US20130097416A1 - Dynamic profile switching - Google Patents
Dynamic profile switching Download PDFInfo
- Publication number
- US20130097416A1 US20130097416A1 US13/402,221 US201213402221A US2013097416A1 US 20130097416 A1 US20130097416 A1 US 20130097416A1 US 201213402221 A US201213402221 A US 201213402221A US 2013097416 A1 US2013097416 A1 US 2013097416A1
- Authority
- US
- United States
- Prior art keywords
- user
- value
- computing device
- profile
- user profile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 44
- 230000004044 response Effects 0.000 claims 2
- 230000001815 facial effect Effects 0.000 description 7
- 230000003287 optical effect Effects 0.000 description 4
- 238000003491 array Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 235000002673 Dioscorea communis Nutrition 0.000 description 1
- 241000544230 Dioscorea communis Species 0.000 description 1
- 208000035753 Periorbital contusion Diseases 0.000 description 1
- 238000010191 image analysis Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
- G06F9/4451—User profiles; Roaming
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2250/00—Details of telephonic subscriber devices
- H04M2250/52—Details of telephonic subscriber devices including functional features of a camera
Definitions
- the present disclosure relates to dynamically switching user profiles.
- Computing devices such as mobile telephones, tablets, and laptops have proliferated in recent years. These devices can be equipped with processors, memory, and the capability to communicate through local and wide area networks, including the Internet.
- the user of the computing device can establish a user profile and store a set of preferences for operating the computing device in the user profile.
- the user profile can include the files and folders saved by the user; the applications, software, programs, etc. downloaded to the computing device by the user; security settings for loading the user profile; operation restrictions for the user; layout of the display of the computing device including font size, icon size, type of wallpaper, etc.; and any other items or settings for operation of the user profile on the computing device.
- Disclosed herein are methods and apparatuses for dynamic switching of user profiles on computing devices.
- One aspect of the disclosed embodiments is a method of operating a computing device having an image-sensing device.
- the method includes identifying a first user profile under which the computing device is operating.
- the first user profile is associated with a first user value indicative of a first user.
- the method further includes receiving an image from the image-sensing device, generating a current user value indicative of a current user of the computing device based on the received image, determining if the current user value corresponds to the first user value, and configuring at least some programs operating on the computing device using a second user profile that is selected based on the current user value if the current user value does not correspond to the first user value.
- Another aspect of the disclosed embodiments is a method of operating a computing device having an image-sensing device.
- the method includes identifying a first user profile under which the computing device is operating.
- the first user profile is associated with a first user value indicative of a first user.
- the method further includes receiving an image from the image-sensing device, generating a current user value indicative of a current user of the computing device based on the received image, determining if the current user value corresponds to the first user value, and determining if a second user profile is available to the computing device if the current user value does not correspond to the first user value, the second user profile associated with a second user value.
- the computing device includes an input-output device, such as a display screen, an image-sensing device, a memory, and one or more processors.
- the one or more processors are configured to execute instructions stored in the memory to identify a first user profile under which the computing device is operating.
- the first user profile is associated with a first user value indicative of a first user.
- the one or more processors are further configured to receive an image from the image-sensing device, generate a current user value indicative of a current user of the computing device based on the received image, determine if the current user value corresponds to the first user value, and configure at least some programs operating on the computing device using a second user profile that is selected based on the current user value if the current user value does not correspond to the first user value.
- FIG. 1 is a block diagram showing an example of a computing device.
- FIGS. 2A and 2B are illustrations showing the operation of a profile utility application as displayed on the display screen of a computing device.
- FIG. 3 is an illustration showing an operation in which a different user profile is selected for operation of the computing device.
- FIG. 4 is a flow chart showing a process for dynamically switching a user profile on a computing device.
- Some device users can find some traditional methods of loading and operating a user profile cumbersome, such as providing a username and password, if the computing device includes a limited user interface. Some device users can also find some traditional methods of accessing a user profile difficult to execute. Some device users can be incapable of complying with some traditional methods but still need to be provided a specific user profile. For example, a young child can share a computing device with a parent and be capable of running some games and applications on the computing device and at the same time be incapable of entering a username and password.
- the apparatuses and methods described herein allow for switching from a first user profile to a second user profile, limiting access to the files, folders, applications, security settings, etc. of the first user of the computing device while loading the files, folders, applications, security settings, etc. of the second user of the computing device without requiring the first user to log out or lock operation of the computing device or the second user to manually enter information to load and operate the second user profile.
- FIG. 1 is a block diagram of an example of a computing device 10 .
- the computing device 10 can be in the form of a computing system including multiple computing devices, or in the form of a single computing device, for example, a mobile phone, a tablet computer, a laptop computer, a notebook computer, and the like.
- the computing device 10 can include a data processing apparatus, which in this case is a central processing unit, CPU 12 , and a memory 14 .
- the CPU 12 can be a conventional central processing unit.
- the CPU 12 can be any other type of device, or multiple devices now-existing or hereafter developed, capable of manipulating or processing information, including, for example, optical processors, quantum and/or molecular processors, general purpose processors, special purpose processors, IP cores, ASICS, programmable logic arrays, programmable logic controllers, microcode, firmware, microcontrollers, microprocessors, digital signal processors, memory, or any combination of the foregoing.
- processor should be understood as including any of the foregoing, either singly or in combination. Although the disclosed embodiments can be practiced with a single processor as shown, e.g. CPU 12 , advantages in speed and efficiency can be achieved using more than one processor.
- the memory 14 in the computing device 10 can be a random access memory device (RAM). Any other suitable type of storage device can be used as the memory 14 .
- the memory 14 can include code and data 18 that is accessed by the CPU 12 using a bus 16 .
- the memory 14 can further include an operating system 20 and application programs 22 , the application programs 22 including programs that permit the CPU 12 to perform the methods described herein.
- the application programs 22 can include applications 1 through N which further include a profile utility application that performs the methods described herein.
- the computing device 10 can also include a secondary storage 24 , which can, for example, be a memory card used with a mobile computing device 10 . Because the user profiles may contain a significant amount of information, they can be stored in whole or in part in the secondary storage 24 and loaded into the memory 14 as needed for processing.
- the computing device 10 can also include one or more input-output devices, such as a display screen 26 , which can be a touch sensitive display screen that combines a display with a touch sensitive element that is operable to sense touch inputs.
- the display screen 26 is coupled to the CPU 12 via the bus 16 .
- Other input-output devices that permit a user to program or otherwise use the computing device 10 can be provided in addition to or as an alternative to the display screen 26 .
- the input-output device is or includes a display
- the display can be implemented in various ways, including by a liquid crystal display (LCD) or a cathode-ray tube (CRT) or light emitting diode (LED) display, such as an OLED display.
- LCD liquid crystal display
- CRT cathode-ray tube
- LED light emitting diode
- the computing device 10 can also include an image-sensing device, for example front-facing camera 28 , or any other image-sensing device now existing or hereafter developed that can sense the image of a user operating the computing device 10 .
- the front-facing camera 28 can be positioned such that it is directed toward a user that is operating the computing device 10 . Stated another way, the position and optical axis of the front-facing camera 28 can be configured such that the field of vision of the front-facing camera 28 includes an area that is directly adjacent to the display screen 26 , from which the display screen 26 is visible.
- the front-facing camera 28 can be configured to receive images, for example, of the face of a user while the user is operating the computing device 10 .
- FIG. 1 depicts the CPU 12 and the memory 14 as being integrated into a single unit, other configurations can be utilized.
- the operations of the CPU 12 can be distributed across multiple machines (each machine having one or more of processors) which can be coupled directly or across a local area or other network.
- the memory 14 can be distributed across multiple machines such as network-based memory or memory in multiple machines performing the operations of the computing device 10 .
- the bus 16 can be composed of multiple buses.
- the secondary storage 24 can be directly coupled to the other components of the computing device 10 or can be accessed via a network and can comprise a single integrated unit such as a memory card or multiple units such as multiple memory cards.
- the computing device 10 can thus be implemented in a wide variety of configurations.
- FIGS. 2A and 2B are illustrations showing the operation of a profile utility application as displayed on the input-output device, in this case a display screen 26 , of a computing device 10 .
- the computing device 10 includes the image-sensing device, in this case the front-facing camera 28 , described in FIG. 1 .
- the front-facing camera 28 faces the user while the user operates the computing device 10 and is capable of receiving an image.
- the computing device 10 also includes various application programs 22 as described in FIG. 1 .
- Icons 32 a - e which render on the display screen 26 can represent a set of application programs 22 with each icon 32 a - e being capable of selection by a user to operate a given application program 22 on the computing device 10 .
- Different users of the same computing device 10 can each establish a user profile which includes preferences for operating the computing device 10 associated with the user.
