Fingerprint activation of a panic mode of operation for a mobile device

ABSTRACT

Fingerprint actuation is described for unlocking a mobile device and activating customized mobile device functions by using a fingerprint authentication technique. The mobile device uses a fingerprint sensor to authenticate a user for allowing secure access to certain mobile device functions or contents, and provides a utility in addition to unlocking the mobile device. This allows the user to control access to one or more mobile device functions concurrently with invoking fingerprint authentication in order to unlock the mobile device when the user presses a finger to the fingerprint sensor. The mobile device may be unlocked using a designated finger that activates a panic mode of operation, wherein personal data stored on the mobile device is not accessible or viewable to the user. In other implementations, the user may register particular fingerprints to be associated with different modes of operation and activate the different modes based on the particular fingerprints.

OVERVIEW

Mobile devices have advanced dramatically in form and function in recentyears. Cell phones that once only provided telephone service, forinstance, now typically incorporate advanced computing, networking, anduser interface functions, offering various multi-media services and datamanagement functions. Furthermore, the widespread availability ofwireless communication service has allowed commercialization of numerousnew types of devices and wirelessly-equipped versions of existingdevices, such as wirelessly-equipped navigation units, electronic bookreaders, personal data assistants (PDAs), notebook and tablet computers,cameras and camcorders, and package tracking devices, among others.

With these advances, however, mobile devices have become not only morevaluable to their owners, but also more valuable to prospective thieves.For instance, a thief could attempt to steal such a device in order tobenefit from personal data stored on the device, or to benefit from useor resale of the device itself. Generally, mobile devices includesecurity mechanisms to prevent access by a user other than theregistered user. Such security mechanisms may include passwordprotection, biometric authentication, or facial recognition tools toauthenticate a user of the device and prevent access by other users ofthe device.

For example, a mobile device may include an integrated fingerprintsensor and logic arranged to capture a fingerprint of a user's finger toauthenticate the user based on the captured fingerprint. The mobiledevice becomes unlocked and available for use when the capturedfingerprint of the user is authenticated. The fingerprint sensor can beintegrated in an outwardly visible manner or hidden beneath an outersurface of the mobile device housing/button, such that the user of themobile device can intentionally touch a fingertip to the fingerprintsensor so as to facilitate fingerprint scanning. The fingerprint sensorcan be used for other purposes as well, such as to authenticate a userfor purposes of allowing secure access to certain mobile devicefunctions or contents, or providing a utility in addition to theauthentication mechanism. These alternative security functions can allowthe user to control access to one or more mobile device functionsconcurrently with invoking the fingerprint authentication when the userpresses a finger to the fingerprint sensor. In an example, a user canprogram the mobile device to activate different functions or differentsecurity modes of operation based on a particular fingerprint. Forexample, a user can program the mobile device to enter a limited accessmode when the user scans their ring finger. Alternative examples can useother biometric or facial recognition to activate specific securitymodes.

BRIEF DESCRIPTION OF THE DRAWINGS

Some embodiments are illustrated by way of example and not limitation inthe figures of the accompanying drawings in which:

FIG. 1 is a block diagram illustrating an environment for operating amobile device, according to an example embodiment.

FIGS. 2A-2B show flowcharts illustrating two example embodiments ofmethods for authenticating a user for access to mobile device functionsand a panic mode of operation.

FIG. 3 illustrates an exemplary mobile device, according to an exampleembodiment.

FIG. 4 is a flowchart illustrating a method for activating the panicmode, according to an example embodiment.

FIG. 5 is a flowchart illustrating a method for remote activation of thepanic mode, according to an example embodiment.

FIG. 6 is a diagrammatic representation of a machine in the example formof a mobile device within which a set of instructions for causing themachine to perform any one or more of the methodologies discussed hereinmay be executed.

DETAILED DESCRIPTION

The following detailed description refers to the accompanying drawingsthat depict various details of examples selected to show how particularembodiments may be implemented. The discussion herein addresses variousexamples of the inventive subject matter at least partially in referenceto these drawings and describes the depicted embodiments in sufficientdetail to enable those skilled in the art to practice the invention.Many other embodiments may be utilized for practicing the inventivesubject matter than the illustrative examples discussed herein, and manystructural and operational changes in addition to the alternativesspecifically discussed herein may be made without departing from thescope of the inventive subject matter.

In this description, references to “one embodiment” or “an embodiment,”or to “one example” or “an example” mean that the feature being referredto is, or may be, included in at least one embodiment or example of theinvention. Separate references to “an embodiment” or “one embodiment” orto “one example” or “an example” in this description are not intended tonecessarily refer to the same embodiment or example; however, neitherare such embodiments mutually exclusive, unless so stated or as will bereadily apparent to those of ordinary skill in the art having thebenefit of this disclosure. Thus, the present disclosure includes avariety of combinations and/or integrations of the embodiments andexamples described herein, as well as further embodiments and examplesas defined within the scope of all claims based on this disclosure, aswell as all legal equivalents of such claims.

According to various embodiments, fingerprint scanning is described forunlocking a mobile device and activating customized mobile devicefunctions by using a fingerprint authentication technique. Fingerprintscanning is used throughout this disclosure as an example method ofunlocking a mobile device and activating custom functions, but othermechanisms such as passwords, facial recognition, or other biometricsecurity measures can also be used to activate similar functions. Forexample, the mobile device may use a fingerprint sensor to authenticatea user for purposes of allowing secure access to certain mobile devicefunctions or contents, and provides a utility in addition to unlockingthe mobile device. This allows the user to control access to one or moremobile device functions concurrently with invoking fingerprintauthentication in order to unlock the mobile device when the userpresses a finger to the fingerprint sensor. In certain implementations,the mobile device may be unlocked using a designated finger thatactivates a panic mode of operation. In the panic mode, personal datastored on the mobile device is not accessible or viewable to the user.In an example, panic mode can be pre-configured by the mobile deviceowner to implement a variety of different security functions rangingfrom securing personal data to resetting the device to locking out allfunctions until a password or different designated finger is scanned.Panic mode in particular is designed to protect both user data and themobile device from theft. In other implementations, the user mayregister particular fingerprints to be associated with different modesof operation and activate the different modes based on the particularfingerprints.

