing material inhibits light from reaching the camera lens or image sensor by obstructing, interfering with, or distorting the light.

24, The method of claim 23, wherein said one-way see-through obstructing material interferes with an autofocus function of the camera lens or image sensor.

25. The method of claim 21, wherein said obstructing material is a film.

26. The method of claim 21, wherein said obstructing material comprises a plastic coating.

27. The method of claim 21, wherein said obstructing material is selected from the group consisting of reflective, mirrored, iridescent, painted, and opaque.

28. The method of claim 21, wherein said obstructing material is polarized.

29. The method of claim 21, wherein said obstructing material is flexible.

30. The method of claim 29, wherein said pouch component is flexi ble,

31. The method of claim 21 , wherein said obstructing material is non-flexible.

32. The method of claim 21 , wherein said locking component is openable using a combination, key, or electronic sensor.

33. The method of claim 32, wherein attempting to open the locking component without authorization triggers a visible indicator of said attempt.

34. The method of claim 32, wherein attempting to open the locking component without authorization results in damage to the cover and/or the mobile device.

35. The method of claim 21, wherein said cover is disposable,

36. The method of claim 21, wherein said cover is reusable.

37. The method of claim 21, wherein said cover further comprises an adaptor component that connects to a port of the mobile device.

38. The method of claim 37, wherein said adaptor component allows for charging of the m obile device while the mobile device is inside the pouch component.

39. The method of claim 37, wherein said adaptor component obstructs one or more functions of the mobile device.

40. The method of claim 39, wherein said one or more functions are selected from a group consisting of a camera function, a wireless antenna function, and a cellular antenna function.

41. A method for managing login credentials of a mobile device, comprising: determining that a camera cover is engaged based on a correlation between a detected obstruction and at least one obstruction pattern stored in an obstruction database;

in response to determining that the camera cover is engaged, generating a selectable prompt, the selectable prompt indicative of an alternative security option;

receiving a selection of the selectable prompt; and

engaging an application programming interface (API) of an operating system of the mobile device to cause the operating system to set a security setting to the alternative security option.

42. The method of claim 41 , further comprising:

determining that the camera cover is disengaged by detecting an absence of the detected obstruction; and

in response to determining that the camera cover is disengaged, engaging the API of the operating system to cause the operating system to return the security setting to an initial security option.

43. The method of claim 41, wherein the alternative security option includes deactivate login credential requirement and employing a login credential alternative.

44. The method of claim 41, wherein determining that the camera cover is engaged comprises:

correlating the detected obstruction with obstruction patterns of the obstmction database, the obstruction patterns being indicative of obstmctive materi al of a camera cover; determining if the correlation between the detected obstmction and any obstmction pattern of the obstruction database is above a threshold; and

in response to determining that the correlation is above the threshold, determining that the camera cover is engaged.

Description:
CROSS-REFERENCE TO RELATED APPLICATIONS)

[0001] This application claims the benefit of U. S. Provisional Patent Application No.

62/526,978 filed on June 29, 2017, which is incorporated by reference herein in its entirety.

TECHNICAL FIELD

[0002] The present disclosure generally relates to mobile devices, and more specifically to an apparatus and method for obstructing a camera of a mobile device.

BACKGROUND

[0003] A substantial percentage of individuals in the US and worldwide own mobile devices such as smartphones and tablets, and many of these devices are equipped with cameras capable of shooting pictures and video. The omnipresence of such recording devices can create privacy concerns when device users are given access to sensitive or private areas or information. The constant ability to record can also create a distraction at events such as concerts, plays, etc. Many locations now post signs restricting the use of mobile devices generally or the camera function specifically. However, these signs do not guarantee compliance, and must be coupled with diligent monitoring to ensure that users are not surreptitiously shooting/recording. Another option is to force users to give up their devices while inside a specified area. This ensures compliance, but at a cost of completely eliminating device access.

SUMMARY

[0004] Provided herein in certain embodiments are covers for storing a mobile device that obstruct one or m ore camera functions of the mobile device while allowing use of or access to one or more non-camera functions. In certain embodiments, these covers comprise a pouch component into which the mobile device is inserted and a locking component that is used to seal the mobile device inside the pouch component, where the pouch component comprises an obstructing material responsible or partially responsible for obstructing one or more camera functions. In certain embodiments, the obstructing material is a one-way see- through material that inhibits light from reaching the lens or image sensor of the mobile device, for example by obstructing, interfering with, or distorting the light, while still allowing the user to see and/or access all or a portion of the mobile device, including all or

I part of the screen and/or keyboard. In certain embodiments, the obstructing material comprises a film and/or plastic coating, and in certain embodiments the obstructing material is reflective, mirrored, iridescent, painted, opaque, polarized, and/or circularly polarized. In certain embodiments, al l or a part of the pouch component, e.g., al l or a part of the obstructing material, is flexible (e.g., a bag) or non-flexible (e.g., a box). The locking mechanism may be integrated into, e.g., continuous with the edge of an opening in, the pouch component, or it may be a separate component that is clipped or otherwise attached to the pouch component. In certain embodiments, the locking component is openable using a combination, key, or electronic sensor. In certain embodiments, unauthorized attempts to open the locking component result in a visible indication of tampering, e.g., a change in color or visible damage or destruction, or result in emission of an auditory or wireless electronic signal. In certain embodiments, the covers provided herein or one or more components thereof are disposable. In other embodiments, the covers or one or more components thereof are reusable. In certain embodiments, the covers provided herein comprise one or more openings that are too small for insertion or removal of a mobile device, but which allow for access to the device with various adaptors, cable, and the like. In certain embodiments, the contains provided herein include one or more additional components in addition to the pouch component and locking component, including, e.g. , components to facilitate carrying or identification of the covers, components to obstruct one or more camera or non-camera functions, components to inhibit microphone function, components to inhibit transmittal or receipt of one or more wireless signals, or adaptors that plug into a port on the mobile device to facilitate charging, obstruct one or more camera or non-camera functions, or facilitate communication with another mobile device or with a computer, network, or other system.

