User interface for a mobile device

ABSTRACT

A method for generating a user interface at a mobile device includes receiving an indication of a user configurable pattern at a processor. The user configurable pattern indicates locations on a user interface that are spatially separated. The locations are configured to receive user input to enable access to data at the mobile device. The method also includes generating the user interface based on the user configurable pattern.

I. FIELD

The present disclosure is generally related to a user interface for amobile device.

II. DESCRIPTION OF RELATED ART

Advances in technology have resulted in smaller and more powerfulcomputing devices. For example, a variety of portable personal computingdevices, including wireless telephones such as mobile and smart phones,tablets, and laptop computers, are small, lightweight, and easilycarried by users. These devices can communicate voice and data packetsover wireless networks. Further, many such devices incorporateadditional functionality such as a digital still camera, a digital videocamera, a digital recorder, and an audio file player. Also, such devicescan process executable instructions, including software applications,such as a web browser application, that can be used to access theInternet. As such, these devices can include significant computingcapabilities.

Personal information of a user (and other secure information) may bestored at a mobile device. To protect the personal information fromunauthorized access, the mobile device may require a person attemptingto access data stored at the mobile device to provide authenticationusing a user interface. As non-limiting examples, a person attempting toaccess data stored at the mobile device may be required to provide oneor more of a password, a personal identification number (PIN), afingerprint for scanning, a voice sample for voice analysis, or otherbiometric features (e.g., facial features, iris scan, etc.).

However, the above-identified authentication techniques may be subjectto security breaches. For example, a password may be entered by anunauthorized third-party attempting to access the data stored at themobile device, a fingerprint may be “lifted” and used by a third-partyattempting to access the data stored at the mobile device, and biometricfeatures (e.g., voice samples, facial features, etc.) may be relativelyeasy to “spoof” To illustrate, an unauthorized third-party may usebiometric features of an authorized user from other sources (e.g., apicture or recorded video of the authorized user) to access the datastored at the mobile device. Thus, unauthorized users may be able to“manipulate” current techniques for authenticating a user's identity toaccess data stored at the mobile device.

Additionally, the user interface that is operable to receive theauthentication may have a “standard” design (or pattern). For example,the design of the user interface may not be desirable or customized withrespect to the user of the mobile device.

SUMMARY

According to an exemplary implementation of the techniques describedherein, a method for generating a user interface at a mobile deviceincludes receiving an indication of a user configurable pattern at aprocessor. The user configurable pattern indicates locations on a userinterface that are spatially separated. The locations are configured toreceive user input to enable access to data at the mobile device. Themethod also includes generating the user interface based on the userconfigurable pattern.

According to another implementation of the techniques described herein,an apparatus includes a memory and a processor coupled to the memory.The processor is configured to receive an indication of a userconfigurable pattern. The user configurable pattern indicates locationson a user interface that are spatially separated. The locations areconfigured to receive user input to enable access to data at the mobiledevice. The processor is also configured to generate the user interfacebased on the user configurable pattern.

According to another implementation of the techniques described herein,a non-transitory computer-readable includes instructions for generatinga user interface at a mobile device. The instructions, when executed bya processor, cause the processor to perform operations includingreceiving an indication of a user configurable pattern. The userconfigurable pattern indicates locations on a user interface that arespatially separated. The locations are configured to receive user inputto enable access to data at the mobile device. The operations alsoinclude generating the user interface based on the user configurablepattern.

According to another implementation of the techniques described herein,an apparatus includes means for receiving an indication of a userconfigurable pattern. The user configurable pattern indicates locationson a user interface that are spatially separated. The locations areconfigured to receive user input to enable access to data at the mobiledevice. The apparatus also includes means for generating the userinterface based on the user configurable pattern.

According to another implementation of the techniques described herein,a method for operating a mobile device includes generating a userinterface at a processor. The user interface includes one or morevirtual objects. The method also includes changing a configuration ofthe one or more virtual objects. The method further includes monitoringa mannerism of a user of the mobile device. The mannerism is affected bya change in configuration of the one or more virtual objects. The methodalso includes performing a function based on the mannerism.

According to another implementation of the techniques described herein,an apparatus includes a memory and a processor coupled to the memory.The processor is configured to generate a user interface. The userinterface includes one or more virtual objects. The processor is alsoconfigured to change a configuration of the one or more virtual objects.The processor is further configured to monitor a mannerism of a user ofthe mobile device. The mannerism is affected by a change inconfiguration of the one or more virtual objects. The processor is alsoconfigured to perform a function based on the mannerism.

According to another implementation of the techniques described herein,a non-transitory computer-readable medium includes instructions foroperating a mobile device. The instructions, when executed by aprocessor, cause the processor to perform operations includinggenerating a user interface. The user interface includes one or morevirtual objects. The method also includes changing a configuration ofthe one or more virtual objects. The method further includes monitoringa mannerism of a user of the mobile device. The mannerism is affected bya change in configuration of the one or more virtual objects. The methodalso includes performing a function based on the mannerism.

According to another implementation of the techniques described herein,an apparatus includes means for generating a user interface. The userinterface includes one or more virtual objects. The apparatus alsoincludes means for changing a configuration of the one or more virtualobjects. The apparatus further includes means for monitoring a mannerismof a user of a mobile device. The mannerism is affected by a change inconfiguration of the one or more virtual objects. The apparatus alsoincludes means for performing a function based on the mannerism.

IV. BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a system that is operable to monitor a mannerism of auser at a mobile device;

FIG. 2 illustrates a technique for authenticating a user identity at amobile device using a mannerism of a user;

FIG. 3 illustrates a technique for conserving power at a mobile deviceusing a mannerism of a user;

FIG. 4 illustrates another technique for authenticating a user identityat a mobile device using a mannerism of a user;

FIG. 5 illustrates another technique for authenticating a user identityat a mobile device using a mannerism of a user;

FIG. 6 illustrates a user interface that is operable to receive a swipeinput based on a user configurable pattern;

FIG. 7 illustrates a custom authentication user interface that isoperable to receive a personal identification number from a user toaccess data stored at a mobile device;

FIG. 8 illustrates another custom authentication user interface that isoperable to receive a personal identification number from a user toaccess data stored at a mobile device;

FIG. 9 is a flowchart of a method for using a mannerism to interact witha user interface;

FIG. 10 is a flowchart of a method for conserving power at a mobiledevice using a mannerism of a user; and

FIG. 11 is a block diagram of a device operable to perform one or moretechniques described with respect to FIGS. 1-10.