The block diagram of FIG. 1 depicts one exemplary environment 100 inwhich various embodiments of the present disclosure may be implemented.A user 102 can be in physical possession of a mobile device 104 that hasvarious data processing and communications features, as will be detailedmore fully below in relation to FIG. 3. The mobile device 104 may be asmartphone-type apparatus that has a wireless network connectivitymodule 106 for placing telephone calls or receiving/transmittingmessages over a mobile telecommunications network 108 managed by aservice provider 110, such as Verizon, AT&T, Nextel, Sprint, T-Mobile,US Cellular, Boost, Cricket, Vodafone, Telefonica, Orange, TIM, TelecomItalia, and others. The wireless network connectivity module 106 mayalso be utilized for data communications other than voice telephonecalls. Aside from utilizing the mobile telecommunications network 108,the wireless network connectivity module 106 may also be configured forGSM, CDMA, WCDMA, 4G, LTE, EDGE, the Internet, Wi-Max, Wi-Fi (IEEE802.11x), Bluetooth, and other similar wireless communicationsfunctions. The mobile device 104 can also be connected to the Internetat least via the service provider 110.

The mobile device 104 may have stored thereon programmed instructionsthat comprise software applications that provide functionality inaddition to making and receiving telephone calls, such as simple messageservice (SMS) text messaging, e-mail, calendars/to-do, photography,videography, media playback, and web browsing, among many others. Thevarious functions of mobile device 104 can be handled by a generalpurpose data processor 112. In particular, the general purpose dataprocessor 112 executes programmed instructions that are stored in amemory 114. The wireless network connectivity module 106 cooperates withthe processor 112 to perform at least one wireless communicationsfunction, for example, for voice and/or data. Alternatively, in someembodiments, the mobile device 104 does not include the wireless networkconnectivity module 106. According to one embodiment, the tangiblyembodied instructions, when executed may perform authentication of user102 for accessing the mobile device 104.

The results of the computation performed by the general purpose dataprocessor 112, and in particular a user interface for variousapplications, can be displayed or output to a screen 116. Commonly, thescreen 116 is a liquid crystal display (LCD) or similar display deviceof varying dimensions fitted to the housing of the mobile device 104.Inputs for the computation and other instructions to the mobile device104 can be provided via a touch input panel 118 that may be overlaid onthe screen 116. In certain implementations, the screen 116 and the touchinput panel 118 are integrated. Besides the touch input panel 118, theremay be alternative input modalities such as a keypad (not shown). Thearrangement of the keys on the keypad may be different to fit within thedimensions of the mobile device 104. Along these lines, otherinput/output devices such as a microphone 120 for receiving audio orvoice signals is included, as well as a speaker 122 for outputtingaudio. For capturing and providing visual data to the mobile device 104,there may be an integrated camera 124 comprising a lens, an imagingsensor, and a dedicated image processor connected to the general purposedata processor 112. The camera 124 may be utilized to capture stillimages as well as a video stream, the data for which is stored on thememory 114.

There are numerous variations of the mobile device 104 or smart phonethat are currently available on the market, including the iPhone fromApple, Inc. It is also contemplated that various embodiments of thepresent disclosure may be implemented on mobile devices other thansmartphones or cellular phones, such as tablet-type mobile devicesincluding the iPad from Apple, Inc., full feature media player devicesincluding the iPod from Apple, Inc., computing devices including theMacBook from Apple, Inc., and other portable devices. The specifics ofthe mobile device 104 are presented by way of example only and not oflimitation, and any other suitable mobile device 104 may be substituted.

In one example of the present disclosure, the mobile device 104 is usedto authenticate the user 102 for access to applications or functions 126associated with the mobile device 104. In this example, the mobiledevice 104 is protected from unauthorized access (e.g., the mobiledevice is in a locked mode), and the disclosed method for authenticatingthe user 102 may be utilized to permit access. The following descriptionwill be in the context of the mobile device 104, but one of ordinaryskill in the art will readily recognize the applicability ornon-applicability and necessary substitutions for various disclosedfeatures to implement the contemplated mobile device-basedauthentication in other contexts, such as on a laptop-style portablepersonal computer.

With additional reference to the flowcharts of FIG. 2A-2B, the process200 of activating a panic mode or pre-defined function is illustrated.The process 200 can begin with activating the mobile device 104, such aswhen the user presses a button to turn on the mobile device 104 from alocked mode (or a sleep mode). Because, in this example, the mobiledevice 104 is in a locked mode and cannot be accessed, the mobile device104 may require the user 102 to submit authentication information, suchas a fingerprint of the user 102. The method of authenticating the user102 can begin with operation 202 of detecting a fingerprint input fromthe user 102 on a fingerprint sensor (e.g., biometric sensor 128) of themobile device 104. As shown with more detail in FIG. 3, the mobiledevice 104 is understood to include a portable housing 302, with theprocessor 112 carried within the portable housing 302. The mobile device104 is illustratively a mobile wireless communications device, forexample, a cellular telephone, but may also be any another type ofelectronic device, for example, a tablet computer, laptop computer, etc.The display 116 is also carried by the portable housing 302 and iscoupled to the processor 112. The display 116 may be a liquid crystaldisplay (LCD), for example, or may be another type of display, as willbe appreciated by those skilled in the art. A finger-operated user inputdevice 304, illustratively in the form of a pushbutton switch, is alsocarried by the portable housing 302 and is coupled to the processor 112.The pushbutton switch 304 cooperates with the processor 112 to perform adevice function in response to the pushbutton switch. For example, adevice function may include a powering on or off of the mobile device104, unlocking the mobile device 104 from the locked mode, actuating acustomized function (e.g., entering a panic mode), initiatingcommunication via the wireless network connectivity module 106, and/orperforming a menu function. The pushbutton switch 304 may be a homeswitch or button, or key. Further, other device functions may beperformed based upon the pushbutton switch 304. In some embodiments, thefinger-operated user input device 304 may be a different type offinger-operated user input device, for example, forming part of a touchscreen display. Other or additional finger-operated user input devicesmay be carried by the portable housing 302.