- FIG. 2A shows the operation of a first user profile with the icons 32 a - e representing five different application programs 22 that a first user can operate on the computing device 10 as associated with the first user profile.
- FIG. 2B shows the operation of a second user profile with the icons 32 a - c representing three different application programs 22 that a second user can operate on the computing device 10 as associated with the second user profile.
- User profiles can include different application programs 22 that are available to different users, different settings for the computing device 10 such as font size and icon 32 a - e size as shown by comparing the icon 32 a - e size between FIG. 2A and FIG.
- FIG. 2B different files and folders as initiated and stored by different users, and different security and access settings that regulate what types of application programs 22 can be operated by the user on the computing device 10 .
- the first user profile shown in FIG. 2A has access to the Internet through icon 32 d and to a camera through icon 32 e, whereas the second user profile shown in FIG. 2B does not have icons enabling access to the internet or to the camera.
- the various application programs 22 , display settings, security and access settings, and files and folders available for a given user profile can be collectively described as “programs.”
- FIG. 3 is an illustration showing an operation in which a different user profile is selected for operation of the computing device 10 .
- a first user 40 and a second user 42 have both previously established user profiles on the computing device 10 .
- the image-sensing device in this example the front-facing camera 28 , is operable to capture one or more images of the first user 40 while the first user 40 is operating the computing device 30 by interacting with the display screen 26 .
- the computing device 10 can configure at least some programs that are operating on the computing device 10 using a first user profile that has been established by the first user 40 and is associated with the first user 40 .
- the first user profile can include a value that represents the first user 40 , such as an image of the first user's face, or data that is derived from or representative of the first user's face.
- the device can be handed to or picked up by the second user 42 .
- the front-facing camera 28 can capture an image of the second user 42 .
- the computing device 10 can configure at least some programs operating on the computing device 10 using the second user profile if the computing device 10 determines that the image of the second user 42 corresponds to a value that is stored in the second user profile.
- a second user profile can be utilized to configure the computing device 10 if the second user profile is associated in some way with the captured image of the second user 42 . This operation can be performed without an affirmative action that “logs out” the first user 40 , suspends operation of the computing device 10 , or locks operation of the computing device 10 .
- the first user 40 can be “logged out” of the device or have otherwise placed the computing device 10 into a low power state, a locked state, or other state in which the computing device 10 is no longer in active use.
- the computing device 10 may or may not continue to be configured according to the first user profile.
- the front-facing camera 28 can capture an image of the second user 42 .
- the computing device 10 can configure at least some programs operating on the computing device 10 using the second user profile if the computing device 10 determines that the image of the second user 42 corresponds to a value that is stored in the second user profile. That is to say that the second user profile is utilized to configure the computing device 10 if the second user profile is associated in some way with the captured image of the second user 42 .
- the second user 42 may not have previously established a user profile on the computing device 10 .
- the computing device 10 can deny access to the second user 42 or can allow access to the second user 42 . Examples for allowing access to the second user 42 when a user profile has not previously been established will be explained herein. The operations of the various methods of dynamically switching a user profile on the computing device 10 are further explained in connection with FIG. 4 below.
- FIG. 4 is a flow chart showing an example of a process 50 for dynamically switching a user profile on a computing device 10 .
- the computing device 10 is initially configured according to and operating under a first user profile.
- the computing device 10 can identify a first user profile under which the computing device 10 is operating.
- the first user profile can be associated with a first user value indicative of a first user.
- the first user value can have been previously generated by the computing device 10 based on one or more images associated with a first user of the computing device 10 .
- one or more images of the first user can be captured by the image-sensing device, e.g. the front-facing camera 28 , on the computing device 10 and an image-analysis algorithm can be employed to analyze the one or more images of the first user and generate geometric data indicative of one or more facial features in the one or more images that can be used as a first user value.
- the first user value can be the basis for comparison to geometric data generated from images captured during operation of the computing device 10 by a current user.
- the computing device 10 can receive an image from the front-facing camera 28 .
- the image received can be that of the face of the current user of the computing device 10 .
- the computing device 10 can generate a current user value indicative of the current user of the computing device 10 based on the image received in stage 54 .
- the current user value can be generated by a facial recognition application program detecting one or more specific positions, or coordinates, of facial features (e.g. corners of the eyes, corners of the mouth, top and bottom edges of the lips, etc.). Other facial features and positions are also possible and can be detected by the facial recognition application to generate the current user value.
- the computing device 10 can compare the current user value to the first user value. For example, the computing device 10 can compare the coordinates of facial features of the first user value and current user value.
- the computing device 10 can make a determination as to whether the current user value corresponds to the first user value. For example, the computing device 10 can determine if a coordinate comparison between the current user value and first user value indicates that the coordinates are similar enough to indicate to the computing device 10 that the current user has the same identity as the first user having the first user profile operating on the computing device 10 .
- the computing device 10 determines that the current user value corresponds to the first user value, the computing device 10 can continue to operate using the first user profile at stage 62 . If the computing device 10 continues to operate using the first user profile, the process 50 ends.
- the current user in this case the first user, need not be aware that the process 50 has occurred, allowing seamless operation of the computing device 10 .
- Stages 52 through 58 and decision block 60 of process 50 can occur periodically, at a set interval or prompt by an application program, or continuously during the operation of the computing device 10 .
- the profile utility application can also be disabled by the current user in the case where the current user wishes to allow another user to operate the computing device 10 without switching profiles.
- the computing device 10 determines that the current user value does not correspond to the first user value, the computing device 10 can be configured to operate at least some programs using a second user profile that is selected based on the current user value at stage 64 . If the computing device 10 configures at least some programs using the second user profile, the process 50 ends. There are several embodiments of stage 64 that will be described below.
- the computing device 10 can compare the current user value to a stored user value of each user profile of a plurality of stored user profiles. If the current user value does not correspond to the stored user value of any user profile of the plurality of stored user profiles, the computing device 10 can select a guest profile as the second user profile.
- the guest profile can have limited access to application programs 22 , files, folders, etc. This embodiment allows a current user without a stored user profile to operate the computing device 10 without exposing the security settings, files, folders, application programs 22 , etc. of stored user profiles to the current user.
- the computing device 10 can compare the current user value to a stored user value of each user profile of a plurality of stored user profiles. If the current user value does not correspond to the stored user value of any user profile of the plurality of stored user profiles, the computing device 10 can create the second user profile for the current user and display an interface for configuring the second user profile to the current user.
- This embodiment allows a current user without a stored user profile to configure their own user profile on the computing device 10 specifying the security settings, application programs 22 , etc. the current user prefers to use while operating the computing device 10 without exposing the security settings, files, folders, application programs 22 , etc. of stored user profiles to the current user.
- the computing device 10 can compare the current user value to a stored user value of each user profile of a plurality of stored user profiles. If the current user value does not correspond to the stored user value of any stored user profile of the plurality of stored user profiles, the computing device 10 can display one or more indicators, wherein each indicator of the one or more indicators is associated with a respective stored user profile of the plurality of stored user profiles. The current user can select an indicator using the user interface of the computing device 10 . The computing device 10 can receive the signal that the current user has selected an indicator of the one or more indicators, and the computing device 10 can select the stored user profile that is associated with the selected indicator as the second user profile to be configured on the computing device 10 .
- This embodiment is useful in the case where the current user value does not correspond to a stored user value due to changes to the physical features of the current user, for example, changes in facial hair, low lighting during the image capture, changes in eyeglasses for the current user, an inconvenient black eye, etc.
- the computing device 10 can further require additional security measures, such as a password or PIN number entry, if the current user selects a stored user profile due to the current user value failing to correspond to a stored user value.
- the computing device 10 can compare the current user value to a stored user value of each user profile of a plurality of stored user profiles. If the current user value corresponds to a stored user value of a stored user profile, the computing device 10 can send a notification to the user, the notification requesting selection of the first user profile, e.g. the current user profile, or the second user profile, e.g. the stored user profile.
- the notification can be, for example, an indicator that another profile is available for use displayed in the background or on a notification bar on the display screen 26 of the computing device 10 .
- the computing device 10 receives a signal indicating selection of the first user profile, the computing device 10 continues to operate using the first user profile. If the computing device 10 receives a signal indicating selection of the second user profile, the computing device 10 configures at least some programs using the second user profile. If the notification is ignored, the computing device 10 continues to operate using the first user profile.
- This embodiment is useful in the case where a second user seeks to update settings, applications, or features for a first user without immediately switching user profiles.
- the second user can be a parent and the first user a child with the parent picking up the computing device 10 to install a new application for the child currently using the computing device 10 .
- the first user profile and second user profile can be stored in a location external to the computing device 10 .
- a computing device 10 can be a public device such as a clock-radio in a hotel room capable of operating with user profiles.
- the current user of the clock-radio can have a user profile stored using a cloud computing service, or the cloud.
- the cloud can include hundreds or thousands of servers configured to provide scalable computing resources. Storing the user profile on the cloud can, for example, allow more than one computing device 10 to access the user profile.
- the current user of the clock-radio can access personal files, folders, and/or application programs 22 on the clock-radio after the clock-radio has been configured with the stored user profile associated with the current user.
- the embodiments of the computing device 10 can be realized in hardware including, for example, intellectual property (IP) cores, application-specific integrated circuits (ASICs), programmable logic arrays, optical processors, programmable logic controllers, microcode, firmware, microcontrollers, servers, microprocessors, digital signal processors or any other suitable circuit.
- IP intellectual property
- ASICs application-specific integrated circuits
- programmable logic arrays optical processors
- programmable logic controllers microcode
- firmware firmware
- microcontrollers servers
- microprocessors digital signal processors or any other suitable circuit.
- processors should be understood as encompassing any the foregoing, either singly or in combination.
- signal and “data” are used interchangeably.
- portions of computing device 10 do not necessarily have to be implemented in the same manner.
- the computing device 10 can be implemented using a general purpose computer/processor with a computer program that, when executed, carries out any of the respective methods, algorithms and/or instructions described herein.
- a special purpose computer/processor can be utilized which can contain specialized hardware for carrying out any of the methods, algorithms, or instructions described herein.
- a computer-usable or computer-readable medium can be any device that can, for example, tangibly contain, store, communicate, or transport the program for use by or in connection with any processor.
- the medium can be, for example, an electronic, magnetic, optical, electromagnetic, or a semiconductor device. Other suitable mediums are also available.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Environmental & Geological Engineering (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Human Computer Interaction (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
- This application claims priority to U.S. Provisional Patent Application No. 61/570,521, filed Dec. 14, 2011, which is hereby incorporated by reference in its entirety.
- The present disclosure relates to dynamically switching user profiles.
- Computing devices such as mobile telephones, tablets, and laptops have proliferated in recent years. These devices can be equipped with processors, memory, and the capability to communicate through local and wide area networks, including the Internet. With some computing devices, the user of the computing device can establish a user profile and store a set of preferences for operating the computing device in the user profile. The user profile can include the files and folders saved by the user; the applications, software, programs, etc. downloaded to the computing device by the user; security settings for loading the user profile; operation restrictions for the user; layout of the display of the computing device including font size, icon size, type of wallpaper, etc.; and any other items or settings for operation of the user profile on the computing device.
- Disclosed herein are methods and apparatuses for dynamic switching of user profiles on computing devices.
- One aspect of the disclosed embodiments is a method of operating a computing device having an image-sensing device. The method includes identifying a first user profile under which the computing device is operating. The first user profile is associated with a first user value indicative of a first user. The method further includes receiving an image from the image-sensing device, generating a current user value indicative of a current user of the computing device based on the received image, determining if the current user value corresponds to the first user value, and configuring at least some programs operating on the computing device using a second user profile that is selected based on the current user value if the current user value does not correspond to the first user value.
- Another aspect of the disclosed embodiments is a method of operating a computing device having an image-sensing device. The method includes identifying a first user profile under which the computing device is operating. The first user profile is associated with a first user value indicative of a first user. The method further includes receiving an image from the image-sensing device, generating a current user value indicative of a current user of the computing device based on the received image, determining if the current user value corresponds to the first user value, and determining if a second user profile is available to the computing device if the current user value does not correspond to the first user value, the second user profile associated with a second user value.
- Another aspect of the disclosed embodiments is a computing device. The computing device includes an input-output device, such as a display screen, an image-sensing device, a memory, and one or more processors. The one or more processors are configured to execute instructions stored in the memory to identify a first user profile under which the computing device is operating. The first user profile is associated with a first user value indicative of a first user. The one or more processors are further configured to receive an image from the image-sensing device, generate a current user value indicative of a current user of the computing device based on the received image, determine if the current user value corresponds to the first user value, and configure at least some programs operating on the computing device using a second user profile that is selected based on the current user value if the current user value does not correspond to the first user value.
- These and other embodiments will be described in additional detail hereafter.
- The description herein makes reference to the accompanying drawings wherein like reference numerals refer to like parts throughout the several views, and wherein:
-
FIG. 1 is a block diagram showing an example of a computing device. -
FIGS. 2A and 2B are illustrations showing the operation of a profile utility application as displayed on the display screen of a computing device. -
FIG. 3 is an illustration showing an operation in which a different user profile is selected for operation of the computing device. -
FIG. 4 is a flow chart showing a process for dynamically switching a user profile on a computing device. - As computing devices proliferate, so do the number of users operating each computing device. Some device users can find some traditional methods of loading and operating a user profile cumbersome, such as providing a username and password, if the computing device includes a limited user interface. Some device users can also find some traditional methods of accessing a user profile difficult to execute. Some device users can be incapable of complying with some traditional methods but still need to be provided a specific user profile. For example, a young child can share a computing device with a parent and be capable of running some games and applications on the computing device and at the same time be incapable of entering a username and password.
- The apparatuses and methods described herein, in some cases, allow for switching from a first user profile to a second user profile, limiting access to the files, folders, applications, security settings, etc. of the first user of the computing device while loading the files, folders, applications, security settings, etc. of the second user of the computing device without requiring the first user to log out or lock operation of the computing device or the second user to manually enter information to load and operate the second user profile.
-
FIG. 1 is a block diagram of an example of acomputing device 10. Thecomputing device 10 can be in the form of a computing system including multiple computing devices, or in the form of a single computing device, for example, a mobile phone, a tablet computer, a laptop computer, a notebook computer, and the like. - The
computing device 10 can include a data processing apparatus, which in this case is a central processing unit, CPU 12, and amemory 14. As an example, the CPU 12 can be a conventional central processing unit. Alternatively, the CPU 12 can be any other type of device, or multiple devices now-existing or hereafter developed, capable of manipulating or processing information, including, for example, optical processors, quantum and/or molecular processors, general purpose processors, special purpose processors, IP cores, ASICS, programmable logic arrays, programmable logic controllers, microcode, firmware, microcontrollers, microprocessors, digital signal processors, memory, or any combination of the foregoing. In the claims, the term “processor” should be understood as including any of the foregoing, either singly or in combination. Although the disclosed embodiments can be practiced with a single processor as shown, e.g. CPU 12, advantages in speed and efficiency can be achieved using more than one processor. - The