V. DETAILED DESCRIPTION

Techniques for authenticating a user identity using a mannerism of auser are disclosed. A mobile device may generate a user interface thatis operable to receive an input from a user. As a non-limiting example,the input may include a personal identification number (PIN) that isentered into the user interface to enable access to data stored at themobile device. The user may enter a first digit of the PIN and a sensorat the mobile device may detect a mannerism of the user when the userenters the first digit. As a non-limiting example, the sensor may be a“front-facing” camera configured to monitor pupil movement and/or eyegaze of the user when the user enters the first digit. After enteringthe first digit, a configuration of the user interface may change. Forexample, the location of numerical digits (e.g., keys) in the userinterface may change after first digit is entered. According to anexemplary implementation, the location of the numerical digits in theuser interface may randomly change. When the user enters a second digitof the PIN, the sensor may monitor the mannerism (e.g., the change inpupil movement and/or eye gaze due to the user's eye(s) searching forand/or locating the second digit, whose position has been changed). Eachtime the user enters a different digit of the PIN, the configuration ofthe user interface may change. The resulting change in the userinterface configuration may affect an orientation of the user's eyegaze. Thus, the mannerism may be affected by the configuration of theuser interface and the input provided to the user interface.

The processor may authenticate the user identity based on the input andthe mannerism. For example, if the PIN is correctly entered and theorientation of the user's eye gaze changes accordingly after each digitof the PIN is entered, the processor may enable the user to access datastored at the mobile device. It is to be understood that in otherexamples, inputs other than a PIN and mannerisms other than pupilmovement/eye gaze may be used in conjunction with the techniques of thepresent disclosure.

One particular advantage provided by at least one of the disclosedtechniques is an ability to reduce security breaches at a mobile device.For example, monitoring a mannerism while an authentication input isprovided to a user interface may reduce the likelihood that athird-party may successfully use “spoofing” (e.g., a picture or video ofan authorized user) to gain access to data stored at the mobile device.Other aspects, advantages, and features of the present disclosure willbecome apparent after review of the entire application.

Particular implementations of the present disclosure are described withreference to the drawings. In the description, common features aredesignated by common reference numbers throughout the drawings.

Referring to FIG. 1, a system 100 that is operable to monitor amannerism of a user at a mobile device is shown. As used herein, a“mannerism” of the user may also be referred to as a “live mannerism” ora mannerism that is detected in “real-time”. The system 100 includes amobile device 102 that is operable to detect a mannerism 122 from a user120 and operable to receive an authentication input 124 from the user124. As described below, the mannerism 122 and the authentication input124 may be used to verify an identity of the user 120. Upon verificationof the user's identity, the mobile device 102 may grant the user 120access to data stored within the mobile device 102. The mobile device102 includes an authentication input verification circuitry 104, adatabase 106, a data access circuitry 108, a mannerism trackingcircuitry 110, a user interface configuration circuitry 112, a userinterface 114, and a sensor 116.

During operation, the user 120 may provide the authentication input 124to the user interface 114. As described in greater detail with respectto FIGS. 2-11, the authentication input 124 may include a personalidentification number (PIN), a passcode, or a secure token. For ease ofillustration, the authentication input 124 is described as a PIN withrespect to FIG. 1. According to one implementation, the PIN may bestored in the database 106. After the user 120 enters each digit of thePIN, the user interface configuration circuitry 112 may change aconfiguration of one or more virtual objects (e.g., input keys) on theuser interface 114, as described in greater detail with respect to FIG.2. Additionally, the sensor 116 may detect the mannerism 122 of the user120 as the user 124 is providing the authentication input 124 to theuser interface 114, as described in greater detail with respect to FIG.2. According to another implementation, the sensor 116 may be configuredto detect the mannerism 122 of the user 120 after the user 124 providesthe authentication input 124 to the user interface 114. The mannerism122 may include an eye gaze of the user 120, pupil movement of the user120, lip movement of the user 120, etc.

The mannerism tracking circuitry 110 may be configured to track and/ormonitor the mannerism 122 detected by the sensor 116. If the mannerismtracking circuitry 110 determines that that the mannerism 122 correlatesto the change in configuration of virtual objects and if theauthentication input verification circuitry 104 determines that theauthentication input 124 matches the PIN stored in the database 106, thedata access circuitry 108 may verify the user's identify and may grantthe user 120 access to data stored at the mobile device 102. Additionaldetails regarding the verification process using the mannerism 122 areprovided with respect to FIGS. 2-11.

Referring to FIG. 2, a technique for authenticating a user identity at amobile device using a mannerism of a user is shown. In accordance withthe described techniques, a processor of a mobile device may generate auser interface that is operable to receive an input from a user of themobile device. According to FIG. 2, the user interface may, atparticular times, have a first configuration 202, a second configuration204, a third configuration 206, or a fourth configuration 208. It shouldbe understood that the configurations 202-208 illustrated in FIG. 2 aremerely non-limiting examples and other configurations may be used inconjunction with the techniques described herein.

According to FIG. 2, the user may use the user interface to enter apersonal identification number (PIN) (e.g., “8614”) as an authenticationinput to access data stored at the mobile device. Although a PIN isillustrated as the authentication input in FIG. 2, in otherimplementations, a password or a secure token may also be entered as anauthentication input.

The user may enter the first digit (e.g., “8”) of the PIN when the userinterface has the first configuration 202. According to the firstconfiguration 202, input key “1” may be at a first location (e.g., thetop-left location), input key “7” may be at a second location (e.g., thetop-center location), input key “9” may be at a third location (e.g.,the top-right location), input key “0” may be at a fourth location(e.g., the middle-left location), input key “4” may be at a fifthlocation (e.g., the middle-center location), input key “6” may be at asixth location (e.g., the middle-right location), input key “2” may beat a seventh location (e.g., the bottom-left location), input key “5”may be at an eighth location (e.g., the bottom-center location), inputkey “8” may be at a ninth location (e.g., the bottom-right location),and input key “3” may be at a tenth location. When the user enters thefirst digit of the PIN, a sensor at the mobile device may detect amannerism of the user. According to FIG. 2, the sensor may monitor thepupil movement of the user when the user enters the first digit of thePIN. For example, the sensor may detect the user's pupils move to thelower right, at 212, when the user enters the first digit of the PIN.Because the first digit (e.g., input key “8”) is located at the ninthlocation, the processor may determine that the orientation of the user'spupils correlate to the location of the first digit. Each input key maybe a virtual object included in the user interface. For ease ofdescription, the mannerism is described as the pupil movement of theuser. However, in other implementations, the mannerism may include aneye gaze of the user or lip movement of the user.