The mobile device 104 is switchable between a user-interface locked modeand a user-interface unlocked mode. More particularly, in theuser-interface locked mode, the processor 112 may restrict correspondingdevice operations of the pushbutton switch 304 or other user inputdevice. For example, in the user-interface locked mode, operation of thepushbutton switch 304 may turn on the display 116 with a message thatthe device is locked, while in the user-interface unlocked mode,operation of the pushbutton switch may perform a corresponding devicefunction, for example, a home function, as noted above. In theuser-interface locked mode, additional or other user-input devices, suchas camera 124 and microphone 120, may be inoperative or may not performthe corresponding function as in the user-interface unlocked mode.

In an example, the biometric reader 128 may be carried by the pushbuttonswitch 304 to sense a user's finger 306 or an object placed adjacent thebiometric reader 128. The biometric reader 128 can be carried by thepushbutton switch 304 such that when a user contacts and/or pressesdownward on the pushbutton switch, data from the user's finger 306 isacquired, for example, for fingerprint matching, as will described infurther detail below. In other words, the biometric reader 128 may beresponsive to static contact or placement of the user's finger 306 oranother object. In other embodiments, for example, where the biometricreader 128 is not carried by a pushbutton switch 304, the biometricreader may be a slide sensor (not shown) and may be responsive tosliding contact, or the biometric reader may be a standalone staticplacement sensor. In this example, the biometric reader is positioned ona front face of the mobile device 104, though this is merely exemplary.The biometric reader 128 may alternatively be disposed on any of thesides or a rear face of the mobile device 104. Those having ordinaryskill in the art will be capable of optimizing the position of thebiometric reader 128 in accordance with the ergonomic needs of the user102. As an alternative to the integrated biometric reader 128, it isalso possible to attach an external variant via an external datacommunication port included with the mobile device 104.

In one embodiment, the biometric reader 128 can be a fingerprint sensorpositioned behind or otherwise integrated with a button of the mobiledevice 104. The fingerprint sensor in this position would have optical,electrical, or other connectivity with an outer surface of the buttononto which the user would place a fingertip. In such an embodiment, thebiometric reader 128 is understood to be incorporated into or part ofthe touch screen display 116. Instead of the fingerprint sensor, animaging device such as an on-board camera with sufficient macro focuscapabilities may be utilized to capture an image of the fingerprint. Itwill be appreciated that any other type of sensor technology known inthe art or otherwise can capture characteristics of a person'sfingerprint can also be utilized.

The button may be a mechanical pushbutton switch 304 as previouslydescribed, a slider switch, or another type of button or switch on thedevice, preferably separate and apart from a display screen of thedevice (and thus not integrated with the display screen). For instance,the button could be made of a glass or Plexiglas material that allowsoptical communication through the button from the outer surface to thefingerprint sensor, or the button could be made of a conductive materialthat allows electrical connection through the button from the outersurface to the fingerprint sensor. Alternatively, the button coulditself be the fingerprint sensor or part of the fingerprint sensor, suchthat application of a fingertip to the button would constituteapplication of a fingertip to the fingerprint sensor itself.

As a specific example, the button may be a “home” button that a user canengage in order to return the device to a home state in which the devicedisplays a default user interface or the like. For example, a commercialexample of a button with integrated fingerprint scanning is availablefrom Apple, Inc. and is referred to as a Touch ID sensor (“Touch ID”).The Touch ID responds to a touch of the Home button on the iPhone thatuses a fingerprint as a passcode to unlock the phone. As anotherexample, the button may be a navigation button that a user can engageand perhaps toggle or otherwise move in order to navigate through a userinterface of the device. And as still another example, the button may bea power button that a user can engage in order to power-on or power-offthe device. Other examples are possible as well, such as a volumecontrol button, a push-to-talk button, a shutter-release button, a setupbutton, one or more keys on a keyboard or keypad, or other type ofbutton now known or later developed, in any of a variety of positions onthe device.

Referring back to the flowchart of FIG. 2A, the capture of biometricinput (e.g., user fingerprint) may be initiated in operation 202 by theuser 102 pressing the button/pushbutton switch 304 with an appropriate,pre-designated finger positioned over the biometric reader 128. Theprocess 200 continues with an operation 204 of deriving a set ofbiometric data from the captured biometric input from operation 202. Inembodiments using the fingerprint sensor, an image of a capturedfingerprint may be generated and stored in the memory 114. Becausecomparison of raw fingerprint images can be computationally intensiveand requires a substantial amount of processing power and memory, selecthighlights of pertinent points are derived. A much smaller datasetrepresentative of the fingerprint can be generated, and can be used as abasis for further comparison. Depending on security requirements and thedegree of false positives or negatives acceptable, the number ofelements in the set of biometric data can be modified. The set ofbiometric data (e.g., containing fingerprint data) is compared againstexisting biometric data stored in the memory 114.

The process 200 proceeds to an operation 206 of comparing the biometricdata from the captured biometric input of the user to a plurality ofexisting biometric data sets. More particularly, the biometric data isvalidated against a pre-enrolled set of biometric data to authenticatethe user and determine whether the user is approved for access to themobile device 104. If the biometric data is accepted as matching one ofthe authorized users', the mobile device 104 is unlocked and becomesaccessible in an unlocked mode (from the previous locked mode). When themobile device 104 is in the locked mode, permission to access certain,part, or all functions of the mobile device is denied. Those functionsinclude but not limited to, access to user account, Internet browsing,modifying setting, file access, launching software. When the mobiledevice 104 is in the unlocked mode, a state wherein the mobile device104 is unlocked, permissions granted to the user are to access certainpart, or all functions of the mobile device, including login to useraccounts, using Internet, modifying settings, file access. Further, whenthe mobile device 104 is in the unlocked mode, it can be controlled orresponsive to further interactive user inputs.

In one example, captured fingerprints can be matched againstfingerprints of a list of authorized users. In this example, eachdifferent fingerprint can be stored as a distinct biometric data set. Atoperation 206, the processor 112 determines whether the user has beenapproved or authenticated. The processor 112 compares the capturedfingerprint of the user with a reference fingerprint stored within thememory 114 of the mobile device 104. The processor 112 then comparesdata extracted from the captured fingerprint to reference fingerprintdata. If the processor 112 determines that the captured fingerprint ofthe user matches a stored reference fingerprint, then the mobile device104 is unlocked at operation 208 and the user is granted access toutilize the mobile device 104 to call another device, transmit messages,access data stored on the device, etc. If the processor 112 determinesthat the user is not approved to utilize the mobile device 104, then theoperations are repeated until the processor 112 determines that acaptured fingerprint of the user is approved.

In certain implementations, the mobile device 104 can be configured tocarry out a particular action after the device is unlocked based on thefingerprint used for unlocking. At operation 210, the processor 112executes a particular function on the mobile device 104 based on thecaptured fingerprint of the user. Once the mobile device has performedthe particular function, the mobile device may return to a locked stateor remain unlocked depending on the configuration of the device. Itshould be appreciated that the mobile device may have a plurality offingerprints registered for each user. Depending on the user and theiraccess level, certain applications may be accessed or displayed. Adifferent particular function may be associated with a specific finger(e.g., thumb, index, middle, ring, or little finger) that is registeredfor the user on the mobile device. Depending on the fingerprint that wascaptured, a particular action may be carried out when the device isunlocked. In one example, a fingerprint of an index finger may indicatethat a call is to be placed. When the fingerprint of the user's indexfinger is captured, when the mobile device is unlocked, a telephoneapplication may be launched to allow the user to place a call after themobile device has been unlocked.

In another example, a specific finger may be used to unlock the mobiledevice 104 into a panic mode. The panic mode is a unique mode ofoperation that is registered to be associated with one or more specificfingers of the user (referred to as panic fingers). During times ofdistress, the user may use a panic finger to unlock the phone into thepanic mode. In certain embodiments, the panic mode provides a mode ofoperation that limits access to a portion of information stored on themobile device as a method of protecting data on the device duringemergencies or situations during which personal information is moresusceptible to mishandling.

Referring now to FIG. 2B, an alternative embodiment of the capture anddetection of fingerprint input (e.g., user fingerprint) for activating apanic mode may be initiated in operation 212 by the user 102 pressingthe button/pushbutton switch 304 with an appropriate, pre-designatedfinger positioned over a fingerprint sensor. The process continues withan operation 214 of comparing the captured fingerprint input fromoperation 202 against a set of fingerprints to determine whether thefingerprint matches a particular one of the set of fingerprints. Inoperation 216, if the fingerprint input matches the particular one ofthe set of fingerprints, a panic mode of operation is activated.

In certain implementations, after activation of the panic mode, themobile device 104 unlocks the screen 116 and displays a user interfacethat appears to be in a normal operating state, detecting and respondingto user input corresponding to interaction with the mobile device 104.While the mobile device 104 is unlocked, the mobile device may displayon the touch screen user-interface objects corresponding to one or morefunctions of the device and/or information that may be of interest tothe user 102. The user-interface objects are objects that make up theuser interface of the mobile device 104 and may include, withoutlimitation, text, images, icons, soft keys (or “virtual buttons”),pull-down menus, radio buttons, check boxes, selectable lists, and soforth. The displayed user-interface objects may include non-interactiveobjects that convey information or contribute to the look and feel ofthe user interface, interactive objects with which the user mayinteract, or any combination thereof. The user may interact with theuser-interface objects by making contact with the touch screen at one ormore screen locations corresponding to the interactive objects withwhich the user wishes to interact. The unlocked mobile device 104detects and responds to user input for navigating between userinterfaces, entry of data and activation or deactivation of functions.

Some embodiments do not use any indicators or feedback to show that thepanic mode has been activated. However, when the mobile device 104 isunlocked into the panic mode, personal information items are notaccessible. Personal information items include a phonebook, contacts,emails, documents, messages, communication logs, photos, videos,schedules, supplementary services, etc. For example, the mobile device104 appears to have been restored to factory default settings, whereinany information in erasable memory is deleted or the same as factorysettings. The mobile device 104 would appear empty and applicationswould appear not to have any personal information (e.g., no access touser-level data). From the perspective of the user, the mobile device104 appears and operates like a brand new phone.

In some embodiments, the processor 112, in the panic mode, activates acamera 124 of the mobile device 104, which allows the camera 112 todiscreetly capture photographs and/or record video. By means of themobile device's camera 124, a photo, a series of photos or a video maybe captured of the situation or person(s) acting in a threatening mannerthat led the user 102 to activate the panic mode. Moreover, the mobiledevice 104 may be set to automatically take and transmit photos orvideos via the Internet 128 to be stored a remote server 130. Forexample, the photos or videos may be emailed or otherwise transmitted tothe remote server 130. For transmission, any type of transmissiondesigned to move captured information from the mobile device 104 toanother location is acceptable. Wireless Internet, Ethernet, or othernetwork connections can be used to transfer the captured information toa different device or site (e.g., remote server 130).

Alternatively, the photos or videos may be stored on the memory 114 ofthe mobile device 104 if network connectivity is not available using thewireless network connectivity module 106. This allows emergency responseproviders that monitor the remote server 130 to view the stored photosand determine an appropriate response. A photograph of the user 102 canalso be transmitted, taken with the phone or loaded from an existingphoto in the mobile device's memory 114 to the remote server 130 forassistance in identifying the user 102 of the mobile device 104.Further, any stored photos or videos on the remote server 130 can besupplied to a responding police force for assistance in responding to orfollowing up on the panic mode.

In some embodiments, the panic mode includes audio recording and relay.When the panic mode is activated (e.g., by fingerprint authorization asdescribed above) the device can begin audio recording and immediatetransmission of the audio, as desired. The user 102 of the mobile device104 can start verbally describing the wrongdoer. In many instances, thewrongdoer will be known to the user 102. In such a case, the user 102can merely state the known wrongdoer's name. In other cases, the user102 can start providing a verbal description of the wrongdoer. The audiorecording and transmission proceeds in an uninterruptible manner similarto that described above for photo capture and transmission. In someexample, a service provider can forward the audio and/or image data tolaw enforcement to assist in intervening in suspicious or criminalbehavior or in apprehending the wrongdoer.