[0005] Provided herein in certain embodiments are methods of using the covers provided herein to obstruct usage of one or more camera functions of a mobile device,

[0006] Provided herein in certain embodiments are methods of associating a camera obstruction with an alternative security protocol . A mobile application configured for execution by a mobile device can detect an obstruction of one or more cameras associated with a camera cover by analyzing an image captured by any of the one or more cameras of the mobile device. Upon detecting an obstruction associated with the camera cover, the mobile application can determine that the camera cover is engaged. Upon determining that the camera cover is engaged, the mobile application can cause security settings to be updated to allow access to the mobile device while the camera cover is engaged. BRIEF DESCRIPTION OF DRAWINGS

[0007] FIG. 1 shows a front view of one embodiment of a disclosed cover wherein the pouch component has bag-type configuration.

[0008] FIG. 2 shows a side view of one embodiment of a disclosed cover wherein the pouch component has a bag- or box-type configuration.

[0009] FIG. 3 shows an illustration of a disclosed cover having a wrap-type configuration.

[0010] FIGS. 4a and 4b show a front view and a back view of one embodiment of a di sclosed cover having a wrap-type configuration.

[0011] FIG. 5 shows a block diagram of a method for a mobile device to associate a camera obstractioii with an alternative security protocol, according to an embodiment.

[0012] FIG. 6 shows a block diagram of a method for initiating an alternative security protocol on a mobile device, according to an embodiment.

[0013] FIG. 7 is a diagrammatic representation of a machine in the example form of a computer system within which a set of instructions, for causing the machine to perform any one or more of the methodologies or modules discussed herein, can be executed.

[0014] The figures depict various embodiments of this disclosure for purposes of illustration only. One skil led in the art can readily recognize from the following discussion that alternative embodiments of the structures and methods illustrated herein can be employed without departing from the principles of the invention described herein.

DETAILED DESCRIPTION

Definitions

[0015] The term "mobile device" as used herein refers to any mobile communication or surveillance device with a camera function, and includes but is not limited to mobile phones such as smartphones, tablets, netbooks, and laptops.

[001 ] The term "camera function" as used herein refers to any camera or video function of a mobile device, including both built-in camera and video functions and additional functions derived from add-on apps or components, and includes but is not limited to the ability to take pictures or video and the ability to focus.

Covers

[0017] Disclosed herein are covers for holding a mobile device which allow access and/or usage of one or more non-camera functions of the mobile device while obstructing one or more camera functions of the mobile device while the device is inside the cover. In certain embodiments, the obstructing material obstructs all camera functionality. In other embodiments, only certain camera functionality is disabled. For example, in certain embodiments, the covers prevent a user from taking pictures or recording video, but do not prevent access to certain camera features such as photo viewing, editing, and the like.

[0018] In certain embodiments, the covers provided herein comprise a pouch component into which the mobile device may be inserted and a locking component for sealing the device inside the pouch. The pouch component comprises an obstructing material that obstructs one or more camera or video functions while allowing a user to access or use one or more non- camera functions of the device.

[0019] In certain embodiments, the pouch component may comprise a bag, box, envelope, wrap, or sheet-type configuration, or any other configuration suitable for allowing access and/or usage of one or more non-camera functions of a mobile device while obstructing one or more camera functions. In certain embodiments, the pouch component comprises one or more flaps that may be folded down when sealing the mobile device inside. In certain of these embodiments, the pouch component comprises one or more flaps adjacent to an opening in the pouch component for inserting removing a mobile device. In other embodiments, the pouch component comprises one or more flaps that are not adjacent to a specific pre-formed opening, but instead are used to close the pouch component around the mobile device. In certain embodiments wherein the pouch component comprises a flap, the flap may engage with another portion of the pouch component when folded down to seal in a mobile device, either directly or through a locking component. In certain of these

embodiments, the flap may engage with another flap of the pouch component.

[0020] In certain embodiments, the pouch component may have a bag-type configuration, such that the pouch component is flexible or semi-flexible and comprises a specific pre- formed opening for inserting/removing a mobile device. In certain embodiments, this opening may be on an end of the pouch component. In other embodiments, the opening is not located at an end. In certain embodiments, a pouch component having a bag-type configuration comprises one or more flaps that may be folded down when sealing the mobile device inside.

[0021] In certain embodiments, the pouch component may have a box-type configuration. In certain of these embodiments, the pouch component comprises an opening at an end for inserting/removing a mobile device, such that the mobile device is sealed inside by folding down one or more flaps. In other embodiments, a mobile device is placed into the box-type pouch component when the pouch component is in a non-assembled or semi -assembled, i.e., flattened or partially flattened, state. In these embodiments, the mobile device is sealed inside the pouch component by folding up one or more flaps to generate the assembled box- type pouch component.

[0022] In certain embodiments, the pouch component may have an envelope-type configuration, such that the mobile device is inserted into the envelope-type pouch

component and sealed inside by closing one or more flaps.

