USER IDENTIFICATION IN CELL PHONES BASED ON SKIN CONTACT
First Claim
1. A system, comprising:
- a processor; and
a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising;
based on touch data received from a first sensor of a user equipment, determining that the user equipment is not being utilized by a first user;
in response to the determining that the user equipment is not being utilized by the first user, initiating a display time-out of the user equipment;
based on additional touch data received from the first sensor of the user equipment, determining that the user equipment is being utilized by an unauthorized second user; and
based on determining that the user equipment is being utilized by the unauthorized second user, adjusting a setting of the user equipment.
1 Assignment
0 Petitions
Accused Products
Abstract
Screen time-outs on a portable electronic device can be customized based on user activity. In one aspect, a sensing component receives data from one or more sensors located on the portable electronic device, for example, skin conductivity sensors and determines whether the user is using the portable device, either actively or passively and also determines the identity of the user. A configuring component is employed to change one or more features or functions of the portable electronic device based on the information determined by the sensing component. In particular, the configuring component changes one of more features of the portable electronic device based on the preferences predefined by the identified user and device usage (active and passive usage).
-
Citations
20 Claims
-
1. A system, comprising:
-
a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations, comprising; based on touch data received from a first sensor of a user equipment, determining that the user equipment is not being utilized by a first user; in response to the determining that the user equipment is not being utilized by the first user, initiating a display time-out of the user equipment; based on additional touch data received from the first sensor of the user equipment, determining that the user equipment is being utilized by an unauthorized second user; and based on determining that the user equipment is being utilized by the unauthorized second user, adjusting a setting of the user equipment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method, comprising:
-
verifying, by a mobile device comprising a processor, that the mobile device is not being utilized by a first user identity associated with a first user; based on thermal data received from a sensor of the mobile device, determining, by the mobile device, that the mobile device is being utilized by a second user identity associated with a second user; in response to the determining that the mobile device is being utilized by the second user identity, determining that the second user identity is not an authorized user identity; and based on the determining that the second user identity is not the authorized user identity, restricting access to a feature of the mobile device in accordance with a preference of the first user identity. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations, comprising:
-
based on first measurement data received from a first sensor of a communication device, verifying that the communication device is not being utilized; based on second measurement data received from a second sensor of the communication device, determining first identity data that is indicative of a first user identity of the communication device; based on third measurement data received from the second sensor of the communication device, determining second identity data that is indicative of a second user identity of the communication device, wherein the second user identity is an unauthorized user identity; and in response to the determining the second identity data, restricting use of the communication device based on a setting preference of the first user identity. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification