DYNAMIC MULTI-USER COMPUTER CONFIGURATION SETTINGS
First Claim
1. A method for managing user profiles, the method comprising:
- identifying, by one or more computer processors, a first user profile and one or more additional user profiles, wherein the first user profile is active on a computing device;
receiving, by one or more computer processors, streaming data;
receiving, by one or more computer processors, a trigger wherein the received trigger includes biometric data;
identifying, by one or more computer processors, a second user profile from the identified one or more additional user profiles that is associated with the received trigger;
comparing, by one or more computer processors, biometric data from the second user profile with the biometric data in the received trigger; and
determining, by one or more computer processors, whether the biometric data matches, within a defined tolerance level, the biometric data in the second user profile.
1 Assignment
0 Petitions
Accused Products
Abstract
In an approach for managing user profiles, a computer identifies a first user profile and one or more additional user profiles, wherein the first user profile is active on a computing device. The computer receives streaming data. The computer receives a trigger wherein the received trigger includes biometric data. The computer identifies a second user profile from the identified one or more additional user profiles that is associated with the received trigger. The computer compares biometric data from the second user profile with the biometric data in the received trigger. The computer determines whether the biometric data matches, within a defined tolerance level, the biometric data in the second user profile.
29 Citations
7 Claims
-
1. A method for managing user profiles, the method comprising:
-
identifying, by one or more computer processors, a first user profile and one or more additional user profiles, wherein the first user profile is active on a computing device; receiving, by one or more computer processors, streaming data; receiving, by one or more computer processors, a trigger wherein the received trigger includes biometric data; identifying, by one or more computer processors, a second user profile from the identified one or more additional user profiles that is associated with the received trigger; comparing, by one or more computer processors, biometric data from the second user profile with the biometric data in the received trigger; and determining, by one or more computer processors, whether the biometric data matches, within a defined tolerance level, the biometric data in the second user profile. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
Specification