[0023] In certain embodiments, the pouch component may have a wrap- or sheet-type configuration. In these embodiments, there is no specific pre-formed opening in the pouch component for inserting a mobile device. Instead, the pouch component is wrapped around the mobile device in such a way as to obstruct one or more camera functions, e.g., by inhibiting light from reaching a lens or image sensor, while allowing use of and/or access to one or more non-camera functions. FIG. 3 shows an illustration of a cover having a wrap- type configuration adjacent to an example of a mobile device. FIGS. 4A and 4B show front and rear views, respectively, of one embodiment of a disclosed cover having a wrap-type configuration. The cover having a wrap-type configuration can include a flexible membrane and a locking component. The flexible membrane can include transparent and non- transparent portions. The transparent portion(s) of the flexible membrane can be configured to overlay a display of a mobile device. The non-transparent portion(s) of the flexible membrane can be configured to overlay one or more cameras of a mobile device. The flexible membrane can include a flexible and durable material such as, for example, a polymer (e.g.. polyolefm, polyvinyl chloride, polyethylene, polypropylene, polyurethane, etc.), copolymer (e.g., ethylene- vinyl acetate), composite polymer (e.g., nanoinfused polymer), elastomer (e.g., silicone rubber), graphene, nonwoven fabric (e.g., spunbond olefin fiber), or any combination thereof. The flexible membrane can include one or more transparent materials in the transparent portion and one or more non-transparent materials (e.g., translucent or opaque) in the non-transparent portion. In an example, the transparent and non-transparent portions can be composed of similar materials with a first additive (e.g., clarifying agent) in the

transparent portion and a second additive (e.g., resin and/or coloring) in the non-transparent portion. In another example, the transparent and non-transparent portions can be composed of different materials bonded together to form a contiguous membrane.

[0024] The cover can be positioned on a mobile device to obstruct one or more cameras without obstructing the display. The cover can be applied to the mobile device so that the non-transparent portion(s) obstruct one or more cameras (e.g., front and back cameras) of the mobile device while a transparent portion overlays a display of the mobile device. A user can align the cover into position and wrap the cover around the mobile device. Wrapping the cover around the mobile device can allow a locking mechanism to lock a first side of the cover to a second side of the cover. A position of the locking mechanism can be adjustable to tighten the cover onto the mobile device. Tightening the cover onto the mobile device can prevent removal and/or shifting the cover to another position. Preventing shifting of the cover can prevent a user from moving a transparent portion of the cover in front of one or more cameras to defeat the obstruction. The tightening function makes moving the cover difficult without causing damage to the mobile device.

[0025] In certain embodiments, the covers provided herein comprise one or more additional components beyond the pouch component and locking component, including but not limited to additional components that obstruct one or more non-camera functions of a mobile device, e.g., microphone functions, obstruct transmittal or receipt of one or more wireless signal s by the mobile device, facilitate charging of the mobile device, facilitate communication with another mobile device or with a computer, network, or other system, e.g., wireless signaling components, or facilitate carrying of the cover. In certain

embodiments, these additional components comprise adapters that can be plugged into a port of the mobile device.

[0026] In certain embodiments, the obstructing material of the pouch component is a oneway see-through obstructing material that allows a user to view all or a portion of the mobile device, including for example all or part of the mobile device screen or keyboard, but which inhibits light from reaching a lens or image sensor on the mobile device. In certain of these embodiments, the obstracting material inhibits light from reaching the lens or image sensor by obstructing, interfering with, or distorting the light. In certain embodiments, inhibition of light reaching the lens or image sensor is total, i.e., no light reaches the lens or image sensor. In other embodiments, the inhibition is partial, i.e., some light reaches the lens or image sensor, but still sufficient to obstruct camera function.

[0027] The obstructing material may comprise any material suitable for obstructing camera function, e.g., for inhibiting light from reaching the lens or image sensor of the enclosed mobile device. In certain embodiments, the obstructing material comprises plastic, nylon, or fabric. In certain embodiments, the obstructing material comprises a coating on one or more sides, including for example a film or plastic coating. For example, in certain embodiments the obstructing material comprises a coating on an exterior surface of the pouch component, or on both an exterior and an interior surface of the pouch component.

[0028] In certain embodiments, the obstructing material or a coating thereon comprises a fully or partially reflective, mirrored, polarized, iridescent, painted, or opaque material. In certain embodiments, the obstaicting material utilizes polarization or circular polarization to inhibit light from reaching a lens or image sensor.

[0029] In certain embodiments, a pouch component comprises an obstructing material in a single layer. In other embodiments, the pouch component comprises multiple layers of obstracting material . In these embodiments, the multiple layers may be the same or different obstructing materials.

[0030] In certain embodiments, the pouch component consists of or consists essentially of obstructing material, e.g., the pouch is made entirely or almost entirely of obstructing material. In other embodiments, the obstructing material comprises only a portion of the pouch component. In these embodiments, the remainder of the pouch component may be made of one or more secondan,' materials, including for example plastic, nylon, or fabric. In certain of these embodiments, the secondary material(s) are opaque in both directions, i .e., inhibiting light from traveling through in either direction.

[0031] In certain embodiments, the pouch component is flexible or partially flexible on one or more sides, and in certain of these embodiments the pouch component as a whole is flexible or partially flexible. In certain of these embodiments, the locking component and/or the cover as a whole are also flexible or partially flexible. In other embodiments, the pouch component is stiff en one or more sides, and in certain of these embodiments the pouch component as a whole is stif [0032] The locking component functions to seal the mobile device inside the pouch component to prevent unauthorized removal of the mobile device. Any appropriate means for achieving this result may be used. In certain embodiments, a cover provided herein comprises a single locking component. In other embodiments, the cover comprises two or more locking components.

[0033] In certain embodiments, the locking component is integrated into the pouch component. For example, the locking component may be affixed directly, e.g., sewn into or otherwise attached to, the pouch component at or near an opening or flap in the pouch component. For example, where the pouch component has a bag-type configuration, the locking component may be located at or near a pre-formed opening in the pouch component, either at the end of the pouch component or elsewhere. Similarly, where the pouch component comprises one or more flaps, the locking component may be located on or near those flaps.

[0034] In certain embodiments, portions of the locking component are separate from one another when the cover is in an unsealed state. For example, where the pouch component comprises one or more flaps, one portion of the locking component may be located on or near one or more of those flaps, while another portion of the locking component is located elsewhere on the body of the pouch component. Folding the ilapfs) down engages these portions of the locking component to seal the cover.

[0035] In certain embodiments, the locking component comprises separate closure and locking subcomponents. For example, the locking component may comprise a zipper or the like that functions as a closure subcomponent, and a lock subcomponent that functions to prevent the zipper from being opened. In other embodiments, closing and locking do not require separate subcomponents. For example, the locking component may comprise an adhesive or magnetic strip that simultaneously closes and locks the cover,

[0036] In certain embodiments, the locking component is not integrated directly into the pouch component, i.e., the locking component is a physically separate component that is only attached to the pouch component when the cover is being sealed. In these embodiments, the same locking component may be used with multiple pouch components.

[0037] In certain embodiments, closure of the pouch component necessarily results in sealing of the mobile device inside the cover. In other embodiments, an additional step (e.g., electronic scanning, engagement of a locking subcomponent of the locking component, etc.) is required to seal the mobile device into the cover after the pouch component is closed. [0038] In certain embodiments, the locking component is designed to completely prevent unauthorized removal of the mobile device from the pouch component. For example, the locking mechanism may utilize a lock that requires a key, a combination, or scanning with an electronic device in order to open. In other embodiments, the locking component does not necessarily prevent unauthorized removal, but generates a signal to indicate that such removal has taken place. For example, the locking component may generate a visual signal, e.g., a change in color, visual damage, etc., an auditor)-' signal, or some other indicator when opened by an unauthorized party. In certain embodiments, the locking component may generate a signal that is wirelessly transmitted to an electronic device to indicate that an unauthorized user is attempting to open it. In these embodiments, the signal may include identifying information such as an identif cation number or code specific to the cover such that an authorized party knows can identify the cover being opened.

[0039] In certain embodiments, the locking component provides a visual, auditory, or electronic indicator to confirm when it has been locked. In one such embodiment, locking creates a visual signal on the locking component itself, such as a change in color or the appearance of an unobstructed symbol, logo, or other image. In another embodiment, locking sends an electronic signal.

[0040] In certain embodiments, a cover disclosed herein and its components are configured, e.g., sized and shaped, to hold a specific brand, size, or model of mobile device. In other embodiments, the cover may be configured to hold a specific class of mobile device, e.g., a phone or a tablet. In still other embodiments, the cover may have a one-size-fits-all or one-size-fits-most configuration. In certain embodiments, one component of the cover may be configured to hold a specific brand, size, model, or class of mobile device, while one or more of the other components are configured as one-size-fits-all or one-size-fits-most. For example, the cover may comprise a one-size-fits-all or one-size-fits-most locking component paired with a pouch component configured to hold a specific brand, size, model, or class of mobile device. This type of configuration allows for easy interchangeability and adaptation to different device types.

[0041] A mobile device may include one or more cameras. For example, a first camera may be integrated in a front surface of the device and a second camera may be integrated into a back surface of the device. In certain embodiments wherein a mobile device includes two or more cameras, the covers provided herein may obstaict one or more camera functions for all of the cameras on the device, e.g., the covers may obstruct a function of cameras on both the front and back of the device. In other embodiments, the covers may obstmct one or more camera functions of only one of the cameras on the device.

[0042] In certain embodiments, the covers provided herein allow a user to access or use all non-camera functions of the enclosed mobi le device. In other embodiments, access or usability of non-camera functions is partially limited when the mobile device is inside the pouch component. For example, in certain embodiments, the covers provided herein prevent access to one or more audio functions, including for example the ability to record audio. In certain of these embodiments, the microphone of the mobile device is disabled entirely or partially. This may be accompli shed by shutting down the microphone using an electronic signal and/or software generated externally or by a component within the cover, physically muffling the microphone, or emitting a signal either externally or from a component within the cover that interferes with or overwhelms the microphone.

[0043] In certain embodiments, the covers provided herein obstruct transmittal of all or some wireless signals, e.g., a communication signal such as cellular, WiFi, or Bluetooth signal, to or from the enclosed mobile device. In these embodiments, the covers provide an additional layer of security by preventing the transfer of data or information by a user within a specified area or time. In certain of these embodiments, the cover obstructs ail wireless signal s to or from the mobi le device. In other embodiments, the cover obstructs only certain types of signals. For example, in certain embodiments, the cover may obstruct cellular signals from transmitting to and/or from a mobile device, while allowing transmittal of WiFi and/or Bluetooth signals. In certain of these embodiments, the mobile device is only able to connect with a specified WiFi network, allowing for monitoring of all WiFi activities.

[0044] In certain embodiments wherein the covers provided herein obstruct transmittal of all or some wireless signal s, obstructing may be a result of one or more materials making up the pouch component. For example, the pouch component may consist of, consist essentially, or comprise a material that obstructs wireless signals due to its dimensions, e.g., width, or composition, e.g., a metal lining that interferes with or otherwise inhibits passage of a wireless signal. This material may be the same obstructing material that obstructs camera function, or it may be one of the secondary materials. In other embodiments wherein the covers provided herein obstmct transmittal of ail or some wireless signals, obstructing may be the result of one or more additional components in the cover which actively interfere with or otherwise inhibit a wireless signal, e.g., a device that produces an electronic signal that interferes with or inhibits the wireless signal itself or interacts with the mobile device to prevent it from sending a signal in the first place. [0045] In certain embodiments, the covers provided herein or one or more components of these covers may be designed to prevent damage to an enclosed mobile device by dropping. For example, the pouch component may be stiff on one or more sides, including over its entirety, and/or may contain or incorporate various padding materials to absorb shock. In certain embodiments, the pouch component is waterproof or partially waterproof when the locking component is engaged. For example, in certain embodiments the cover is sweat- proof, e.g., for use in a gym setting.

[0046] In certain embodiments wherein the pouch component comprises one or more secondary materials in addition to the obstructing material, the obstructing material may be detachable from the remainder of the pouch. In certain of these embodiments, the obstructing material may be removed from the pouch component and replaced, or vice versa, and the obstructing material and/or the rest of the pouch component may be disposable. In certain embodiments, removal of the obstructing material from the remainder of the pouch component creates a space through which a mobile device can be inserted into or removed from the pouch component. In certain embodiments, this space constitutes the only opening in the pouch component large enough for mobile device insertion/removal, and in certain of these embodiments, the locking component is located at or near the interface between the obstructing material and the one or more secondary materials. For example, the mobile device may be inserted into the opening created by removal of the obstructing material, at which point the obstructing material may be attached to the rest of the pouch component, e.g., by snapping, sliding, or otherwise affixing the obstructing material in place, then secured by engagement of the locking component. In other embodiments, there may be another opening in the pouch component through which the mobile device may be inserted or removed.

[0047] In certain embodiments, one or more of the secondary materials m ay be designed to make the cover easier to carry or to prevent dropping. For example, in certain

embodiments, the secondary materials may comprise mbber or a rubberized material, and/or may be textured for easier gripping.

[0048] In certain embodiments, the covers provided herein may be disposable. In other embodiments, the covers may be reusable. In still other embodiments, part of the cover is disposable and other parts are reusable. For example, where the pouch component comprises both obstructing material and secondary materials, the obstructing material may be disposable and the secondary materials may be reusable, or vice versa. Similarly, in certain

embodiments, the pouch component is reusable while the locking component is not, or vice versa. In certain of these embodiments, the locking component is designed such that opening it results in damage or alterations that prevent its reuse. In certain embodiments, the entire cover is disposable. For example, a cover for use in a medical setting may be a single-use cover. In certain embodiments, the cover or one or more components thereof are sterile.

[0049] In certain embodiments, the pouch component includes one or more openings in addition to a primary opening used for insertion/removal of the mobile device. In certain embodiments, these additional openings are too small to allow for insertion/removal of the mobile device, but allow for access to the mobile device with various cords, adaptors, and the like. For example, the pouch component may include an opening for insertion of a charging adaptor/cord such that the device can be charged while stored in the cover. In certain embodiments, the pouch component may be customizable such that specific configurations of openings may be added after manufacture, for example by cutting or punching,

[0050] In those embodiments wherein the covers provided herein comprise one or more additional components besides the pouch component and locking component, these additional components may be physically integrated into, i.e., non-separable from, the pouch component and/or the locking component. In other embodiments, the additional components may be attached to, i.e., separable from, the pouch component and/or the locking component. In these embodiments, the additional components may be optional, i.e., they may be present or absent from the cover.

[0051] In certain embodiments, additional components of the covers provided herein include but are not limited to components to allow for easy carrying of the covers, such as lanyards, clips, or pins for affixing the covers to clothing or other surfaces. In other embodiments, the additional components include but are not limited to one or more wireless signaling components, for example to allow the cover to be tracked within a specified space or over a certain time period, to send an alert if the cover leaves a specified area, is damaged, or is subjected to unauthorized opening, or to facilitate communication between the mobile device and another mobile device or a computer, network, or system. In certain

embodiments, the additional components may be adapters comprising an insertion component that can be inserted into a port on the mobile device, e.g., a USB port, charging port, or headphone jack. In certain of these embodiments, the adapters further comprise one or more cables. Where the additional component is an adaptor, the adaptor may be used to charge the mobile device or to facilitate attachment to or communication with another device or with a computer, network, or other system. For example, where the additional component is a charging adapter, the insertion component of the charging adapter may be inserted into the mobile device when the device is inserted into the pouch component. The charging adaptor is electrically connected to a cable integrated into the cover, e.g., integrated into the pouch component, and/or to a separate adaptor on the exterior of the cover that can be connected to an external cable. In this way, the stored mobile device can be charged without inserting a charging cable into the interior of the pouch component. In other embodiments, one or more adaptors in the pouch component may function to obstruct one or more functions of the mobile device, such that plugging one of these adaptors into a port on the mobile device obstructs one or more mobile device functions.

[0052] In certain embodiments, the covers provided herein comprise and/or components thereof comprise one or more unique identifiers, e.g., identification numbers, barcodes, or signals that can be used to identify the specific cover or component. In certain embodiments, this unique identifier is associated with a specific mobile device upon insertion of the device, either by a person (e.g., by visual inspection or scanning) or automatically (e.g., by electronically scanning the cover). This allows for tracking and for a detailed log to be kept of the presence of a specific mobile device or its user.