After entering the first digit of the PIN, the configuration of the userinterface may change to the second configuration 204. For example, thelocation of the input keys in the user interface may randomly changeafter the first digit of the PIN is entered. To illustrate, input key“6” may be at the first location, input key “2” may be at the secondlocation, input key “7” may be at the third location, input key “0” maybe at the fourth location, input key “5” may be at the fifth location,input key “9” may be at the sixth location, input key “3” may be at theseventh location, input key “8” may be at the eighth location, input key“1” may be at the ninth location, and input key “4” may be at the tenthlocation. When the user enters the second digit (e.g., “6”) of the PIN,the sensor at the mobile device may monitor (e.g., detect and/or track)the mannerism of the user. For example, the sensor may detect the user'spupils move to the upper right, at 214, when the user enters the seconddigit of the PIN. Because the second digit (e.g., input key “6”) islocated at the first location, the processor may determine that theorientation of the user's pupils correlate to the location of the seconddigit.

After entering the second digit of the PIN, the configuration of theuser interface may change to the third configuration 206. For example,the location of the input keys in the user interface may randomly changeafter the second digit of the PIN is entered. To illustrate, input key“4” may be at the first location, input key “2” may be at the secondlocation, input key “7” may be at the third location, input key “3” maybe at the fourth location, input key “0” may be at the fifth location,input key “8” may be at the sixth location, input key “1” may be at theseventh location, input key “9” may be at the eighth location, input key“5” may be at the ninth location, and input key “6” may be at the tenthlocation. When the user enters the third digit (e.g., “1”) of the PIN,the sensor at the mobile device may monitor (e.g., detect and/or track)the mannerism of the user. For example, the sensor may detect the user'spupils move to the lower right, at 216, when the user enters the thirddigit of the PIN. Because the third digit (e.g., input key “1”) islocated at the seventh location, the processor may determine that theorientation of the user's pupils correlate to the location of the thirddigit.

After entering the third digit of the PIN, the configuration of the userinterface may change to the fourth configuration 208. For example, thelocation of the input keys in the user interface may randomly changeafter the third digit of the PIN is entered. To illustrate, input key“1” may be at the first location, input key “0” may be at the secondlocation, input key “4” may be at the third location, input key “9” maybe at the fourth location, input key “7” may be at the fifth location,input key “8” may be at the sixth location, input key “5” may be at theseventh location, input key “6” may be at the eighth location, input key“2” may be at the ninth location, and input key “3” may be at the tenthlocation. When the user enters the fourth digit (e.g., “4”) of the PIN,the sensor at the mobile device may monitor (e.g., detect and/or track)the mannerism of the user. For example, the sensor may detect the user'spupils move to the upper right, at 218, when the user enters the fourthdigit of the PIN. Because the fourth digit (e.g., input key “4”) islocated at the third location, the processor may determine that theorientation of the user's pupils correlate to the location of the fourthdigit.

Thus, each time the user enters a different digit of the PIN, theconfiguration of the user interface may change. The resulting change inthe user interface configuration may “affect” the user's pupil movementwhen entering the next digit of the PIN. Thus, the mannerism (e.g., theuser's pupil movement) may be affected by each change in configurationof the interface and by the input (e.g., the PIN) provided to the userinterface. The processor may authenticate the user identity based on theinput and the mannerism. For example, if the PIN is correctly enteredand the orientation of the user's pupils changes accordingly after eachdigit of the PIN is entered, the processor may allow the user to accessdata stored at the mobile device.

The techniques described with respect to FIG. 2 may reduce securitybreaches at the mobile device. For example, if the user interfacerequires the user to provide a biometric feature, such as a depiction ofthe user's face, the techniques of FIG. 2 may prevent an unauthorizedthird party that knows the PIN to use a “spoof” (e.g., a picture orvideo of an authorized user) to gain access to data stored at the mobiledevice. For example, mannerism (e.g., pupil movement) monitoring mayprevent an unauthorized third party from placing video (or a picture) ofan authorized user to the user interface while entering the PIN becausethe orientation of the user's pupils in the video may not correlate tothe location of the digits as the digits are being entered.

Referring to FIG. 3, a technique for conserving power at a mobile deviceusing a mannerism of the user is shown. A processor may generate a userinterface. In FIG. 3, the user interface is a “home screen” with anoption to dial a number or send a short message service (SMS) message.It should be understood that the power savings techniques describedherein may work in conjunction with a multitude of user interfacescreens and should not be limited to the home screen.

According to FIG. 3, the user interface may have a first configuration302, a second configuration 304, a third configuration 306, and a fourthconfiguration 308. It should be understood that the configurations302-308 illustrated in FIG. 3 are merely non-limiting examples and otherconfigurations may be used in conjunction with the techniques describedherein.

In the first configuration 302, a virtual object 320 may be in a firstlocation (e.g., an upper-left corner) of the user interface. The virtualobject 320 may become visible on the user interface after a prolongedperiod of user inaction. For example, if the user has failed to touchthe user interface for a particular period of time, the virtual object320 may become visible on the user interface. Although a single virtualobject 320 is illustrated in the user interface, in otherimplementations, one or more virtual objects may become visible on theuser interface after a prolonged period of user inaction.

As described above, the virtual object 320 may in the first location ofthe user interface in the first configuration 302. A sensor at themobile device may detect a mannerism of the user when the virtual object320 becomes visible on the user interface. As a non-limiting example,the sensor may monitor pupil movement of the user when the virtualobject 320 becomes visible on the user interface. According to FIG. 3,the sensor may detect the user's pupils move to the upper-left, at 312,when the virtual object 320 is at the first location. For ease ofdescription, the mannerism is described as the pupil movement of theuser. However, in other implementations, the mannerism may include aneye gaze of the user or lip movement of the user.