In some embodiments, the mobile device 104 may be activated into thepanic mode in emergency situations to act as a beacon. If there is anearby device, the nearby other device (e.g., a PDA carried by anotherperson, a computer in an automobile, etc.) can be alerted with an alarmso that the user of the other device might come to the aid of the userinitiating the panic mode. For example, triggering the panic mode cansend out a signal on multiple frequencies, channels, links, etc., toprovide location information relative to other devices so that users ofthe other devices can provide assistance. Furthermore, as discussed inmore detail below, the panic mode may include a locator function thatuses, for example, global positioning systems (GPS) and/or cellularlocation systems to provide the location of the mobile device 104 toemergency response providers. In an exemplary situation, when the user102 is being mugged or is in an otherwise threatening situation, themobile device user 104 can put the mobile device 104 into the panicmode, which turns the mobile device into a beacon that gives out itslocation, while blocking others from gaining access to sensitiveinformation on the mobile device 104. In another exemplary situation, ifa hiker falls and requires assistance, the mobile device 104 may beactivated into the panic mode to activate a distress call or act as abeacon to alert emergency response providers (e.g. police, firedepartment, medical responders, etc.). In these examples, the beaconoperation can function in coordination with the audio, photo, or videorecording and/or transmission, providing as much information as isavailable to emergency responders.

The locator function provides the location of mobile device 104 when thepanic mode is activated to emergency response providers. The locatorfunction is implemented in a variety of manners in different embodimentsof the present invention. One embodiment involves the use of a GPSreceiver. A GPS receiver utilizes signals from satellites orbiting theearth to determine the position of the receiver. When the panic mode isactivated, the GPS receiver determines the location of the mobile device104. The mobile device 104 then transmits this positional information tothe emergency response provider. Another embodiment of the presentinvention uses a cellular location system to determine the position ofthe mobile device 104 by triangulation. This cellular location systemuses the strength of the signal from a mobile at different cellularstations to determine the location of the mobile device 104. Both theGPS and cellular locator functions help in tracking the location of themobile phone 104 in case of an emergency arises and the mobile phone 104sends distress signals in the panic mode. Positional information isbeneficial in an emergency situation, allowing the emergency responseprovider to determine the location of the mobile device 104 withoutrequiring any additional input from the user that activated the panicmode. In other embodiments, the panic mode activates an auto-dial callto e-911 (enhanced 911) to notify law enforcement and provides thelocation of the mobile phone 104 via the phone's GPS receiver to alertemergency service providers of possible emergencies. In anotherembodiment, after the panic mode is activated, the mobile device 104starts sending periodic distress signals using multiple mechanisms, suchas SMS, phone calls, GPS, and cellular locators. If the user confirmsthat there is an emergency, or if contact with the user cannot beestablished, the mobile device 104 may make contact with the emergencyservice providers immediately or after a pre-defined delay periodexpires. In some embodiments, the mobile device 104 may be subject to afollow-up call mechanism in the panic mode. For example, emergencyservice providers may check in with the user periodically via voice orSMS and alert the authorities if no response is received. The emergencyservice providers can be a nearest police station or hospital, based onthe GPS location, or other relevant agencies.

In some embodiments, the mobile device 104 may be activated into thepanic mode that uses the speaker 122 is as an audible alarm ornoisemaker that alerts individuals in the immediate area that anemergency exists. Once the panic mode is activated, the speaker 122begins emitting an alarm-type noise. Various different sounds could beproduced, including for example, a noise similar to that produced by acar alarm. In other embodiments, the mobile device 104 may be activatedinto the panic mode to activate a flashing light source (e.g., flashfrom the camera 124). Both the flashing light source and the noise alarmserve similar functions. On the one, hand they serve to scare offattackers; on the other hand, they serve to draw attention to the user102 that initiated the panic mode. Because the mobile device 104 can beactivated into the panic mode from anywhere that cellular service isavailable, the exact location of the user may be unknown to emergencyresponders. Thus, by drawing attention to the mobile device 104 and itsuser, the flashing light source and the noise alarm may be helpful toemergency responders attempting to locate the user 102.

Not all situations require all of the panic mode functionalities asdescribed above. In another example, a specific finger may be used tounlock the mobile device 104 into a private mode. The private mode is aunique mode of operation that is registered to be associated with one ormore specific fingers of the user. During times of distress that do notnecessarily rise to the severity of an emergency, the user may use aprivate finger to unlock the phone into the private mode. In certainembodiments, the private mode provides a mode of operation that limitsaccess to personal information stored on the mobile device as a methodof protecting data on the device during situations during which personalinformation is more susceptible to mishandling. For example, duringsituations where the mobile device 104 is more likely to be stolen butwhen the user 102 does not feel physically threatened to require activepanic beacons (e.g., during foreign travel), the private mode may beactivated for peace of mind. For example, upon entering a bar or nightspot where the mobile device 104 may be more likely to be stolen, theuser can activate private mode by scanning the designated finger.

Additional details regarding the functionality provided by the panicmode are detailed below in reference to FIGS. 4-5. Though arrangedserially in the example of FIGS. 4-5, other examples may reorder theoperations, omit one or more operations, and/or execute two or moreoperations in parallel using multiple processors or a single processororganized as two or more virtual machines or sub-processors. Moreover,still other examples can implement the operations as one or morespecific interconnected hardware or integrated circuit modules withrelated control and data signals communicated between and through themodules. Thus, any process flow is applicable to software, firmware,hardware, and hybrid implementations.

FIG. 4 is a diagram of a method 400 for activating the panic mode forfacilitating personal and data security on a mobile device, according toan example embodiment. The method 400 may be implemented as instructionsin a machine-accessible and computer-readable medium. The instructionsmay be executed by a machine (mobile device, computer, cell phone,personal digital assistant (PDA), etc.) as previously depicted in FIGS.1 and 3. The method 400 is also operational over and processes withinmobile telecommunications network 108 as depicted in FIG. 1. In anembodiment, the method 400 is implemented and is integrated within amobile device 104 of user 102 that is not connected to any mobiletelecommunications network.