Methods of obstructing

[0053] The covers provided herein are suitable for use anywhere that there is a need for preventing camera usage. For example, the covers provided herein may be used to prevent the unauthorized use of camera or video recorders in secure areas such as corporate offices, research facilities, military sites, or any other area containing sensitive and/or secret information, areas with privacy concerns such as locker rooms, or any other area where the use of cameras or video recorders presents a nuisance or danger. In certain embodiments, the covers may be used to safeguard intellectual property. For example, the covers provided herein may be used to prevent unauthorized photographing or filming of patented devices or materials; patent, trademark, or trade secret documents; copyrighted materials; or live or prerecorded events such as concerts, films, or speeches.

[0054] Accordingly, provided herein in certain embodiments are methods of obstructing one or more camera functions of a mobile device while allowing users to access and/or use one or more non-camera functions using the covers disclosed herein, as well as the use of the covers provided herein in such methods.

[0055] In certain embodiments the methods provided herein comprise inserting, or requiring a user to insert, a mobile device into a cover as disclosed herein and engaging the locking component. In certain embodiments, a mobile device user is unable to remove the mobile device from the cover within a specified space and/or during a specified time period. In other embodiments, the mobile device user may be able to remove or attempt to remove the mobile device from the cover without authorization, but such removal or attempt will trigger a visual, auditory, or electronic signal that indicates the removal or attempt. In certain embodiments, the methods provided herein further comprise authorized removal of the mobile device from the cover outside of a specified area and/or after a specified time period, In certain embodiments of the methods provided herein, the cover is disposed of after a single use. In certain embodiments, the cover is sterilized before and/or after each use.

Methods of engaging alternative security protocols

[0056] Further provided herein in certain embodiments are methods for a mobile device to associate a camera obstruction with an alternative security protocol, as well as applications and programs for implementing these methods. In certain embodiments, these methods may be used in conjunction with the covers provided herein, i.e., a cover as provided herein may provide the camera obstruction which causes the mobile device to engage an alternative security protocol.

[0057] FIG. 5 shows a block diagram of a method for a mobile device to associate a camera obstruction with an alternative security protocol, according to an embodiment. An application can detect an obstruction of one or more cameras of the mobile device (step 510). The application can run locally on the mobile device and/or remotely on another computing device. For example, functions of the application can be distributed among the mobi le device and one or more application servers. The obstruction can be detected by analyzing data from one or more sensors (e.g., the one or more cameras, a proximity sensor, or a combination thereof). For example, an image captured by a camera of the mobile device can be analyzed. In another example, a proximity sensor can emit electromagnetic radiation (e.g., infrared light) and analyze returned electromagnetic radiation. The proximity sensor can include, for example, a capacitive sensor, photoelectric sensor, a resistance sensor, a piezo sensor, or any combination thereof. The proximity sensor may be configured to detect distances within a short nominal range (e.g., less than one centimeter). In an embodiment, proximity sensors of a touch display of the mobile device can be employed to identify an obstruction to one or more cameras. For instance, if a camera extends into a touch display and proximity sensors of a display on either side of the camera detect a contiguous obstruction, obstruction of the camera can be deduced.

[0058] A detected obstruction can have a particularized signature. For example, an image of a detected obstruction can include textures and features of an object in front of the camera. In an example, proximity sensors can capture electromagnetic radiation having a particular signal and/or having varied detected distances among various proximity sensors. A distance map can be generated based on the various determined distances (e.g., various distances from a surface of a touchscreen display). The detected obstruction can be correlated with obstruction patterns stored in an obstruction database (step 520). The obstruction patterns can be indicative of obstructing material of a camera cover.

[0059] The application can determine if the correlation between the detected obstruction and any obstruction pattern of the obstruction database is above a threshold (step 530), The threshold can be a minimum percentage of correlation between the detected obstruction and an obstruction pattern. For example, the threshold can be at least 50% correspondence, at least 60% correspondence, at least 70% correspondence, at least 80% correspondence, etc. In response to determining a the correlation is above the threshold, determining that the camera cover is engaged (step 540). In response to determining the correlation is not above the threshold, determining that the camera cover is not engaged (step 550).

[0060] FIG. 6 shows a block diagram of a method for initiating an alternative security protocol on a mobile device, according to an embodiment. An application can initiate the alternative security protocol on the mobile device. The application can run locally on the mobile device and/or remotely on another computing device. The application can employ an application programming interface (API) of an operating system of the mobile device to cause the operating system to update one or more security settings,

[0061] A camera cover can hinder default login mechanisms for certain mobile devices. For example, the camera cover can hinder a facial recognition login mechanism, a fingerprint login mechanism, or a combination thereof. Since default login mechanisms may be hindered, the application can provide alternative security options for logging into the mobile device.

[0062] The application can generate a selectable prompt in response to determining that the camera cover is engaged (step 610). The selectable prompt can be indicative of an alternative security option. For example, the alternative security option can include deactivating login credential requirements, one or more other login credential alternatives (e.g., entering a passcode), maintain default settings, or a combination thereof. The selectable prompts can be provided to a graphical processing unit of the mobile device for display on a touchscreen display of the mobile device.