The virtual object 320 may move from the first location of the userinterface in the first configuration 302 to a second location (e.g., alower-right corner) of the user interface in the second configuration304. As the virtual object 320 moves from the first location in thefirst configuration 302 to the second location in the secondconfiguration 304, the sensor at the mobile device may monitor (e.g.,detect and/or track) the mannerism of the user. For example, the sensormay track whether the user's pupils move from the upper-left, at 312, tothe lower-right, at 314. Thus, in tracking the user's pupil movement, aprocessor may determine a correlation between the pupil movement and thechange in location of the virtual object 320. As described below, theprocessor may power down a light emitting display (LED) screen of themobile device (e.g., enter a low-power state) if the correlation failsto satisfy a threshold. If the correlation satisfies the threshold, theprocessor may power up the LED screen (e.g., continue to operate themobile device in a high-power state).

The virtual object 320 may move from the second location of the userinterface in the second configuration 304 to a third location (e.g., alower-left corner) of the user interface in the third configuration 306.As the virtual object 320 moves from the second location in the secondconfiguration 304 to the third location in the third configuration 306,the sensor at the mobile device may monitor (e.g., detect and/or track)the mannerism of the user. For example, the sensor may track whether theuser's pupils move from the lower-right, at 314, to the lower-left, at316. Thus, in tracking the user's pupil movement, the processor maydetermine a correlation between the pupil movement and the change inlocation of the virtual object 320. The processor may power down the LEDscreen of the mobile device (e.g., enter a low-power state) if thecorrelation fails to satisfy a threshold. If the correlation satisfiesthe threshold, the processor may power up the LED screen (e.g., continueto operate the mobile device in a high-power state).

The virtual object 320 may move from the third location of the userinterface in the third configuration 306 to a fourth location (e.g., anupper-right corner) of the user interface in the fourth configuration308. As the virtual object 320 moves from the third location in thethird configuration 306 to the fourth location in the fourthconfiguration 308, the sensor at the mobile device may monitor (e.g.,detect and/or track) the mannerism of the user. For example, the sensormay track whether the user's pupils move from the lower-left, at 316, tothe upper-right, at 318. Thus, in tracking the user's pupil movement,the processor may determine a correlation between the pupil movement andthe change in location of the virtual object 320. The processor maypower down the LED screen of the mobile device (e.g., enter a low-powerstate) if the correlation fails to satisfy a threshold. If thecorrelation satisfies the threshold, the processor may power up the LEDscreen (e.g., continue to operate the mobile device in a high-powerstate).

The techniques described with respect to FIG. 3 may conserve batterypower at the mobile device. For example, because the virtual object 320becomes visible after a prolonged period of user inactivity, monitoringthe mannerism of the user based on changing configurations 302-308 ofthe user interface may enable the processor to determine whether theuser is looking at the user interface. To illustrate, if correlationbetween pupil movement and the change in location of the virtual object320 satisfies the threshold, the processor may determine that the useris looking at the user interface and may continue to operate the mobiledevice in a high-power state. However, if the correlation fails tosatisfy the threshold, the processor may determine that there is arelatively high likelihood the user is not looking at the user interfaceand may power-down the LED screen to conserve battery power.

Referring to FIG. 4, another technique for authenticating a useridentity at a mobile device using a mannerism of the user is shown. Aprocessor may generate a user interface that is operable to receive aninput from a user of the mobile device. According to FIG. 4, the userinterface may have a first configuration 402, a second configuration404, a third configuration 406, and a fourth configuration 408. Itshould be understood that the configurations 402-408 illustrated in FIG.4 are merely non-limiting examples and other configurations may be usedin conjunction with the techniques described herein.

According to FIG. 4, the user may draw a pattern using the userinterface to access data stored at the mobile device (e.g., to “unlock”the mobile device). Although a pattern is illustrated as anauthentication input in FIG. 4, in other implementations, a password, aPIN, or a secure token may also be entered as an authentication input.

The user may touch a first input key (e.g., a virtual object) of thepattern when the user interface has the first configuration 402.According to the first configuration 402, one or more of the input keysmay be a first color. For example, one or more of the input keys in theuser interface may be blue. A sensor may monitor a mannerism (e.g., thepupil color) of the user when the user interface has the firstconfiguration 402 (e.g., when the input keys are blue). For example, thesensor may detect that the user's pupils have a blue reflection, at 412.Because the reflected color of the user's pupils match the color of theinput keys, a processor may determine that a “real-life” user is drawingthe pattern. For ease of description, each change in configuration isdescribed as a different input key color. However, in otherimplementations, each change in configuration may include a differentbackground color.

After touching the first input key, the configuration of the userinterface may change to the second configuration 404. For example, thecolor of the input keys in the user interface may turn red. The sensormay monitor the pupil color of the user when the user interface has thesecond configuration 404 (e.g., when the input keys are red). Forexample, the sensor may detect that the user's pupils have a redreflection, at 414. Because the reflected color of the user's pupilsmatch the color of the input keys, the processor may determine that areal-life user is drawing the pattern. The user may slide his or herfinger to the second input key of the pattern after touching the firstinput key. According to FIG. 4, the second input key is located to theright of the first input key.

After touching the second input key, the configuration of the userinterface may change to the third configuration 406. For example, thecolor of the input keys in the user interface may turn yellow. Thesensor may monitor the pupil color of the user when the user interfacehas the third configuration 406 (e.g., when the input keys are yellow).For example, the sensor may detect that the user's pupils have a yellowreflection, at 416. Because the reflected color of the user's pupilsmatch the color of the input keys, the processor may determine that areal-life user is drawing the pattern. The user may slide his or herfinger to the third input key of the pattern after touching the secondinput key. According to FIG. 4, the third input key is located beneaththe second input key.

After touching the third input key, the configuration of the userinterface may change to the fourth configuration 408. For example, thecolor of the input keys in the user interface may turn green. The sensormay monitor the pupil color of the user when the user interface has thefourth configuration 408 (e.g., when the input keys are green). Forexample, the sensor may detect that the user's pupils have a greenreflection, at 418. Because the reflected color of the user's pupilsmatch the color of the input keys, the processor may determine that areal-life user is drawing the pattern. The user may slide his or herfinger to the fourth input key of the pattern after touching the secondinput key to unlock the mobile device (e.g., to access data stored atthe mobile device). According to FIG. 4, the fourth input key is locatedbeneath the third input key.