At operation 402, the mobile device 104 receives a request to enter apanic mode of operation. This request is for the mobile device 104 toautomatically and dynamically transition itself to the panic mode ofoperation. Detection of the request for the panic mode of operation canoccur in a variety of manners, including fingerprint actuation. Atoperation 404, the mobile device 104 establishes an Internet connectionin response to the request for the panic mode of operation. The mobiledevice 104 establishes a network connection in response to the panicmode of operation to upload a variety of information, optionallyincluding real-time video and/audio, to a secure website or location(e.g., remote server 130) that is external to the mobile device 104. Atoperation 406, the mobile device 104 activates multimedia services torecord, in real time and dynamically, multimedia data from anenvironment of the mobile device 104. That is, real-time audio and/orvideo of the physical surrounds of the mobile device 104 are recorded.Additionally, at operation 408, the mobile device 104 acquires thegeographical position for the mobile device 104 while the real-timemultimedia data is being recorded. At operation 410, data collected inthe previous operations are transmitted to authorities to enable aresponse to the panic mode.

In certain implementations, once the device has been activated into thepanic mode, it may be desirable to provide mechanisms for deactivatingthe panic mode. With reference to FIG. 5, there is shown a flow diagramillustrating an embodiment of a method 500 for deactivation of the panicmode. The method starts at operation 502 in which a user input isprovided to request deactivation of the panic mode. For example, thespecific finger used to unlock the mobile device 104 into the panic modemay be used for deactivation. In addition to the biometric reader,mechanisms (other than fingerprints) may capture movement of a user'sfinger to deactivate the panic mode, according to an implementation ofthe present disclosure. The particular finger motions may include, forexample, a circular motion, a rectangular motion, a swipe motion (up,down, left, right motion), a combination of different swipe motions, orany motion that would be appreciated by a person of ordinary skill inthe art. Such motions may be pre-stored in the device and configured bythe user. For example, the user may use a circular motion indicates thatthe user desires to exit out of panic mode. Any combination of the userdefined gestures or fingerprinting may be used to deactivate the panicmode. At operation 504, the mobile device performs validation andauthentication functions using the received user input. The mobiledevice determines whether the user input is authenticated at operation506. If not, the mobile device remains in the panic mode in operation508. Once the received user input is authenticated, the mobile device isdeactivated from the panic mode in operation 510.

Modules, Components and Logic

Certain embodiments are described herein as including logic or a numberof components, modules, or mechanisms. Modules may constitute eithersoftware modules (e.g., code embodied on a machine-readable medium or ina transmission signal) or hardware modules. A hardware module is atangible unit capable of performing certain operations and may beconfigured or arranged in a certain manner. In example embodiments, oneor more computer systems (e.g., a standalone, client or server computersystem) or one or more hardware modules of a computer system (e.g., aprocessor or a group of processors) may be configured by software (e.g.,an application or application portion) as a hardware module thatoperates to perform certain operations as described herein.

In various embodiments, a hardware module may be implementedmechanically or electronically. For example, a hardware module maycomprise dedicated circuitry or logic that is permanently configured(e.g., as a special-purpose processor, such as a field programmable gatearray (FPGA) or an application-specific integrated circuit (ASIC)) toperform certain operations. A hardware module may also compriseprogrammable logic or circuitry (e.g., as encompassed within ageneral-purpose processor or other programmable processor) that istemporarily configured by software to perform certain operations. Itwill be appreciated that the decision to implement a hardware modulemechanically, in dedicated and permanently configured circuitry, or intemporarily configured circuitry (e.g., configured by software) may bedriven by cost and time considerations.

Accordingly, the term “hardware module” should be understood toencompass a tangible entity, be that an entity that is physicallyconstructed, permanently configured (e.g., hardwired) or temporarilyconfigured (e.g., programmed) to operate in a certain manner and/or toperform certain operations described herein. Considering embodiments inwhich hardware modules are temporarily configured (e.g., programmed),each of the hardware modules need not be configured or instantiated atany one instance in time. For example, where the hardware modulescomprise a general-purpose processor configured using software, thegeneral-purpose processor may be configured as respective differenthardware modules at different times. Software may accordingly configurea processor, for example, to constitute a particular hardware module atone instance of time and to constitute a different hardware module at adifferent instance of time.

Hardware modules can provide information to, and receive informationfrom, other hardware modules. Accordingly, the described hardwaremodules may be regarded as being communicatively coupled. Where multipleof such hardware modules exist contemporaneously, communications may beachieved through signal transmission (e.g., over appropriate circuitsand buses) that connect the hardware modules. In embodiments in whichmultiple hardware modules are configured or instantiated at differenttimes, communications between such hardware modules may be achieved, forexample, through the storage and retrieval of information in memorystructures to which the multiple hardware modules have access. Forexample, one hardware module may perform an operation and store theoutput of that operation in a memory device to which it iscommunicatively coupled. A further hardware module may then, at a latertime, access the memory device to retrieve and process the storedoutput. Hardware modules may also initiate communications with input oroutput devices, and can operate on a resource (e.g., a collection ofinformation).

The various operations of example methods described herein may beperformed, at least partially, by one or more processors that aretemporarily configured (e.g., by software) or permanently configured toperform the relevant operations. Whether temporarily or permanentlyconfigured, such processors may constitute processor-implemented modulesthat operate to perform one or more operations or functions. The modulesreferred to herein may, in some example embodiments, compriseprocessor-implemented modules.

Similarly, the methods described herein may be at least partiallyprocessor-implemented. For example, at least some of the operations of amethod may be performed by one or processors or processor-implementedmodules. The performance of certain of the operations may be distributedamong the one or more processors, not only residing within a singlemachine, but deployed across a number of machines. In some exampleembodiments, the processor or processors may be located in a singlelocation (e.g., within a home environment, an office environment or as aserver farm), while in other embodiments the processors may bedistributed across a number of locations.

The one or more processors may also operate to support performance ofthe relevant operations in a “cloud computing” environment or as a“software as a service” (SaaS). For example, at least some of theoperations may be performed by a group of computers (as examples ofmachines including processors), with these operations being accessiblevia a network (e.g., the Internet) and via one or more appropriateinterfaces (e.g., APIs).