[0063] A selection of the prompt from a user can be received (step 620). The selection can be indicative of at least one security option (e.g., deactivate login credential requirement, a login credential alternative, or maintain default settings). Upon receiving a selection other than maintaining default settings, the application engages an API of the operating system of the mobile device to cause the operating system to set a security setting to the selected alternative security option (step 630),

[0064] The camera cover may remain temporarily on the mobile device. Once the camera cover is removed, the application can cause the security setting to return to an initial setting (e.g., fingerprint and/or facial detection). The application can periodically or continuously monitor for the camera cover once the obstruction has been detected. Monitoring can be performed by collecting data from one or more cameras and/or one or more proximity sensors. The application can detect an absence of an obstruction of one or more cameras of the mobile device (step 640). For example, one or more cameras can detect light above a threshold level. In an example, one or more proximity sensors can detect a distance above a threshold level (e.g., greater than one centimeter),

[0065] In response to detecting the absence of the obstruction, the application can engage the API of the operating system to cause the operating system to return the security setting to an initial security option (step 650). For example, if an initial setting for logging into the mobile device required fingerprint detection, the fingerprint detection requirement can be restored. In an example, if an initial setting for logging into the mobile device required facial detection, the facial detection requirement can be restored.

Computer and systems

[0066] FIG. 7 is a diagrammatic representation of a machine in the example form of a computer system 700 within which a set of instructions, for causing the machine to perform any one or more of the methodologies or modules discussed herein, can be executed.

[0067] In the example of FIG . 7, the computer system 700 includes a processor, memory, non-volatile memory, and an interface device. Various common components (e.g., cache memory) are omitted for illustrative simplicity. The computer system 700 is intended to illustrate a hardware device on which any of the components described in the example of FIGS. 5-6 (and any other components described in this specification) can be implemented. The computer system 700 can be of any applicable known or convenient type. The computer system 700 can be included in a mobile device. The components of the computer system 700 can be coupled together via a bus or through some other known or convenient device.

[0068] This disclosure contemplates the computer system 700 taking any suitable physical form. As example and not by way of limitation, computer system 700 can be an embedded computer system, a system -on-chip (SOC), a single-board computer system (SBC) (such as, for example, a computer-on-module (COM) or system-on-moduie (SOM)), a desktop computer system, a laptop or notebook computer system, an interactive kiosk, a mainframe, a mesh of computer systems, a mobile telephone, a personal digital assistant (PDA), a server, or a combination of two or more of these. Where appropriate, computer system 700 can include one or more computer systems 700; be unitary or distributed; span multiple locations, span multiple machines; or reside in a cloud, which can include one or more cloud components in one or more networks. Where appropriate, one or more computer systems 700 can perform without substantial spatial or temporal limitation one or more steps of one or more methods described or illustrated herein. As an example and not by way of limitation, one or more computer systems 700 can perform in real time or in batch mode one or more steps of one or more methods described or illustrated herein. One or more computer systems 700 can perform at different times or at different locations one or more steps of one or more methods described or illustrated herein, where appropriate.

[0069] The processor can be, for example, a conventional microprocessor such as an Intel Pentium microprocessor or Motorola PowerPC microprocessor. One of skill in the relevant art can recognize that the terms "machine-readable (storage) medium" or "computer-readable (storage) medium" include any type of device that is accessible by the processor.

[0070] The memory is coupled to the processor by, for example, a bus. The memory can include, by way of example but not limitation, random access memory (RAM), such as dynamic RAM (DRAM) and static RAM (SRAM). The memory can be local, remote, or distributed.

[0071] The bus also couples the processor to the non-volatile memory and drive unit. The non-volatile memory is often a magnetic floppy or hard disk, a magnetic-optical disk, an optical disk, a read-only memory (ROM), such as a CD-ROM, I ยท PROM , or EEPROM, a magnetic or optical card, or another form of storage for large amounts of data. Some of this data is often written, by a direct memory access process, into memory during execution of software in the computer system 700, The non-volatile storage can be local, remote, or distributed. The non-volatile memory is optional because systems can be created with all applicable data available in memory, A typical computer system can usually include at least a processor, memory, and a device (e.g., a bus) coupling the memory to the processor.

[0072] Software is typically stored in the non-volatile memory and/or the drive unit. Indeed, storing an entire large program in memory may not be possible. Nevertheless, it should be understood that for software to run, if necessary, it is moved to a computer readable location appropriate for processing, and for illustrative purposes, that location is referred to as the memory in this paper. Even when software is moved to the memory for execution, the processor can typically make use of hardware registers to store values associated with the software, and local cache that, ideally, serves to speed up execution. As used herein, a software program is assumed to be stored at any known or convenient location (from nonvolatile storage to hardware registers) when the software program is referred to as

"implemented in a computer-readable medium." A processor is considered to be "configured to execute a program" when at least one value associated with the program is stored in a register readable by the processor.

[0073] The bus also couples the processor to the network interface device. The interface can include one or more of a modem or network interface. It can be appreciated that a modem or network interface can be considered to be part of the computer system 700. The interface can include an analog modem, ISDN modem, cable modem, token ring interface, satellite transmission interface (e.g., "direct PC"), or other interfaces for coupling a computer system to other computer systems. The interface can include one or more input and/or output devices. The I/O devices can include, by way of example but not limitation, a keyboard, a mouse or other pointing device, disk drives, printers, a scanner, and other input and/or output devices, including a display device. The display device can include, by way of example but not limitation, a cathode ray tube (CRT), liquid crystal display (LCD), or some other applicable known or convenient display device. For simplicity, it is assumed that controllers of any devices not depicted in the example of FIG. 7 reside in the interface.

[0074] In operation, the computer system 700 can be controlled by operating system software that includes a file management system, such as a disk operating system. The file management system is typically stored in the non-volatile memory and/or drive unit and causes the processor to execute the various acts utilized by the operating system to input and output data and to store data in the memory, including storing files on the non-volatile memory and/or drive unit.