The techniques described with respect to FIG. 4 may reduce securitybreaches at the mobile device. For example, if the user interfacerequires the user to draw a pattern to unlock the mobile device, thetechniques of FIG. 4 may prevent an unauthorized third party from usingsecurity breaching techniques to automatically detect and override thepattern. For example, monitoring the mannerism (e.g., the pupil color)may be used as a security mechanism to verify that a real-life person isdrawing the pattern to unlock the mobile device.

Referring to FIG. 5, another technique for authenticating a useridentity at a mobile device using a mannerism of the user is shown. Aprocessor may generate a user interface that is operable to receive aninput from a user of the mobile device. According to FIG. 5, the userinterface may have a first configuration 502, a second configuration504, a third configuration 506, and a fourth configuration 508. Itshould be understood that the configurations 502-508 illustrated in FIG.5 are merely non-limiting examples and other configurations may be usedin conjunction with the techniques described herein.

For ease of description and illustration, the user may enter the samepersonal identification number (PIN) (e.g., “8614”) in FIG. 2 using theuser interface of FIG. 5 to access data stored at the mobile device.Although a PIN is illustrated as the authentication input in FIG. 2, inother implementations, a password or a secure token may also be enteredas an authentication input.

The user may enter the first digit (e.g., “8”) of the PIN when the userinterface has the first configuration 502. According to the firstconfiguration 502, the input keys “0-9” may be at a first location(e.g., the bottom-right location). When the user enters the first digitof the PIN, a sensor at the mobile device may detect a mannerism of theuser. For ease of description, the mannerism described with respect toFIG. 2 may be used in conjunction with the techniques of FIG. 5. Toillustrate, the sensor may monitor the pupil movement of the user whenthe user enters the first digit of the PIN. For example, the sensor maydetect the user's pupils move to the lower right, at 212, when the userenters the first digit of the PIN. Because the input keys are located atthe first location, the processor may determine that the orientation ofthe user's pupils correlate to the location of the input keys. Eachinput key may be a virtual object included in the user interface. Forease of description, the mannerism is described as the pupil movement ofthe user. However, in other implementations, the mannerism may includean eye gaze of the user or lip movement of the user.

After entering the first digit of the PIN, the configuration of the userinterface may change to the second configuration 504. According to thesecond configuration 504, the input keys “0-9” may be at a secondlocation (e.g., the top-left location). When the user enters the seconddigit (e.g., “6”) of the PIN, the sensor at the mobile device maymonitor (e.g., detect and/or track) the mannerism of the user. Forexample, the sensor may detect the user's pupils move to the upper left,at 214, when the user enters the second digit of the PIN. Because theinput keys are located at the second location, the processor maydetermine that the orientation of the user's pupils correlate to thelocation of the input keys.

After entering the second digit of the PIN, the configuration of theuser interface may change to the third configuration 506. According tothe third configuration 506, the input keys “0-9” may be at a thirdlocation (e.g., the bottom-left location). When the user enters thethird digit (e.g., “1”) of the PIN, the sensor at the mobile device maymonitor (e.g., detect and/or track) the mannerism of the user. Forexample, the sensor may detect the user's pupils move to the lower left,at 216, when the user enters the third digit of the PIN. Because theinput keys are located at the third location, the processor maydetermine that the orientation of the user's pupils correlate to thelocation of the input keys.

After entering the third digit of the PIN, the configuration of the userinterface may change to the fourth configuration 508. According to thefourth configuration 508, the input keys “1, 7, and 9” may be at thesecond location, input keys “2 and 5” may be at the first location,input keys “3 and 8” may be at the third location, and input keys “0, 4,and 6” may be at a fourth location (e.g., the top-right location). Whenthe user enters the fourth digit (e.g., “4”) of the PIN, the sensor atthe mobile device may monitor (e.g., detect and/or track) the mannerismof the user. For example, the sensor may detect the user's pupils moveto the upper right, at 218, when the user enters the fourth digit of thePIN. Because the input key “4” is located at the fourth location, theprocessor may determine that the orientation of the user's pupilscorrelate to the location of the input keys.

The techniques described with respect to FIG. 5 may reduce securitybreaches at the mobile device. For example, if the user interfacerequires the user to provide a biometric feature, such as a depiction ofthe user's face, the techniques of FIG. 5 may prevent an unauthorizedthird party that knows the PIN to use a “spoof” (e.g., a picture orvideo of an authorized user) to gain access to data stored at the mobiledevice. For example, mannerism (e.g., pupil movement) monitoring mayprevent an unauthorized third party from placing video (or a picture) ofan authorized user to the user interface while entering the PIN becausethe user's pupils in the video may not correlate to the location of thedigits as the digits are being entered.

Referring to FIG. 6, a user interface 600 that receives a “swipe” inputbased on a user configurable pattern is shown. For example, a processormay receive an indication of a user configurable pattern. The userconfigurable pattern may indicate locations on the user interface thatare spatially separated, and the locations may be usable to access dataat a mobile device. Upon receiving the indication, the processor maygenerate the user interface 600 based on the user configurable pattern.

According to the user interface 600, a first location 602 and a secondlocation 604 may be selected by a user. For example, the user may selectthe first location 602 and the second location 604 during aconfiguration process. Thus, the first location 602 and the secondlocation 604 may be user configurable. According to the implementationof FIG. 6, the first location 602 may be located at a diagonal from thesecond location 604. The user may place their finger at the firstlocation 602 and slide their finger to the second location 604 to accessdata stored at the mobile device.

Referring to FIG. 7, a custom authentication user interface 700 that isoperable to receive a PIN from a user to access data stored at a mobiledevice is shown. Numerical input keys of the user interface 700 may bespatially separated. In the illustrated example, numerical input keys“1-3” are located at a top-left corner of the user interface 700,numerical input keys “4-6” are located at a bottom-right corner of theuser interface 700, numerical input keys “7-9” are located at abottom-right corner of the user interface 700, and numerical input key“0” is located at a bottom-left corner of the user interface 700.

A user may enter the PIN using the numerical input keys to access datastored at the mobile device. The location of each numerical input keymay be user configurable. For example, a user of the mobile device mayselect the location of each numerical input key during a configurationprocess. According to a particular implementation, the configuration ofone or more numerical input keys may change upon entering a digit of thePIN (in a substantially similar way to the techniques of FIG. 2).Additionally, a mannerism may be monitored based on the techniques ofFIG. 2 to grant access to data stored at the mobile device.