Electronic Apparatus and System

Example embodiments may be implemented in digital electronic circuitry,or in computer hardware, firmware, software, or in combinations of them.Example embodiments may be implemented using a computer program product,for example, a computer program tangibly embodied in an informationcarrier, for example, in a machine-readable medium for execution by, orto control the operation of, data processing apparatus, for example, aprogrammable processor, a computer, or multiple computers.

A computer program can be written in any form of programming language,including compiled or interpreted languages, and it can be deployed inany form, including as a stand-alone program or as a module, subroutine,or other unit suitable for use in a computing environment. A computerprogram can be deployed to be executed on one computer or on multiplecomputers at one site or distributed across multiple sites andinterconnected by a communication network.

In example embodiments, operations may be performed by one or moreprogrammable processors executing a computer program to performfunctions by operating on input data and generating output. Methodoperations can also be performed by, and apparatus of exampleembodiments may be implemented as, special purpose logic circuitry(e.g., a FPGA or an ASIC).

The computing system can include clients and servers. A client andserver are generally remote from each other and typically interactthrough a communication network. The relationship of client and serverarises by virtue of computer programs running on the respectivecomputers and having a client-server relationship to each other. Inembodiments deploying a programmable computing system, it will beappreciated that both hardware and software architectures requireconsideration. Specifically, it will be appreciated that the choice ofwhether to implement certain functionality in permanently configuredhardware (e.g., an ASIC), in temporarily configured hardware (e.g., acombination of software and a programmable processor), or a combinationof permanently and temporarily configured hardware may be a designchoice. Below are set out hardware (e.g., machine) and softwarearchitectures that may be deployed, in various example embodiments.

Example Machine Architecture and Machine-Readable Medium

FIG. 6 is a block diagram of machine in the example form of a mobiledevice 600 within which instructions, for causing the machine to performany one or more of the methodologies discussed herein, may be executed.In alternative embodiments, the machine operates as a standalone deviceor may be connected (e.g., networked) to other machines. In a networkeddeployment, the machine may operate in the capacity of a server or aclient machine in server-client network environment, or as a peermachine in a peer-to-peer (or distributed) network environment. Thoughpreferably embodied as a mobile device, the machine may also be acomputing system, personal computer (PC), a tablet PC, a set-top box(STB), a PDA, a cellular telephone, a web appliance, a network router,switch or bridge, or any machine capable of executing instructions(sequential or otherwise) that specify actions to be taken by thatmachine. Further, while only a single machine is illustrated, the term“machine” shall also be taken to include any collection of machines thatindividually or jointly execute a set (or multiple sets) of instructionsto perform any one or more of the methodologies discussed herein.

The example mobile device 600 includes a processor 602 (e.g., a centralprocessing unit (CPU), a graphics processing unit (GPU) or both), a mainmemory 604 and a static memory 606, which communicate with each othervia a bus 608. The mobile device 600 may further include a video displayunit 610 (e.g., liquid crystals display (LCD) or a cathode ray tube(CRT)). The mobile device 600 also includes an alphanumeric input device612 (e.g., a keyboard), a user interface (UI) navigation device 614(e.g., a mouse), a disk drive unit 616, a signal generation device 618(e.g., a speaker) and a network interface device 620.

Machine-Readable Medium

The disk drive unit 616 includes a machine-readable medium 622 on whichis stored one or more sets of instructions and data structures (e.g.,software) 624 embodying or used by any one or more of the methodologiesor functions described herein. The instructions 624 may also reside,completely or at least partially, within the main memory 604, staticmemory 606, and/or within the processor 602 during execution thereof bythe mobile device 600, the main memory 604 and the processor 602 alsoconstituting machine-readable media.

While the machine-readable medium 622 is shown in an example embodimentto be a single medium, the term “machine-readable medium” may include asingle medium or multiple media (e.g., a centralized or distributeddatabase, and/or associated caches and servers) that store the one ormore instructions or data structures. The term “machine-readable medium”shall also be taken to include any tangible medium that is capable ofstoring, encoding or carrying instructions for execution by the machineand that cause the machine to perform any one or more of themethodologies of the present invention, or that is capable of storing,encoding or carrying data structures used by or associated with suchinstructions. The term “machine-readable medium” shall accordingly betaken to include, but not be limited to, solid-state memories, andoptical and magnetic media. Specific examples of machine-readable mediainclude non-volatile memory, including by way of example, semiconductormemory devices (e.g., Erasable Programmable Read-Only Memory (EPROM),Electrically Erasable Programmable Read-Only Memory (EEPROM)) and flashmemory devices; magnetic disks such as internal hard disks and removabledisks; magneto-optical disks; and CD-ROM and DVD-ROM disks.

Transition Medium

The instructions 624 may further be transmitted or received over acommunications network 626 using a transmission medium. The instructions624 may be transmitted using the network interface device 620 and anyone of a number of well-known transfer protocols (e.g., HTTP). Examplesof communication networks include a LAN, a WAN, the Internet, mobiletelephone networks, Plain Old Telephone (POTS) networks, and wirelessdata networks (e.g., WiFi and WiMax networks). The term “transmissionmedium” shall be taken to include any intangible medium that is capableof storing, encoding or carrying instructions for execution by themachine, and includes digital or analog communications signals or otherintangible media to facilitate communication of such software.

Although the present invention has been described with reference tospecific example embodiments, it will be evident that variousmodifications and changes may be made to these embodiments withoutdeparting from the broader spirit and scope of the invention.Accordingly, the specification and drawings are to be regarded in anillustrative rather than a restrictive sense.

Although an embodiment has been described with reference to specificexample embodiments, it will be evident that various modifications andchanges may be made to these embodiments without departing from thebroader spirit and scope of the invention. Accordingly, thespecification and drawings are to be regarded in an illustrative ratherthan a restrictive sense. The accompanying drawings that form a parthereof, show by way of illustration, and not of limitation, specificembodiments in which the subject matter may be practiced. Theembodiments illustrated are described in sufficient detail to enablethose skilled in the art to practice the teachings disclosed herein.Other embodiments may be used and derived therefrom, such thatstructural and logical substitutions and changes may be made withoutdeparting from the scope of this disclosure. This Detailed Description,therefore, is not to be taken in a limiting sense, and the scope ofvarious embodiments is defined only by the appended claims, along withthe full range of equivalents to which such claims are entitled.