memory 14 in thecomputing device 10 can be a random access memory device (RAM). Any other suitable type of storage device can be used as thememory 14. Thememory 14 can include code anddata 18 that is accessed by the CPU 12 using abus 16. Thememory 14 can further include anoperating system 20 andapplication programs 22, theapplication programs 22 including programs that permit the CPU 12 to perform the methods described herein. For example, theapplication programs 22 can includeapplications 1 through N which further include a profile utility application that performs the methods described herein. Thecomputing device 10 can also include asecondary storage 24, which can, for example, be a memory card used with amobile computing device 10. Because the user profiles may contain a significant amount of information, they can be stored in whole or in part in thesecondary storage 24 and loaded into thememory 14 as needed for processing. - The
computing device 10 can also include one or more input-output devices, such as adisplay screen 26, which can be a touch sensitive display screen that combines a display with a touch sensitive element that is operable to sense touch inputs. Thedisplay screen 26 is coupled to the CPU 12 via thebus 16. Other input-output devices that permit a user to program or otherwise use thecomputing device 10 can be provided in addition to or as an alternative to thedisplay screen 26. When the input-output device is or includes a display, the display can be implemented in various ways, including by a liquid crystal display (LCD) or a cathode-ray tube (CRT) or light emitting diode (LED) display, such as an OLED display. - The
computing device 10 can also include an image-sensing device, for example front-facingcamera 28, or any other image-sensing device now existing or hereafter developed that can sense the image of a user operating thecomputing device 10. The front-facingcamera 28 can be positioned such that it is directed toward a user that is operating thecomputing device 10. Stated another way, the position and optical axis of the front-facingcamera 28 can be configured such that the field of vision of the front-facingcamera 28 includes an area that is directly adjacent to thedisplay screen 26, from which thedisplay screen 26 is visible. The front-facingcamera 28 can be configured to receive images, for example, of the face of a user while the user is operating thecomputing device 10. - Although
FIG. 1 depicts the CPU 12 and thememory 14 as being integrated into a single unit, other configurations can be utilized. The operations of the CPU 12 can be distributed across multiple machines (each machine having one or more of processors) which can be coupled directly or across a local area or other network. Thememory 14 can be distributed across multiple machines such as network-based memory or memory in multiple machines performing the operations of thecomputing device 10. Although depicted here as a single bus, thebus 16 can be composed of multiple buses. Further, thesecondary storage 24 can be directly coupled to the other components of thecomputing device 10 or can be accessed via a network and can comprise a single integrated unit such as a memory card or multiple units such as multiple memory cards. Thecomputing device 10 can thus be implemented in a wide variety of configurations. -
FIGS. 2A and 2B are illustrations showing the operation of a profile utility application as displayed on the input-output device, in this case adisplay screen 26, of acomputing device 10. Thecomputing device 10 includes the image-sensing device, in this case the front-facingcamera 28, described inFIG. 1 . The front-facingcamera 28 faces the user while the user operates thecomputing device 10 and is capable of receiving an image. Thecomputing device 10 also includesvarious application programs 22 as described inFIG. 1 . Icons 32 a-e which render on thedisplay screen 26 can represent a set ofapplication programs 22 with each icon 32 a-e being capable of selection by a user to operate a givenapplication program 22 on thecomputing device 10. Different users of thesame computing device 10 can each establish a user profile which includes preferences for operating thecomputing device 10 associated with the user. -
FIG. 2A shows the operation of a first user profile with the icons 32 a-e representing fivedifferent application programs 22 that a first user can operate on thecomputing device 10 as associated with the first user profile.FIG. 2B shows the operation of a second user profile with the icons 32 a-c representing threedifferent application programs 22 that a second user can operate on thecomputing device 10 as associated with the second user profile. User profiles can includedifferent application programs 22 that are available to different users, different settings for thecomputing device 10 such as font size and icon 32 a-e size as shown by comparing the icon 32 a-e size betweenFIG. 2A andFIG. 2B , different files and folders as initiated and stored by different users, and different security and access settings that regulate what types ofapplication programs 22 can be operated by the user on thecomputing device 10. For example, the first user profile shown inFIG. 2A has access to the Internet throughicon 32 d and to a camera throughicon 32 e, whereas the second user profile shown inFIG. 2B does not have icons enabling access to the internet or to the camera. Thevarious application programs 22, display settings, security and access settings, and files and folders available for a given user profile can be collectively described as “programs.” -
FIG. 3 is an illustration showing an operation in which a different user profile is selected for operation of thecomputing device 10. In this example, afirst user 40 and asecond user 42 have both previously established user profiles on thecomputing device 10. The image-sensing device, in this example the front-facingcamera 28, is operable to capture one or more images of thefirst user 40 while thefirst user 40 is operating the computing device 30 by interacting with thedisplay screen 26. Thecomputing device 10 can configure at least some programs that are operating on thecomputing device 10 using a first user profile that has been established by thefirst user 40 and is associated with thefirst user 40. The first user profile can include a value that represents thefirst user 40, such as an image of the first user's face, or data that is derived from or representative of the first user's face. - In this example, during the time period when the
computing device 10 is configured according to the first user profile (i.e. operating under the first user profile), the device can be handed to or picked up by thesecond user 42. The front-facingcamera 28 can capture an image of thesecond user 42. Thecomputing device 10 can configure at least some programs operating on thecomputing device 10 using the second user profile if thecomputing device 10 determines that the image of thesecond user 42 corresponds to a value that is stored in the second user profile. A second user profile can be utilized to configure thecomputing device 10 if the second user profile is associated in some way with the captured image of thesecond user 42. This operation can be performed without an affirmative action that “logs out” thefirst user 40, suspends operation of thecomputing device 10, or locks operation of thecomputing device 10. - In other examples, the
first user 40 can be “logged out” of the device or have otherwise placed thecomputing device 10 into a low power state, a locked state, or other state in which thecomputing device 10 is no longer in active use. Thecomputing device 10 may or may not continue to be configured according to the first user profile. When thecomputing device 10 is picked up by thesecond user 42, the front-facingcamera 28 can capture an image of thesecond user 42. Thecomputing device 10 can configure at least some programs operating on thecomputing device 10 using the second user profile if thecomputing device 10 determines that the image of thesecond user 42 corresponds to a value that is stored in the second user profile. That is to say that the second user profile is utilized to configure thecomputing device 10 if the second user profile is associated in some way with the captured image of thesecond user 42. - In other examples, the
second user 42 may not have previously established a user profile on thecomputing device 10. In these examples, thecomputing device 10 can deny access to thesecond user 42 or can allow access to thesecond user 42. Examples for allowing access to thesecond user 42 when a user profile has not previously been established will be explained herein. The operations of the various methods of dynamically switching a user profile on thecomputing device 10 are further explained in connection withFIG. 4 below. -
FIG. 4 is a flow chart showing an example of aprocess 50 for dynamically switching a user profile on acomputing device 10. Inprocess 50, thecomputing device 10 is initially configured according to and operating under a first user profile. - In
stage 52, thecomputing device 10 can identify a first user profile under which thecomputing device 10 is operating. The first user profile can be associated with a first user value indicative of a first user. The first user value can have been previously generated by thecomputing device 10 based on one or more images associated with a first user of thecomputing device 10. For example, one or more images of the first user can be captured by the image-sensing device, e.g. the front-facingcamera 28, on thecomputing device 10 and an image-analysis algorithm can be employed to analyze the one or more images of the first user and generate geometric data indicative of one or more facial features in the one or more images that can be used as a first user value. The first user value can be the basis for comparison to geometric data generated from images captured during operation of thecomputing device 10 by a current user. - In
stage 54, thecomputing device 10 can receive an image from the front-facingcamera 28. The image received can be that of the face of the current user of thecomputing device 10. - In
stage 56, thecomputing device 10 can generate a current user value indicative of the current user of thecomputing device 10 based on the image received instage 54. For example, the current user value can be generated by a facial recognition application program detecting one or more specific positions, or coordinates, of facial features (e.g. corners of the eyes, corners of the mouth, top and bottom edges of the lips, etc.). Other facial features and positions are also possible and can be detected by the facial recognition application to generate the current user value. - In
stage 58, thecomputing device 10 can compare the current user value to the first user value. For example, thecomputing device 10 can compare the coordinates of facial features of the first user value and current user value. - In
decision block 60, thecomputing device 10 can make a determination as to whether the current user value corresponds to the first user value. For example, thecomputing device 10 can determine if a coordinate comparison between the current user value and first user value indicates that the coordinates are similar enough to indicate to thecomputing device 10 that the current user has the same identity as the first user having the first user profile operating on thecomputing device 10. - If, at
decision block 60, thecomputing device 10 determines that the current user value corresponds to the first user value, thecomputing device 10 can continue to operate using the first user profile atstage 62. If thecomputing device 10 continues to operate using the first user profile, theprocess 50 ends. The current user, in this case the first user, need not be aware that theprocess 50 has occurred, allowing seamless operation of thecomputing device 10.Stages 52 through 58 anddecision block 60 ofprocess 50 can occur periodically, at a set interval or prompt by an application program, or continuously during the operation of thecomputing device 10. The profile utility application can also be disabled by the current user in the case where the current user wishes to allow another user to operate thecomputing device 10 without switching profiles. - If, at
decision block 60, thecomputing device 10 determines that the current user value does not correspond to the first user value, thecomputing device 10 can be configured to operate at least some programs using a second user profile that is selected based on the current user value atstage 64. If thecomputing device 10 configures at least some programs using the second user profile, theprocess 50 ends. There are several embodiments ofstage 64 that will be described below. - In one embodiment of
stage 64 where the current user value does not correspond to the first user value, thecomputing device 10 can compare the current user value to a stored user value of each user profile of a plurality of stored user profiles. If the current user value does not correspond to the stored user value of any user profile of the plurality of stored user profiles, thecomputing device 10 can select a guest profile as the second user profile. The guest profile can have limited access toapplication programs 22, files, folders, etc. This embodiment allows a current user without a stored user profile to operate thecomputing device 10 without exposing the security settings, files, folders,application programs 22, etc. of stored user profiles to the current user. - In another embodiment of
stage 64 where the current user value does not correspond to the first user value, thecomputing device 10 can compare the current user value to a stored user value of each user profile of a plurality of stored user profiles. If the current user value does not correspond to the stored user value of any user profile of the plurality of stored user profiles, thecomputing device 10 can create the second user profile for the current user and display an interface for configuring the second user profile to the current user. This embodiment allows a current user without a stored user profile to configure their own user profile on thecomputing device 10 specifying the security settings,application programs 22, etc. the current user prefers to use while operating thecomputing device 10 without exposing the security settings, files, folders,application programs 22, etc. of stored user profiles to the current user. - In another embodiment of
stage 64 where the current user value does not correspond to the first user value, thecomputing device 10 can compare the current user value to a stored user value of each user profile of a plurality of stored user profiles. If the current user value does not correspond to the stored user value of any stored user profile of the plurality of stored user profiles, thecomputing device 10 can display one or more indicators, wherein each indicator of the one or more indicators is associated with a respective stored user profile of the plurality of stored user profiles. The current user can select an indicator using the user interface of thecomputing device 10. Thecomputing device 10 can receive the signal that the current user has selected an indicator of the one or more indicators, and thecomputing device 10 can select the stored user profile that is associated with the selected indicator as the second user profile to be configured on thecomputing device 10. This embodiment is useful in the case where the current user value does not correspond to a stored user value due to changes to the physical features of the current user, for example, changes in facial hair, low lighting during the image capture, changes in eyeglasses for the current user, an inconvenient black eye, etc. Thecomputing device 10 can further require additional security measures, such as a password or PIN number entry, if the current user selects a stored user profile due to the current user value failing to correspond to a stored user value. - In another embodiment of
stage 64 where the current user value does not correspond to the first user value, thecomputing device 10 can compare the current user value to a stored user value of each user profile of a plurality of stored user profiles. If the current user value corresponds to a stored user value of a stored user profile, thecomputing device 10 can send a notification to the user, the notification requesting selection of the first user profile, e.g. the current user profile, or the second user profile, e.g. the stored user profile. The notification can be, for example, an indicator that another profile is available for use displayed in the background or on a notification bar on thedisplay screen 26 of thecomputing device 10. In this example, if thecomputing device 10 receives a signal indicating selection of the first user profile, thecomputing device 10 continues to operate using the first user profile. If thecomputing device 10 receives a signal indicating selection of the second user profile, thecomputing device 10 configures at least some programs using the second user profile. If the notification is ignored, thecomputing device 10 continues to operate using the first user profile. This embodiment is useful in the case where a second user seeks to update settings, applications, or features for a first user without immediately switching user profiles. For example, the second user can be a parent and the first user a child with the parent picking up thecomputing device 10 to install a new application for the child currently using thecomputing device 10. - In each of the embodiments of the
process 50 for dynamically switching a user profile on acomputing device 10, the first user profile and second user profile can be stored in a location external to thecomputing device 10. For example, acomputing device 10 can be a public device such as a clock-radio in a hotel room capable of operating with user profiles. The current user of the clock-radio can have a user profile stored using a cloud computing service, or the cloud. The cloud can include hundreds or thousands of servers configured to provide scalable computing resources. Storing the user profile on the cloud can, for example, allow more than onecomputing device 10 to access the user profile. In this example, the current user of the clock-radio can access personal files, folders, and/orapplication programs 22 on the clock-radio after the clock-radio has been configured with the stored user profile associated with the current user. - The embodiments of the computing device 10 (and the algorithms, methods, instructions etc. stored thereon and/or executed thereby) can be realized in hardware including, for example, intellectual property (IP) cores, application-specific integrated circuits (ASICs), programmable logic arrays, optical processors, programmable logic controllers, microcode, firmware, microcontrollers, servers, microprocessors, digital signal processors or any other suitable circuit. In the claims, the term “processor” should be understood as encompassing any the foregoing, either singly or in combination. The terms “signal” and “data” are used interchangeably. Further, portions of
computing device 10 do not necessarily have to be implemented in the same manner. - In one embodiment, the
computing device 10 can be implemented using a general purpose computer/processor with a computer program that, when executed, carries out any of the respective methods, algorithms and/or instructions described herein. In addition or alternatively, for example, a special purpose computer/processor can be utilized which can contain specialized hardware for carrying out any of the methods, algorithms, or instructions described herein. - Further, all or a portion of embodiments described can take the form of a computer program product accessible from, for example, a computer-usable or computer-readable medium. A computer-usable or computer-readable medium can be any device that can, for example, tangibly contain, store, communicate, or transport the program for use by or in connection with any processor. The medium can be, for example, an electronic, magnetic, optical, electromagnetic, or a semiconductor device. Other suitable mediums are also available.