It should be appreciated that the location of each numerical input keyin the user interface 700 is for illustrative purposes only and shouldnot be construed as limiting. For example, in other implementations,numerical input keys “1, 3, and 5” may be located in the bottom-rightcorner of the user interface 700, numerical input key “6” may be locatedin the center of the user interface 700, etc.

Referring to FIG. 8, another custom authentication user interface 800that is operable to receive a PIN from a user to access data stored at amobile device. Numerical input keys of the user interface 800 may bespatially separated and may have different colors. In the illustratedexample, numerical input keys “1, 3, 7, and 9” are red, numerical inputkeys “0, 2, 5, and 8” are blue, and numerical input keys “4 and 6” aregreen. The background of the user interface 800 is yellow. A user mayenter the PIN using the numerical input keys to access data stored atthe mobile device.

It should be appreciated that the colors and locations of the numericalinput keys and the color of the background are merely illustrative andshould not be construed as limiting. In other implementations, thebackground may be a different color (e.g., red, blue, orange, etc.) andthe colors/location of the numerical input keys may also be different.According to a particular implementation, the location of each numericalinput key, the color of each numerical input key, and the color of thebackground may be user configurable. For example, a user of the mobiledevice may select the location/color of each numerical input key and mayselect the color of the background during a configuration process.

According to another implementation, the color used for the numericalinput keys or the color of the background may be based on a color ofuser's pupils or clothes. For example, a sensor may detect the color ofthe user's pupils or clothes, and a processor may generate the numericalkeys in user interface based on the detected colors. Whether the coloris based on the user's pupils or clothes may depend on a userconfigurable setting. As a non-limiting example, the user may indicatefor the color of the numerical input keys to be based on the color ofthe user's pupils and may indicate for the color of the background to bebased on the color the user's clothes. To illustrate, when the userlooks at the user interface 800 to enter the PIN, the sensor may detecta color of the user's pupils and clothes. If the user has brown pupilsand is wearing a red shirt, the color of the input keys in the userinterface 800 may be brown and the color of the background may be red,based on the user configurable settings.

According to a particular implementation, the configuration of one ormore numerical input keys may change upon entering a digit of the PIN(in a substantially similar way to the techniques of FIG. 2).Additionally, a mannerism may be monitored based on the techniques ofFIG. 2 to grant access to data stored at the mobile device.

Referring to FIG. 9, a flowchart of a method 900 for using a mannerismto interact with a user interface is shown. The method 900 may beperformed using one or more of the techniques described with respect toFIGS. 2-8.

The method 900 includes generating a user interface at a processor, at902. The user interface includes one or more virtual object. Forexample, referring to FIG. 2, a processor may generate the userinterface that is operable to receive an input from a user of the mobiledevice. The user interface in FIG. 2 may have ten virtual objects (e.g.,ten input keys. As another example, referring to FIG. 3, a processor maygenerate the user interface that includes the virtual object 320.

A configuration of the one or more virtual objects may change, at 904.For example, referring to FIG. 2, each time the user enters a differentdigit of the PIN, the configuration of the user interface may change. Asanother example, referring to FIG. 3, the virtual object 320 may becomevisible on the user interface after a prolonged period of user inaction.For example, if the user has failed to touch the user interface for aparticular period of time, the virtual object 320 may become visible onthe user interface.

A mannerism of a user may be monitored at the mobile device, at 906. Themannerism may be affected by a change in configuration of the one ormore virtual objects. For example, referring to FIG. 2, the mannerism(e.g., the user's pupil movement) may be affected by a change inconfiguration of the interface and the input (e.g., the PIN) provided tothe user interface. As another example, referring to FIG. 3, the user'spupils may move in a direction of the virtual object 320.

A function may be performed based on the mannerism, at 908. For example,referring to FIG. 2, the processor may authenticate the user identitybased on the input and the mannerism. To illustrate, if the PIN iscorrectly entered and the orientation of the user's pupils changesaccordingly after each digit of the PIN is entered, the processor mayallow the user to access data stored at the mobile device. As anotherexample, referring to FIG. 3, monitoring the mannerism of the user basedon changing configurations 302-308 of the user interface may enable theprocessor to determine whether the user is looking at the userinterface. To illustrate, if correlation between pupil movement and thechange in location of the virtual object 320 satisfies the threshold,the processor may determine that the user is looking at the userinterface and may continue to operate the mobile device in a high-powerstate. However, if the correlation fails to satisfy the threshold, theprocessor may determine that there is a relatively high likelihood theuser is not looking at the user interface and may power-down the LEDscreen to conserve battery power.

According to one implementation of the method 900, monitoring themannerism may include monitoring pupil movement of the user, monitoringan eye gaze of the user, monitoring lip movement of the user, or acombination thereof. The one or more virtual objects may include inputkeys that are operable to receive an authentication input from the user.Changing the configuration of the one or more virtual objects mayinclude changing a color of one or more of the input keys in response toreceiving each entry of the authentication input, changing a location ofone or more of the input keys on the user interface in response toreceiving each entry of the authentication input, or a combinationthereof. The authentication input may include at least one of a PIN, apassword, or a secure token.

According to one implementation, the method 900 may also includereceiving data indicating a biometric feature of the user. The mannerismmay be associated with the biometric feature. As a non-limiting example,the biometric feature may correspond to a facial feature of the user andthe mannerism may correspond to pupil movement. The method 900 may alsoinclude authenticating a user identity based on the authenticationinput, the biometric feature, and the mannerism.

According to one implementation of the method 900, changing theconfiguration of the one or more virtual objects include changing alocation of the one or more virtual objects. Monitoring the mannerismmay include monitoring pupil movement of the user when the configurationof the one or more virtual objects changes. The method 900 may alsoinclude determining a correlation between the pupil movement and achange in location of the one or more virtual objects. The method 900may include powering down a LED display screen of the mobile device ifthe correlation fails to satisfy a threshold and powering up the LEDdisplay screen if the correlation satisfies the threshold.