Such embodiments of the inventive subject matter may be referred toherein, individually and/or collectively, by the term “invention” merelyfor convenience and without intending to voluntarily limit the scope ofthis application to any single invention or inventive concept if morethan one is in fact disclosed. Thus, although specific embodiments havebeen illustrated and described herein, it should be appreciated that anyarrangement calculated to achieve the same purpose may be substitutedfor the specific embodiments shown. This disclosure is intended to coverany and all adaptations or variations of various embodiments.Combinations of the above embodiments, and other embodiments notspecifically described herein, will be apparent to those of skill in theart upon reviewing the above description.

All publications, patents, and patent documents referred to in thisdocument are incorporated by reference herein in their entirety, asthough individually incorporated by reference. In the event ofinconsistent usages between this document and those documents soincorporated by reference, the usage in the incorporated reference(s)should be considered supplementary to that of this document; forirreconcilable inconsistencies, the usage in this document controls.

In this document, the terms “a” or “an” are used, as is common in patentdocuments, to include one or more than one, independent of any otherinstances or usages of “at least one” or “one or more.” In thisdocument, the term “or” is used to refer to a nonexclusive or, such that“A or B” includes “A but not B,” “B but not A,” and “A and B,” unlessotherwise indicated. In the appended claims, the terms “including” and“in which” are used as the plain-English equivalents of the respectiveterms “comprising” and “wherein.” Also, in the following claims, theterms “including” and “comprising” are open-ended; that is, a system,device, article, or process that includes elements in addition to thoselisted after such a term in a claim are still deemed to fall within thescope of that claim. Moreover, in the following claims, the terms“first,” “second,” and “third,” and so forth are used merely as labels,and are not intended to impose numerical requirements on their objects.

The Abstract of the Disclosure is provided to comply with 37 C.F.R. §1.72(b), requiring an abstract that will allow the reader to quicklyascertain the nature of the technical disclosure. It is submitted withthe understanding that it will not be used to interpret or limit thescope or meaning of the claims. In addition, in the foregoing DetailedDescription, it can be seen that various features are grouped togetherin a single embodiment for the purpose of streamlining the disclosure.This method of disclosure is not to be interpreted as reflecting anintention that the claimed embodiments require more features than areexpressly recited in each claim. Rather, as the following claimsreflect, inventive subject matter lies in less than all features of asingle disclosed embodiment. Thus the following claims are herebyincorporated into the Detailed Description, with each claim standing onits own as a separate embodiment.

What is claimed is:
 1. A method, comprising: detecting a fingerprintinput of a user of a mobile device, on a fingerprint sensor of themobile device; determining that the fingerprint input matches aparticular one of a set of fingerprints; and determining, based on thefingerprint input matching the particular one of the set offingerprints, a mode of operation to be activated for the mobile device,wherein a standard mode of operation is to be activated in response todetermining that the fingerprint input is associated with a first fingerof the user; and further wherein a panic mode of operation for themobile device is to be activated in response to determining that thefingerprint input is associated with a second finger of the user,wherein the panic mode of operation automatically disables access to aportion of personal information that is electronically stored for theuser on the mobile device, establishes a network connection in responseto the panic mode of operation, records data from an environment of themobile device, and transmits data to a remote server to enable aresponse to the panic mode of operation.
 2. The method of claim 1,further comprising: receiving a deactivation input; and deactivating thepanic mode of operation.
 3. The method of claim 1, wherein theparticular fingerprint is a registered fingerprint of a particularfinger of the user.
 4. The method of claim 1, wherein the panic modedisables a pre-defined set of functions the mobile device is normallyoperable to perform.
 5. The method of claim 4, wherein the panic modedisplays a user interface that provides an appearance of the mobiledevice having a set of default factory settings.
 6. The method of claim1, wherein the portion of personal information that is not accessible tothe user during the panic mode includes at least one of contactinformation, emails, photos, videos, or documents.
 7. The method ofclaim 1, wherein the panic mode of operation includes emitting a beaconsignal from the mobile device.
 8. The method of claim 1, wherein thepanic mode of operation includes transmitting an alert using a cellularnetwork to an emergency service provider.
 9. The method of claim 1,wherein the panic mode of operation includes recording a photograph or avideo using a camera of the mobile device.
 10. The method of claim 1,wherein the panic mode of operation includes recording an audio fileusing a microphone of the mobile device.
 11. A mobile device,comprising: a display; a biometric sensor; one or more processors; and acomputer-readable medium storing instructions for execution by the oneor more processors, the instructions when executed by the one or moreprocessors cause the mobile device to: detect a fingerprint input of auser of a mobile device, on the biometric sensor of the mobile device;determine that the fingerprint input matches a particular fingerprint;and activate, in response to the fingerprint input matching theparticular fingerprint: a standard mode of operation for the mobiledevice in response to determining that the fingerprint input isassociated with a first finger of the user; and a panic mode ofoperation for the mobile device in response to determining that thefingerprint input is associated with a second finger of the user,wherein the panic mode of operation automatically disables access to aportion of personal information that is electronically stored for theuser on the mobile device, establishes a network connection in responseto the panic mode of operation, records data from an environment of themobile device, and transmits data to a remote server to enable aresponse to the panic mode.
 12. The device of claim 11, wherein theparticular fingerprint is a registered fingerprint of a particularfinger of the user.
 13. The device of claim 11, further comprisinginstructions to: receive a deactivation input; and deactivate the panicmode of operation based on the deactivation input.
 14. The device ofclaim 11, wherein the panic mode of operation includes at least one ofemitting a beacon signal from the mobile device or transmitting an alertusing a cellular network to an emergency service provider.
 15. Thedevice of claim 11, further comprising: a camera capable of recording aphotograph or a video; and a microphone capable of recording an audiofile.
 16. The device of claim 15, wherein the panic mode of operationincludes capturing at least one of a photograph with the camera, a videoclip with the camera, or an audio clip with the microphone.