- While this disclosure includes what is presently considered to be the most practical and preferred embodiments, it is to be understood that the disclosure is not to be limited to the disclosed embodiments but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims, which scope is to be accorded the broadest interpretation so as to encompass all such modifications and equivalent structures as is permitted under the law.
Claims (20)
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/402,221 US20130097416A1 (en) | 2011-10-18 | 2012-02-22 | Dynamic profile switching |
US13/466,611 US9128737B2 (en) | 2011-10-18 | 2012-05-08 | Dynamic profile switching based on user identification |
PCT/US2012/060901 WO2013059514A1 (en) | 2011-10-18 | 2012-10-18 | Dynamic profile switching |
US14/829,895 US9690601B2 (en) | 2011-10-18 | 2015-08-19 | Dynamic profile switching based on user identification |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161548430P | 2011-10-18 | 2011-10-18 | |
US13/402,221 US20130097416A1 (en) | 2011-10-18 | 2012-02-22 | Dynamic profile switching |
Publications (1)
Publication Number | Publication Date |
---|---|
US20130097416A1 true US20130097416A1 (en) | 2013-04-18 |
Family
ID=48086804
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/402,221 Abandoned US20130097416A1 (en) | 2011-10-18 | 2012-02-22 | Dynamic profile switching |
US13/466,611 Active 2033-03-01 US9128737B2 (en) | 2011-10-18 | 2012-05-08 | Dynamic profile switching based on user identification |
US14/829,895 Active US9690601B2 (en) | 2011-10-18 | 2015-08-19 | Dynamic profile switching based on user identification |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/466,611 Active 2033-03-01 US9128737B2 (en) | 2011-10-18 | 2012-05-08 | Dynamic profile switching based on user identification |
US14/829,895 Active US9690601B2 (en) | 2011-10-18 | 2015-08-19 | Dynamic profile switching based on user identification |
Country Status (4)
Country | Link |
---|---|
US (3) | US20130097416A1 (en) |
EP (1) | EP2769328B1 (en) |
CN (1) | CN103999048B (en) |
WO (2) | WO2013059482A1 (en) |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130097695A1 (en) * | 2011-10-18 | 2013-04-18 | Google Inc. | Dynamic Profile Switching Based on User Identification |
WO2014172511A1 (en) * | 2013-04-19 | 2014-10-23 | Microsoft Corporation | User experience mode transitioning |
US20140359056A1 (en) * | 2013-05-29 | 2014-12-04 | Microsoft Corporation | Metered Network Synchronization |
US20150095982A1 (en) * | 2013-10-02 | 2015-04-02 | Canon Kabushiki Kaisha | Information processing apparatus, information processing method, and non-transitory computer-readable storage medium |
US20150113631A1 (en) * | 2013-10-23 | 2015-04-23 | Anna Lerner | Techniques for identifying a change in users |
US9075800B2 (en) * | 2012-09-21 | 2015-07-07 | Sap Se | Context switching in a business application |
US20150381424A1 (en) * | 2013-02-08 | 2015-12-31 | Thomson Licensing | Method of and request server for providing a preference value for features of an application |
CN106462684A (en) * | 2014-05-07 | 2017-02-22 | 高通股份有限公司 | Dynamic activation of user profiles based on biometric identification |
WO2017058661A1 (en) * | 2015-09-29 | 2017-04-06 | Google Inc. | Automatic delegation control for device sharing |
US9680724B2 (en) | 2011-09-09 | 2017-06-13 | Microsoft Technology Licensing, Llc | Network communication and cost awareness |
US10838594B2 (en) * | 2018-07-03 | 2020-11-17 | Canon Production Printing Holding B.V. | Method of controlling a user interface |
GB2586149A (en) * | 2019-08-07 | 2021-02-10 | British Telecomm | Behavioural blometric control policy application |
EP3731114A4 (en) * | 2018-03-16 | 2021-03-17 | Samsung Electronics Co., Ltd. | SCREEN CONTROL PROCESS AND ELECTRONIC DEVICE SUPPORTING THE SAME |
US11137977B2 (en) | 2013-12-04 | 2021-10-05 | Google Llc | User interface customization based on speaker characteristics |
US12039021B2 (en) | 2019-03-07 | 2024-07-16 | British Telecommunications Public Limited Company | Multi-level classifier based access control |
US12277648B2 (en) | 2019-07-30 | 2025-04-15 | British Telecommunications Public Limited Company | Duct blockage risk location prediction |
US12314362B2 (en) | 2019-07-16 | 2025-05-27 | British Telecommunications Public Limited Company | User authentication based on behavioral biometrics |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012252321A (en) * | 2011-05-10 | 2012-12-20 | Canon Inc | Imaging system, and method of controlling the same |
KR20130045549A (en) * | 2011-10-26 | 2013-05-06 | 삼성전자주식회사 | Computing device and control method thereof |
US10890965B2 (en) * | 2012-08-15 | 2021-01-12 | Ebay Inc. | Display orientation adjustment using facial landmark information |
US9407751B2 (en) | 2012-09-13 | 2016-08-02 | Intel Corporation | Methods and apparatus for improving user experience |
US9443272B2 (en) | 2012-09-13 | 2016-09-13 | Intel Corporation | Methods and apparatus for providing improved access to applications |
US9310881B2 (en) * | 2012-09-13 | 2016-04-12 | Intel Corporation | Methods and apparatus for facilitating multi-user computer interaction |
US20150015688A1 (en) * | 2013-07-09 | 2015-01-15 | HTC Corportion | Facial unlock mechanism using light level determining module |
US9391982B1 (en) | 2014-02-27 | 2016-07-12 | Cullen/Frost Bankers, Inc. | Network authentication of multiple profile accesses from a single remote device |
EP2919142B1 (en) * | 2014-03-14 | 2023-02-22 | Samsung Electronics Co., Ltd. | Electronic apparatus and method for providing health status information |
KR20150137499A (en) * | 2014-05-29 | 2015-12-09 | 엘지전자 주식회사 | Video display device and operating method thereof |
US9244748B2 (en) | 2014-06-04 | 2016-01-26 | International Business Machines Corporation | Operating system user activity profiles |
TWI584146B (en) * | 2014-08-29 | 2017-05-21 | 鴻海精密工業股份有限公司 | Login system and method based on face recognition |
US9582296B2 (en) | 2014-09-18 | 2017-02-28 | International Business Machines Corporation | Dynamic multi-user computer configuration settings |
US10237740B2 (en) | 2016-10-27 | 2019-03-19 | International Business Machines Corporation | Smart management of mobile applications based on visual recognition |
CN107231476A (en) * | 2017-05-31 | 2017-10-03 | 深圳市邦华电子有限公司 | Mobile terminal and its scene mode setting method, device |
US11941412B1 (en) * | 2017-12-20 | 2024-03-26 | Intuit Inc. | Computer software program modularization and personalization |
US10951731B2 (en) * | 2018-10-12 | 2021-03-16 | Qualcomm Incorporated | Profile switch feature in subsidy locked devices with eUICC |
US20230095816A1 (en) * | 2021-09-24 | 2023-03-30 | Apple Inc. | Adaptive user enrollment for electronic devices |
US12189940B2 (en) * | 2023-03-27 | 2025-01-07 | Motorola Mobility Llc | Fingerprint encoded gesture initiation of device actions |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040181808A1 (en) * | 2001-04-25 | 2004-09-16 | Ralf Schaefer | Method for controlling display of audio-visual programmes, and receiver for displaying same |
US8126439B1 (en) * | 2007-10-30 | 2012-02-28 | Sprint Communications Company L.P. | Persona management for mobile enabling services |
US8131991B2 (en) * | 2009-02-10 | 2012-03-06 | Sony Corporation | System and method for configuring plural software profiles |
Family Cites Families (101)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH08137852A (en) | 1994-11-09 | 1996-05-31 | Oki Electric Ind Co Ltd | Collaboratively written document management system |
US5758257A (en) * | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
US6571279B1 (en) * | 1997-12-05 | 2003-05-27 | Pinpoint Incorporated | Location enhanced information delivery system |
US5913040A (en) | 1995-08-22 | 1999-06-15 | Backweb Ltd. | Method and apparatus for transmitting and displaying information between a remote network and a local computer |
WO1997009682A1 (en) | 1995-09-01 | 1997-03-13 | Elonex Plc | Service independent electronic document server |
US6006227A (en) * | 1996-06-28 | 1999-12-21 | Yale University | Document stream operating system |
US5796393A (en) | 1996-11-08 | 1998-08-18 | Compuserve Incorporated | System for intergrating an on-line service community with a foreign service |
EP0848336A1 (en) | 1996-12-12 | 1998-06-17 | SONY DEUTSCHLAND GmbH | Server with automatic update tracking |
EP0848338A1 (en) | 1996-12-12 | 1998-06-17 | SONY DEUTSCHLAND GmbH | Server providing documents according to user profiles |
US6111517A (en) * | 1996-12-30 | 2000-08-29 | Visionics Corporation | Continuous video monitoring using face recognition for access control |
US6256633B1 (en) * | 1998-06-25 | 2001-07-03 | U.S. Philips Corporation | Context-based and user-profile driven information retrieval |
CA2336715A1 (en) | 1998-07-07 | 2000-01-13 | Ranah Livnat | Digital publishing and dynamic integration |
US7130454B1 (en) * | 1998-07-20 | 2006-10-31 | Viisage Technology, Inc. | Real-time facial recognition and verification system |
US7831930B2 (en) * | 2001-11-20 | 2010-11-09 | Universal Electronics Inc. | System and method for displaying a user interface for a remote control application |
US6256019B1 (en) * | 1999-03-30 | 2001-07-03 | Eremote, Inc. | Methods of using a controller for controlling multi-user access to the functionality of consumer devices |
JP2001236324A (en) | 2000-02-24 | 2001-08-31 | Fujitsu Ltd | Portable electronic device having personal authentication function based on biometric information |
US20020032768A1 (en) * | 2000-04-10 | 2002-03-14 | Voskuil Erik K. | Method and system for configuring remotely located applications |
US6556217B1 (en) * | 2000-06-01 | 2003-04-29 | Nokia Corporation | System and method for content adaptation and pagination based on terminal capabilities |
US20030093430A1 (en) * | 2000-07-26 | 2003-05-15 | Mottur Peter A. | Methods and systems to control access to network devices |
WO2002032136A2 (en) | 2000-10-10 | 2002-04-18 | Koninklijke Philips Electronics N.V. | Device control via image-based recognition |
US20020152255A1 (en) * | 2001-02-08 | 2002-10-17 | International Business Machines Corporation | Accessibility on demand |
EP1401546A4 (en) * | 2001-06-15 | 2006-11-02 | Walker Digital Llc | Method and apparatus for planning and customizing a gaming experience |
US7225338B2 (en) | 2001-06-21 | 2007-05-29 | Sal Khan | Secure system for the identification of persons using remote searching of facial, iris and voice biometric templates |
US20030227478A1 (en) * | 2002-06-05 | 2003-12-11 | Chatfield Keith M. | Systems and methods for a group directed media experience |
CA2407774C (en) * | 2002-07-16 | 2005-01-04 | Musicrypt Inc. | Content distribution system and method |
US20040034537A1 (en) * | 2002-08-14 | 2004-02-19 | Pineapple Systems, Inc. | Guest relationship management system |
US7194114B2 (en) | 2002-10-07 | 2007-03-20 | Carnegie Mellon University | Object finder for two-dimensional images, and system for determining a set of sub-classifiers composing an object finder |
JP4397212B2 (en) | 2003-02-05 | 2010-01-13 | 富士フイルム株式会社 | Identification device |
US20040259536A1 (en) | 2003-06-20 | 2004-12-23 | Keskar Dhananjay V. | Method, apparatus and system for enabling context aware notification in mobile devices |
EP1658593B1 (en) | 2003-08-29 | 2008-12-24 | Nokia Corporation | Method and device for customized picture-based user identification and authentication |
US7620667B2 (en) * | 2003-11-17 | 2009-11-17 | Microsoft Corporation | Transfer of user profiles using portable storage devices |
US7551755B1 (en) * | 2004-01-22 | 2009-06-23 | Fotonation Vision Limited | Classification and organization of consumer digital images using workflow, and face detection and recognition |
US7534169B2 (en) * | 2005-07-08 | 2009-05-19 | Cfph, Llc | System and method for wireless gaming system with user profiles |
US20050210270A1 (en) * | 2004-03-19 | 2005-09-22 | Ceelox, Inc. | Method for authenticating a user profile for providing user access to restricted information based upon biometric confirmation |
US20100208950A1 (en) | 2009-02-17 | 2010-08-19 | Silvester Kelan C | Biometric identification data protection |
US7492925B2 (en) | 2004-06-25 | 2009-02-17 | Intel Corporation | Biometric identification data protection |
US7246224B2 (en) * | 2004-09-27 | 2007-07-17 | Intel Corporation | System and method to enable platform personality migration |
US7848566B2 (en) | 2004-10-22 | 2010-12-07 | Carnegie Mellon University | Object recognizer and detector for two-dimensional images using bayesian network based classifier |
US20060206723A1 (en) * | 2004-12-07 | 2006-09-14 | Gil Youn H | Method and system for integrated authentication using biometrics |
US20060135139A1 (en) | 2004-12-17 | 2006-06-22 | Cheng Steven D | Method for changing outputting settings for a mobile unit based on user's physical status |
US20070067252A1 (en) * | 2005-08-30 | 2007-03-22 | Siemens Aktiengesellschaft | Archiving and data integration system |
US20070140532A1 (en) * | 2005-12-20 | 2007-06-21 | Goffin Glen P | Method and apparatus for providing user profiling based on facial recognition |
JP2007188321A (en) | 2006-01-13 | 2007-07-26 | Sony Corp | Communication device, communication method, program, and recording medium |
CN100476820C (en) * | 2006-02-27 | 2009-04-08 | 株式会社日立制作所 | Portal server and method for generating a user interface on a user terminal device |
US7630522B2 (en) | 2006-03-08 | 2009-12-08 | Microsoft Corporation | Biometric measurement using interactive display systems |
US20070261116A1 (en) * | 2006-04-13 | 2007-11-08 | Verisign, Inc. | Method and apparatus to provide a user profile for use with a secure content service |
US8924524B2 (en) * | 2009-07-27 | 2014-12-30 | Vmware, Inc. | Automated network configuration of virtual machines in a virtual lab data environment |
US8645709B2 (en) * | 2006-11-14 | 2014-02-04 | Cfph, Llc | Biometric access data encryption |
US8000736B2 (en) | 2007-01-06 | 2011-08-16 | Apple Inc. | User programmable switch for portable data processing devices |
US9715543B2 (en) * | 2007-02-28 | 2017-07-25 | Aol Inc. | Personalization techniques using image clouds |
US20080313230A1 (en) * | 2007-06-12 | 2008-12-18 | Jeyhan Karaoguz | System and method for managing evolving user preferences |
US20090012895A1 (en) * | 2007-07-06 | 2009-01-08 | Kevin Raumean Mehrabi | System and method for creating and promoting a cause and processing payments for the cause by utilizing social networks |
US7958142B2 (en) * | 2007-09-20 | 2011-06-07 | Microsoft Corporation | User profile aggregation |
US8311585B2 (en) * | 2007-09-28 | 2012-11-13 | Hewlett-Packard Development Company, L.P. | Synchronized helper system using paired computing device |
JP2011504710A (en) * | 2007-11-21 | 2011-02-10 | ジェスチャー テック,インコーポレイテッド | Media preferences |
CN100512385C (en) * | 2007-12-14 | 2009-07-08 | 西安交通大学 | Industrial intelligent camera |
TW200930026A (en) | 2007-12-31 | 2009-07-01 | High Tech Comp Corp | Method switching profiles in a mobile device |
US8332951B2 (en) * | 2008-02-12 | 2012-12-11 | International Business Machines Corporation | Section based security for a sectioned surface-based computing device |
US8320638B2 (en) * | 2008-04-10 | 2012-11-27 | Pitt Alan M | Anonymous association system utilizing biometrics |
US20110292181A1 (en) * | 2008-04-16 | 2011-12-01 | Canesta, Inc. | Methods and systems using three-dimensional sensing for user interaction with applications |
US20090284532A1 (en) * | 2008-05-16 | 2009-11-19 | Apple Inc. | Cursor motion blurring |
WO2010028194A1 (en) * | 2008-09-05 | 2010-03-11 | Tim Collins | System, apparatus and associated methodology for enriching contact of a remote client |
US20100077090A1 (en) * | 2008-09-23 | 2010-03-25 | Joseph Chyam Cohen | Fast switching between multiple user sessions |
US20100095348A1 (en) * | 2008-10-10 | 2010-04-15 | Ciphent, Inc. | System and method for management and translation of technical security policies and configurations |
US8358759B2 (en) * | 2008-11-18 | 2013-01-22 | At&T Intellectual Property Ii, L.P. | Biometric identification in communication |
US20100125906A1 (en) * | 2008-11-19 | 2010-05-20 | Palo Alto Research Center Incorporated | Resetting a forgotten password using the password itself as authentication |
US9571713B2 (en) | 2008-12-05 | 2017-02-14 | International Business Machines Corporation | Photograph authorization system |
JP5414282B2 (en) | 2009-01-07 | 2014-02-12 | キヤノン株式会社 | File management system, file management method and program |
US8924742B2 (en) * | 2009-02-11 | 2014-12-30 | Blackberry Limited | Multi-level data storage |
US8745255B2 (en) * | 2009-02-24 | 2014-06-03 | Microsoft Corporation | Configuration and distribution of content at capture |
WO2010099475A1 (en) * | 2009-02-26 | 2010-09-02 | Kynen Llc | User authentication system and method |
US20100231735A1 (en) * | 2009-03-13 | 2010-09-16 | Nokia Corporation | Methods, Apparatuses, and Computer Program Products for Facilitating Concurrent Video Recording and Still Image Capture |
US20100299601A1 (en) * | 2009-05-22 | 2010-11-25 | Jonathan Kaplan | Configuring channels for sharing media |
US20110145591A1 (en) * | 2009-12-16 | 2011-06-16 | Grzybowski Carl E | Adaptive virtual environment management system |
US20110153612A1 (en) * | 2009-12-17 | 2011-06-23 | Infosys Technologies Limited | System and method for providing customized applications on different devices |
US10027676B2 (en) * | 2010-01-04 | 2018-07-17 | Samsung Electronics Co., Ltd. | Method and system for multi-user, multi-device login and content access control and metering and blocking |
US8443184B2 (en) * | 2010-01-14 | 2013-05-14 | Dell Products L.P. | System and method for personalizing devices |
US9418205B2 (en) * | 2010-03-15 | 2016-08-16 | Proxense, Llc | Proximity-based system for automatic application or data access and item tracking |
US8521131B1 (en) * | 2010-03-23 | 2013-08-27 | Amazon Technologies, Inc. | Mobile device security |
US20110238676A1 (en) * | 2010-03-25 | 2011-09-29 | Palm, Inc. | System and method for data capture, storage, and retrieval |
US8966587B2 (en) * | 2010-06-03 | 2015-02-24 | Qualcomm Incorporated | Identity management via cloud |
US8601076B2 (en) * | 2010-06-10 | 2013-12-03 | Aol Inc. | Systems and methods for identifying and notifying users of electronic content based on biometric recognition |
US20110314401A1 (en) * | 2010-06-22 | 2011-12-22 | Thermoteknix Systems Ltd. | User-Profile Systems and Methods for Imaging Devices and Imaging Devices Incorporating Same |
US8326001B2 (en) | 2010-06-29 | 2012-12-04 | Apple Inc. | Low threshold face recognition |
US8743145B1 (en) * | 2010-08-26 | 2014-06-03 | Amazon Technologies, Inc. | Visual overlay for augmenting reality |
KR101172213B1 (en) * | 2010-12-08 | 2012-08-07 | 현대자동차주식회사 | System and Method for face identification |
EP2490151A1 (en) * | 2011-02-17 | 2012-08-22 | Nagravision S.A. | Method and device to speed up face recognition |
US8526686B2 (en) * | 2010-12-24 | 2013-09-03 | Telefonaktiebolaget L M Ericsson (Publ) | Dynamic profile creation in response to facial recognition |
US9037633B2 (en) * | 2011-01-27 | 2015-05-19 | Wyse Technology L.L.C. | Transferring configuration data from a public cloud server and applying onto a mobile client |
EP2710486B1 (en) * | 2011-05-20 | 2021-06-30 | Citrix Systems, Inc. | Shell integration on a mobile device for an application executing remotely on a server |
US8687039B2 (en) * | 2011-06-06 | 2014-04-01 | Cisco Technology, Inc. | Diminishing an appearance of a double chin in video communications |