[0075] Some portions of the detailed description can be presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the means used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of operations leading to a desired result. The operations are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.

[0076] It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise as apparent from the following discussion, it is appreciated that throughout the description, discussions utilizing terms such as "processing" or "computing" or "calculating" or "determining" or "displaying" or

"generating" or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.

[0077] The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various systems can be used with programs in accordance with the teachings herein, or it can prove convenient to construct more specialized apparatus to perform the methods of some embodiments. The utilized staicture for a variety of these systems can appear from the description below. In addition, the techniques are not described with reference to any particular programming language, and various embodiments can thus be implemented using a variety of programming languages.

[0078] In alternative embodiments, the machine operates as a standalone device or can be connected (e.g., networked) to other machines. In a networked deployment, the machine can operate in the capacity of a server or a client machine in a client-seiver network environment, or as a peer machine in a peer-to-peer (or distributed) network environment.

[0079] The machine can be a server computer, a client computer, a personal computer (PC), a tablet PC, a laptop computer, a set-top box (STB), a personal digital assistant (PDA), a cellular telephone, an iPhone, a Blackberry, a processor, a telephone, a web appliance, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.

[0080] While the machine-readable medium or machine-readable storage medium is shown in an exemplary embodiment to be a single medium, the term "machine-readable medium" and "machine-readable storage medium " should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term "machine- readable medium" and "machine-readable storage medium" shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies or modules of the presently disclosed technique and innovation.

[0081] In general, the routines executed to implement the embodiments of the disclosure, can be implemented as part of an operating system or a specific application, component, program, object, module or sequence of instructions referred to as "computer programs." The computer programs typically comprise one or more instructions set at various times in various memory and storage devices in a computer, and that, when read and executed by one or more processing units or processors in a computer, cause the computer to perform operations to execute elements involving the various aspects of the disclosure.

[0082] Moreover, while embodiments have been described in the context of fully functioning computers and computer systems, those skilled in the art can appreciate that the various embodiments are capable of being distributed as a program product in a variety of forms, and that the disclosure applies equally regardless of the particular type of machine or computer-readable media used to actually effect the distribution.

[0083] Further examples of machine-readable storage media, machine-readable media, or computer-readable (storage) media include but are not limited to recordable type media such as volatile and non-volatile memory devices, floppy and other removable disks, hard disk drives, optical disks (e.g., Compact Disk Read-Only Memory (CD ROMS), Digital Versatile Disks, (DVDs), etc.), among others, and transmission type media such as digital and analog communication links.

[0084] In some circumstances, operation of a memory device, such as a change in state from a binary one to a binary zero or vice-versa, for example, can comprise a transformation, such as a physical transformation. With particular types of memory devices, such a physical transformation can comprise a physical transformation of an article to a different state or thing. For example, but without limitation, for some types of memory devices, a change in state can involve an accumulation and storage of charge or a release of stored charge.

Likewise, in other memory devices, a change of state can comprise a physical change or transformation in magnetic orientation or a physical change or transformation in molecular structure, such as from crystalline to amorphous or vice versa. The foregoing is not intended to be an exhaustive list in which a change in state for a binary one to a binary zero or vice- versa in a memory device can comprise a transformation, such as a physical transformation. Rather, the foregoing is intended as illustrative examples. [0085] A storage medium typically can be non-transitory or comprise a non-transitory device. In this context, a non-transitory storage medium can include a device that is tangible, meaning that the device has a concrete physical form, although the device can change its physical state. Thus, for example, non-transitory refers to a device remaining tangible despite this change in state.

Remarks

[0086] The foregoing description of various embodiments of the claimed subject matter has been provided for the purposes of illustration and description. It is not intended to be exhaustive or to limit the claimed subject matter to the precise forms disclosed. Many modifications and variations can be apparent to one skilled in the art. Embodiments were chosen and described in order to best describe the principles of the invention and its practical applications, thereby enabling others skilled in the relevant art to understand the claimed subject matter, the various embodiments, and the various modifications that are suited to the particular uses contemplated.

[0087] While embodiments have been described in the context of fully functioning computers and computer systems, those skilled in the art can appreciate that the various embodiments are capable of being distributed as a program product in a variety of forms, and that the disclosure applies equally regardless of the particular type of machine or computer- readable media used to actually effect the distribution.

[0088] Although the above Detailed Description describes certain embodiments and the best mode contemplated, no matter how detailed the above appears in text, the embodiments can be practiced in many ways. Details of the systems and methods can vary considerably in their implementation details, while still being encompassed by the specification. As noted above, particular terminology used when describing certain features or aspects of various embodiments should not be taken to imply that the terminology is being redefined herein to be restricted to any specific characteristics, features, or aspects of the invention with which that terminology is associated. In general, the terms used in the following claims should not be constmed to limit the invention to the specific embodiments disclosed in the specification, unless those terms are explicitly defi ned herein. Accordingly, the actual scope of the invention encompasses not only the disclosed embodiments, but also all equivalent ways of practicing or implementing the embodiments under the claims.

[0089] The language used in the specification has been principally selected for readability and instructional purposes, and it cannot have been selected to delineate or circumscribe the inventive subject matter. It is therefore intended that the scope of the invention be limited not by this Detailed Description, but rather by any claims that issue on an application based hereon. Accordingly, the disclosure of various embodiments is intended to be illustrative, not limiting, of the scope of the embodiments, which is set forth in the following claims.