The method 900 of FIG. 9 may reduce security breaches at the mobiledevice. For example, if the user interface requires the user to providea biometric feature, such as a depiction of the user's face, the method900 may prevent an unauthorized third party that knows the PIN to use a“spoof” (e.g., a picture or video of an authorized user) to gain accessto data stored at the mobile device. For example, mannerism (e.g., pupilmovement) monitoring may prevent an unauthorized third party fromplacing video (or a picture) of an authorized user to the user interfacewhile entering the PIN because the user's pupils in the video may notcorrelate to the location of the digits as the digits are being entered.The method 900 may also conserve battery power at the mobile device.

Referring to FIG. 10, a method 1000 for conserving power at a mobiledevice using a mannerism of the user is shown. The method 1000 may beperformed using one or more of the techniques described with respect toFIGS. 2-8.

The method 1000 includes receiving an indication of a user configurablepattern at a processor, at 1002. The user configurable pattern mayindicate locations on a user interface that are spatially separated. Thelocations may be configured to receive user input to enable access todata at the mobile device. For example, referring to FIG. 7, thelocation of each numerical input key may be user configurable. Toillustrate, a user of the mobile device may select the location of eachnumerical input key during a configuration process.

The user interface may be generated based on the user configurablepattern, at 1004.

For example, referring to FIG. 7, the processor may generate the userinterface 700 based on the user configurable pattern.

According to one implementation of the method 1000, each location maydisplay an input key that enables entry of an authentication code. Acolor of at least one input key may be based on a pupil color of a userof the mobile device. Alternatively, or in addition, a color of at leastone input key may be based on a color of an article of clothing of auser of the mobile device. One or more input keys may be differentcolors. For example, a first input key may have a different color than asecond input key. The authentication input may include a PIN, apassword, or a secure token. A background color of the user interfacemay be based on a pupil color of the user or based on a color of anarticle of clothing of the user.

According to one implementation of the method 1000, the locations mayinclude a first location and a second location. A swipe input betweenthe first location and the second location may enable access to thedata.

Referring to FIG. 11, a wireless communication device is depicted andgenerally designated 1100. The device 1100 includes a processor 1110,such as a digital signal processor, coupled to a memory 1132.

The processor 1110 may be configured to execute software (e.g., aprogram of one or more instructions 1168) stored in the memory 1132. Ina particular implementation, the processor 1110 may be operable toperform the method 900 of FIG. 9 and/or the method 1000 of FIG. 10. Forexample, the processor 1110 may be configured to execute one or moreinstructions 1168 stored in the memory 1132 to perform the method 900 ofFIG. 9 and/or the method 1000 of FIG. 10. For example, the memory 1132may be a non-transitory computer-readable medium that includesinstructions 1168 that, when executed by the processor 1110, cause theprocessor 1110 to perform the method 900 of FIG. 9 and/or the method1000 of FIG. 10.

A wireless interface 1140 may be coupled to the processor 1110 and to anantenna 1142.

A coder/decoder (CODEC) 1134 can also be coupled to the processor 1110.A speaker 1136 and a microphone 1138 can be coupled to the CODEC 1134. Adisplay controller 1126 can be coupled to the processor 1110 and to adisplay device 1128. The display device 1128 may display a userinterface 1129 that operates in conjunction with the techniquesdescribed with respect to FIGS. 1-9. In a particular implementation, theprocessor 1110, the display controller 1126, the memory 1132, the CODEC1134, and the wireless interface 1140 are included in asystem-in-package or system-on-chip device 1122. In a particularimplementation, a sensor 1130 and a power supply 1144 are coupled to thesystem-on-chip device 1122. In a particular implementation, the sensor1130 may monitor mannerisms according to the techniques with respect toFIGS. 1-9. Moreover, in a particular implementation, as illustrated inFIG. 11, the display device 1128, the sensor 1130, the speaker 1136, themicrophone 1138, the antenna 1142, and the power supply 1144 areexternal to the system-on-chip device 1122. However, each of the displaydevice 1128, the sensor 1130, the speaker 1136, the microphone 1138, theantenna 1142, and the power supply 1144 can be coupled to one or morecomponents of the system-on-chip device 1122, such as one or moreinterfaces or controllers.

The device 1100 corresponds to a mobile communication device, asmartphone, a cellular phone, a laptop computer, a computer, a tabletcomputer, a personal digital assistant, a display device, a television,a gaming console, a music player, a radio, a digital video player, anoptical disc player, a tuner, a camera, a navigation device, or anycombination thereof.

In conjunction with the described implementations, a first apparatusincludes means for generating a user interface. The user interface mayinclude one or more virtual objects. For example, the means forgenerating the user interface may include the processor 1110 of FIG. 11,the display controller 1126 of FIG. 11, the display device 1128 of FIG.11, one or more other devices, circuits, modules, or any combinationthereof.

The first apparatus may also include means for changing a configurationof the one or more virtual objects. For example, the means for changingthe configuration may include the processor 1110 of FIG. 11, the displaycontroller 1126 of FIG. 11, the display device 1128 of FIG. 11, one ormore other devices, circuits, modules, or any combination thereof.

The first apparatus may also include means for monitoring a mannerism ofa user of a mobile device. The mannerism may be affected by a change inconfiguration of the one or more virtual objects. For example, the meansfor monitoring the mannerism may include the sensor 1130 of FIG. 11, theprocessor 1110 of FIG. 11, one or more other devices, circuits, modules,or any combination thereof.

The first apparatus may also include means for performing a functionbased on the mannerism. For example, the means for performing thefunction may include the processor 1110 of FIG. 11, the displaycontroller 1126 of FIG. 11, the display device 1128 of FIG. 11, one ormore other devices, circuits, modules, or any combination thereof.

In conjunction with the described implementations, a second apparatusincludes means for receiving an indication of a user configurablepattern. The user configurable pattern may indicate locations on a userinterface that are spatially separated. The locations may be configuredto receive user input to enable access to data at the mobile device. Forexample, the means for receiving the indication may include theprocessor 1110 of FIG. 11, the display controller 1126 of FIG. 11, oneor more other devices, circuits, modules, or any combination thereof.

The second apparatus may include means for generating the user interfacebased on the user configurable pattern. For example, the means forgenerating the user interface may include the processor 1110 of FIG. 11,the display controller 1126 of FIG. 11, the display device 1128 of FIG.11, one or more other devices, circuits, modules, or any combinationthereof.