US8811685B1 (en) * | 2011-06-21 | 2014-08-19 | Google Inc. | Proximity wakeup |
US11132209B2 (en) * | 2011-07-25 | 2021-09-28 | Adobe Inc. | Integrated profile simulation for dynamic content |
US9055276B2 (en) * | 2011-07-29 | 2015-06-09 | Apple Inc. | Camera having processing customized for identified persons |
US8660322B2 (en) * | 2011-08-25 | 2014-02-25 | King Saud University | Passive continuous authentication method |
US20130073568A1 (en) * | 2011-09-21 | 2013-03-21 | Vladimir Federov | Ranking structured objects and actions on a social networking system |
US8261090B1 (en) | 2011-09-28 | 2012-09-04 | Google Inc. | Login to a computing device based on facial recognition |
US9131147B2 (en) * | 2011-10-07 | 2015-09-08 | Fuji Xerox Co., Ltd. | System and method for detecting and acting on multiple people crowding a small display for information sharing |
US20130097416A1 (en) * | 2011-10-18 | 2013-04-18 | Google Inc. | Dynamic profile switching |
US9075800B2 (en) * | 2012-09-21 | 2015-07-07 | Sap Se | Context switching in a business application |
US8973104B2 (en) * | 2012-12-31 | 2015-03-03 | Google Technology Holdings LLC | Method and system for providing limited usage of an electronic device |
-
2012
- 2012-02-22 US US13/402,221 patent/US20130097416A1/en not_active Abandoned
- 2012-05-08 US US13/466,611 patent/US9128737B2/en active Active
- 2012-10-18 CN CN201280062746.4A patent/CN103999048B/en active Active
- 2012-10-18 EP EP12841308.5A patent/EP2769328B1/en active Active
- 2012-10-18 WO PCT/US2012/060852 patent/WO2013059482A1/en active Application Filing
- 2012-10-18 WO PCT/US2012/060901 patent/WO2013059514A1/en active Application Filing
-
2015
- 2015-08-19 US US14/829,895 patent/US9690601B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040181808A1 (en) * | 2001-04-25 | 2004-09-16 | Ralf Schaefer | Method for controlling display of audio-visual programmes, and receiver for displaying same |
US7895619B2 (en) * | 2001-04-25 | 2011-02-22 | Thomson Licensing | Method for controlling display of audio-visual programmes, and receiver for displaying same |
US8126439B1 (en) * | 2007-10-30 | 2012-02-28 | Sprint Communications Company L.P. | Persona management for mobile enabling services |
US8131991B2 (en) * | 2009-02-10 | 2012-03-06 | Sony Corporation | System and method for configuring plural software profiles |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10153959B2 (en) | 2011-09-09 | 2018-12-11 | Microsoft Technology Licensing, Llc | Network communication and cost awareness |
US9680724B2 (en) | 2011-09-09 | 2017-06-13 | Microsoft Technology Licensing, Llc | Network communication and cost awareness |
US20150355915A1 (en) * | 2011-10-18 | 2015-12-10 | Google Inc. | Dynamic Profile Switching Based on User Identification |
US9128737B2 (en) * | 2011-10-18 | 2015-09-08 | Google Inc. | Dynamic profile switching based on user identification |
US20130097695A1 (en) * | 2011-10-18 | 2013-04-18 | Google Inc. | Dynamic Profile Switching Based on User Identification |
US9690601B2 (en) * | 2011-10-18 | 2017-06-27 | Google Inc. | Dynamic profile switching based on user identification |
US9075800B2 (en) * | 2012-09-21 | 2015-07-07 | Sap Se | Context switching in a business application |
US20150381424A1 (en) * | 2013-02-08 | 2015-12-31 | Thomson Licensing | Method of and request server for providing a preference value for features of an application |
WO2014172511A1 (en) * | 2013-04-19 | 2014-10-23 | Microsoft Corporation | User experience mode transitioning |
US9998536B2 (en) * | 2013-05-29 | 2018-06-12 | Microsoft Technology Licensing, Llc | Metered network synchronization |
US20140359056A1 (en) * | 2013-05-29 | 2014-12-04 | Microsoft Corporation | Metered Network Synchronization |
US20150095982A1 (en) * | 2013-10-02 | 2015-04-02 | Canon Kabushiki Kaisha | Information processing apparatus, information processing method, and non-transitory computer-readable storage medium |
US10616202B2 (en) * | 2013-10-02 | 2020-04-07 | Canon Kabushiki Kaisha | Information processing apparatus, information processing method, and non-transitory computer-readable storage medium |
CN104517047A (en) * | 2013-10-02 | 2015-04-15 | 佳能株式会社 | Information processing apparatus and information processing method |
US9935929B2 (en) * | 2013-10-02 | 2018-04-03 | Canon Kabushiki Kaisha | Information processing apparatus, information processing method, and non-transitory computer-readable storage medium |
CN105579927A (en) * | 2013-10-23 | 2016-05-11 | 英特尔公司 | Techniques for determining a change in users |
US10055562B2 (en) * | 2013-10-23 | 2018-08-21 | Intel Corporation | Techniques for identifying a change in users |
US20150113631A1 (en) * | 2013-10-23 | 2015-04-23 | Anna Lerner | Techniques for identifying a change in users |
US11620104B2 (en) | 2013-12-04 | 2023-04-04 | Google Llc | User interface customization based on speaker characteristics |
US11137977B2 (en) | 2013-12-04 | 2021-10-05 | Google Llc | User interface customization based on speaker characteristics |
US11403065B2 (en) | 2013-12-04 | 2022-08-02 | Google Llc | User interface customization based on speaker characteristics |
US9990483B2 (en) * | 2014-05-07 | 2018-06-05 | Qualcomm Incorporated | Dynamic activation of user profiles based on biometric identification |
JP2017516221A (en) * | 2014-05-07 | 2017-06-15 | クアルコム,インコーポレイテッド | Dynamic activation of user profiles based on biometric authentication |
CN106462684A (en) * | 2014-05-07 | 2017-02-22 | 高通股份有限公司 | Dynamic activation of user profiles based on biometric identification |
US9826083B2 (en) | 2015-09-29 | 2017-11-21 | Google Inc. | Automatic delegation control for device sharing |
WO2017058661A1 (en) * | 2015-09-29 | 2017-04-06 | Google Inc. | Automatic delegation control for device sharing |
EP3731114A4 (en) * | 2018-03-16 | 2021-03-17 | Samsung Electronics Co., Ltd. | SCREEN CONTROL PROCESS AND ELECTRONIC DEVICE SUPPORTING THE SAME |
US10838594B2 (en) * | 2018-07-03 | 2020-11-17 | Canon Production Printing Holding B.V. | Method of controlling a user interface |
US12039021B2 (en) | 2019-03-07 | 2024-07-16 | British Telecommunications Public Limited Company | Multi-level classifier based access control |
US12314362B2 (en) | 2019-07-16 | 2025-05-27 | British Telecommunications Public Limited Company | User authentication based on behavioral biometrics |
US12277648B2 (en) | 2019-07-30 | 2025-04-15 | British Telecommunications Public Limited Company | Duct blockage risk location prediction |
GB2586149A (en) * | 2019-08-07 | 2021-02-10 | British Telecomm | Behavioural blometric control policy application |
Also Published As
Publication number | Publication date |
---|---|
WO2013059482A1 (en) | 2013-04-25 |
US9128737B2 (en) | 2015-09-08 |
US20130097695A1 (en) | 2013-04-18 |
WO2013059514A1 (en) | 2013-04-25 |
US9690601B2 (en) | 2017-06-27 |
CN103999048B (en) | 2017-03-01 |
EP2769328A4 (en) | 2015-04-29 |
US20150355915A1 (en) | 2015-12-10 |
EP2769328A1 (en) | 2014-08-27 |
EP2769328B1 (en) | 2020-12-02 |
CN103999048A (en) | 2014-08-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20130097416A1 (en) | Dynamic profile switching | |
US10942993B2 (en) | User terminal apparatus having a plurality of user modes and control method thereof | |
CN107004075B (en) | Techniques for authenticating a user of a computing device based on an authentication context state | |
US20170308349A1 (en) | Multi-screen sharing based application management method and device, and storage medium | |
EP2862362B1 (en) | Stream-based media management | |
US20150234579A1 (en) | Method and system for quickly arranging multiple windows and mobile apparatus thereof | |
CN106940880A (en) | A kind of U.S. face processing method, device and terminal device | |
US11983565B2 (en) | Platform framework configuration state management | |
CN106650490A (en) | Cloud account number login method and device | |
CN106454936B (en) | Network control method and intelligent terminal | |
CN106201393B (en) | Information processing method and electronic equipment | |
CN109451295A (en) | A kind of method and system obtaining virtual information | |
US10902101B2 (en) | Techniques for displaying secure content for an application through user interface context file switching | |
US20220413585A1 (en) | Platform framework arbitration | |
US11755738B2 (en) | Platform framework security state management | |
CN117032540A (en) | Interactive operation response method, device, computer equipment and storage medium | |
US11979397B2 (en) | Platform framework authentication | |
US11669469B2 (en) | Platform framework standby operation | |
US20220413921A1 (en) | Platform framework orchestration and discovery | |
US11941094B2 (en) | Screen unlocking method and apparatus, and computer device and storage medium | |
CN116955271A (en) | Method and device for storing data copy, electronic equipment and storage medium | |
US11868815B2 (en) | Managing compute resources and runtime object load status in a platform framework | |
CN118886890B (en) | Equipment security management method and device, electronic equipment and storage medium | |
CN114489858B (en) | Application software information setting method and device, terminal equipment and storage medium | |
CN105306207B (en) | A kind of methods, devices and systems carrying out identifying code verifying |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: GOOGLE INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BARRA, HUGO;COHEN, GABRIEL;REEL/FRAME:027771/0415 Effective date: 20120201 |
|
AS | Assignment |
Owner name: GOOGLE INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BARRA, HUGO;COHEN, GABRIEL;SIPE, MICHAEL ANDREW;AND OTHERS;SIGNING DATES FROM 20120216 TO 20120221;REEL/FRAME:027782/0626 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: GOOGLE LLC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:GOOGLE INC.;REEL/FRAME:044142/0357 Effective date: 20170929 |