Those of skill would further appreciate that the various illustrativelogical blocks, configurations, modules, circuits, and algorithm stepsdescribed in connection with the embodiments disclosed herein may beimplemented as electronic hardware, computer software executed by aprocessor, or combinations of both. Various illustrative components,blocks, configurations, modules, circuits, and steps have been describedabove generally in terms of their functionality. Whether suchfunctionality is implemented as hardware or processor executableinstructions depends upon the particular application and designconstraints imposed on the overall system. Skilled artisans mayimplement the described functionality in varying ways for eachparticular application, but such implementation decisions should not beinterpreted as causing a departure from the scope of the presentdisclosure.

The steps of a method or algorithm described in connection with theimplementations disclosed herein may be embodied directly in hardware,in a software module executed by a processor, or in a combination of thetwo. A software module may reside in random access memory (RAM), flashmemory, read-only memory (ROM), programmable read-only memory (PROM),erasable programmable read-only memory (EPROM), electrically erasableprogrammable read-only memory (EEPROM), registers, hard disk, aremovable disk, a compact disc read-only memory (CD-ROM), or any otherform of non-transient storage medium known in the art. An exemplarystorage medium is coupled to the processor such that the processor canread information from, and write information to, the storage medium. Inthe alternative, the storage medium may be integral to the processor.The processor and the storage medium may reside in anapplication-specific integrated circuit (ASIC). The ASIC may reside in acomputing device or a user terminal. In the alternative, the processorand the storage medium may reside as discrete components in a computingdevice or user terminal.

The previous description of the disclosed implementations is provided toenable a person skilled in the art to make or use the disclosedimplementations. Various modifications to these implementations will bereadily apparent to those skilled in the art, and the principles definedherein may be applied to other implementations without departing fromthe scope of the disclosure. Thus, the present disclosure is notintended to be limited to the implementations shown herein but is to beaccorded the widest scope possible consistent with the principles andnovel features as defined by the following claims.

What is claimed is:
 1. An apparatus comprising: a memory; and aprocessor coupled to the memory, the processor configured to: receive anindication of a user configurable pattern, the user configurable patternindicating locations on a user interface that are spatially separated,wherein the locations are configured to receive user input to enableaccess to data at the mobile device; and generate the user interfacebased on the user configurable pattern.
 2. The apparatus of claim 1,wherein each location displays an input key that enables entry of anauthentication code.
 3. The apparatus of claim 2, wherein a color of atleast one input key is based on a pupil color of a user of the mobiledevice.
 4. The apparatus of claim 2, wherein a color of at least oneinput key is based on a color of an article of clothing of a user of themobile device.
 5. The apparatus of claim 2, wherein a first input key ata first location has a different color than a second input key at asecond location.
 6. The apparatus of claim 2, wherein the authenticationcode includes a personal identification number (PIN).
 7. The apparatusof claim 1, wherein the locations include a first location and a secondlocation, and wherein a swipe input between the first location and thesecond location enables access to the data.
 8. The apparatus of claim 1,wherein a background color of the user interface is based on a pupilcolor of a user of the mobile device.
 9. The apparatus of claim 1,wherein a background color of the user interface is based on a color ofan article of clothing of a user of the mobile device.
 10. A method forgenerating a user interface at a mobile device, the method comprising:receiving an indication of a user configurable pattern at a processor,the user configurable pattern indicating locations on a user interfacethat are spatially separated, wherein the locations are configured toreceive user input to enable access to data at the mobile device; andgenerating the user interface based on the user configurable pattern.11. The method of claim 10, wherein each location displays an input keythat enables entry of an authentication code.
 12. The method of claim11, wherein a color of at least one input key is based on a pupil colorof a user of the mobile device.
 13. The method of claim 11, wherein acolor of at least one input key is based on a color of an article ofclothing of a user of the mobile device.
 14. The method of claim 11,wherein a first input key at a first location has a different color thana second input key at a second location.
 15. The method of claim 11,wherein the authentication code includes a personal identificationnumber (PIN).
 16. The method of claim 10, wherein the locations includea first location and a second location, and wherein a swipe inputbetween the first location and the second location enables access to thedata.
 17. The method of claim 10, wherein a background color of the userinterface is based on a pupil color of a user of the mobile device. 18.The method of claim 10, wherein a background color of the user interfaceis based on a color of an article of clothing of a user of the mobiledevice.
 19. A non-transitory computer-readable medium comprisinginstructions for generating a user interface at a mobile device, theinstructions, when executed by a processor, cause the processor toperform operations comprising: receiving an indication of a userconfigurable pattern, the user configurable pattern indicating locationson a user interface that are spatially separated, wherein the locationsare configured to receive user input to enable access to data at themobile device; and generating the user interface based on the userconfigurable pattern.
 20. The non-transitory computer-readable medium ofclaim 19, wherein each location displays an input key that enables entryof an authentication code.
 21. The non-transitory computer-readablemedium of claim 20, wherein a color of at least one input key is basedon a pupil color of a user of the mobile device.
 22. The non-transitorycomputer-readable medium of claim 20, wherein a color of at least oneinput key is based on a clothing color of a user of the mobile device.23. The non-transitory computer-readable medium of claim 20, wherein afirst input key at a first location has a different color than a secondinput key at a second location.
 24. The non-transitory computer-readablemedium of claim 20, wherein the authentication code includes a personalidentification number (PIN).
 25. The non-transitory computer-readablemedium of claim 19, wherein the locations include a first location and asecond location, and wherein a swipe input between the first locationand the second location enables access to the data.
 26. Thenon-transitory computer-readable medium of claim 19, wherein abackground color of the user interface is based on a pupil color of auser of the mobile device.
 27. The non-transitory computer-readablemedium of claim 19, wherein a background color of the user interface isbased on a color of an article of clothing of a user of the mobiledevice.
 28. An apparatus comprising: means for receiving an indicationof a user configurable pattern, the user configurable pattern indicatinglocations on a user interface that are spatially separated, wherein thelocations are configured to receive user input to enable access to dataat the mobile device; and means for generating the user interface basedon the user configurable pattern.
 29. The apparatus of claim 28, whereineach location displays an input key that enables entry of anauthentication code.
 30. The apparatus of claim 28, wherein thelocations include a first location and a second location, and wherein aswipe input between the first location and the second location enablesaccess to the data.