Dynamic profile switching

ABSTRACT

Methods and apparatuses are disclosed for dynamic switching of user profiles on computing devices. In one method, the computing device identifies a first user profile under which the computing device is operating. The first user profile is associated with a first user value indicative of a first user. The computing device receives an image from an image-sensing device, generates a current user value indicative of a current user based on the received image, and determines if the current user value corresponds to the first user value. If the current user value does not correspond to the first user value, the computing device configures at least some programs operating on the computing device using a second user profile that is selected based on the current user value. If the current user value does correspond to the first user value, the computing device continues to operate using the first user profile.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to U.S. Provisional Patent ApplicationNo. 61/570,521, filed Dec. 14, 2011, which is hereby incorporated byreference in its entirety.

TECHNICAL FIELD

The present disclosure relates to dynamically switching user profiles.

BACKGROUND

Computing devices such as mobile telephones, tablets, and laptops haveproliferated in recent years. These devices can be equipped withprocessors, memory, and the capability to communicate through local andwide area networks, including the Internet. With some computing devices,the user of the computing device can establish a user profile and storea set of preferences for operating the computing device in the userprofile. The user profile can include the files and folders saved by theuser; the applications, software, programs, etc. downloaded to thecomputing device by the user; security settings for loading the userprofile; operation restrictions for the user; layout of the display ofthe computing device including font size, icon size, type of wallpaper,etc.; and any other items or settings for operation of the user profileon the computing device.

SUMMARY

Disclosed herein are methods and apparatuses for dynamic switching ofuser profiles on computing devices.

One aspect of the disclosed embodiments is a method of operating acomputing device having an image-sensing device. The method includesidentifying a first user profile under which the computing device isoperating. The first user profile is associated with a first user valueindicative of a first user. The method further includes receiving animage from the image-sensing device, generating a current user valueindicative of a current user of the computing device based on thereceived image, determining if the current user value corresponds to thefirst user value, and configuring at least some programs operating onthe computing device using a second user profile that is selected basedon the current user value if the current user value does not correspondto the first user value.

Another aspect of the disclosed embodiments is a method of operating acomputing device having an image-sensing device. The method includesidentifying a first user profile under which the computing device isoperating. The first user profile is associated with a first user valueindicative of a first user. The method further includes receiving animage from the image-sensing device, generating a current user valueindicative of a current user of the computing device based on thereceived image, determining if the current user value corresponds to thefirst user value, and determining if a second user profile is availableto the computing device if the current user value does not correspond tothe first user value, the second user profile associated with a seconduser value.

Another aspect of the disclosed embodiments is a computing device. Thecomputing device includes an input-output device, such as a displayscreen, an image-sensing device, a memory, and one or more processors.The one or more processors are configured to execute instructions storedin the memory to identify a first user profile under which the computingdevice is operating. The first user profile is associated with a firstuser value indicative of a first user. The one or more processors arefurther configured to receive an image from the image-sensing device,generate a current user value indicative of a current user of thecomputing device based on the received image, determine if the currentuser value corresponds to the first user value, and configure at leastsome programs operating on the computing device using a second userprofile that is selected based on the current user value if the currentuser value does not correspond to the first user value.

These and other embodiments will be described in additional detailhereafter.

BRIEF DESCRIPTION OF THE DRAWINGS

The description herein makes reference to the accompanying drawingswherein like reference numerals refer to like parts throughout theseveral views, and wherein:

FIG. 1 is a block diagram showing an example of a computing device.

FIGS. 2A and 2B are illustrations showing the operation of a profileutility application as displayed on the display screen of a computingdevice.

FIG. 3 is an illustration showing an operation in which a different userprofile is selected for operation of the computing device.

FIG. 4 is a flow chart showing a process for dynamically switching auser profile on a computing device.

DETAILED DESCRIPTION

As computing devices proliferate, so do the number of users operatingeach computing device. Some device users can find some traditionalmethods of loading and operating a user profile cumbersome, such asproviding a username and password, if the computing device includes alimited user interface. Some device users can also find some traditionalmethods of accessing a user profile difficult to execute. Some deviceusers can be incapable of complying with some traditional methods butstill need to be provided a specific user profile. For example, a youngchild can share a computing device with a parent and be capable ofrunning some games and applications on the computing device and at thesame time be incapable of entering a username and password.

The apparatuses and methods described herein, in some cases, allow forswitching from a first user profile to a second user profile, limitingaccess to the files, folders, applications, security settings, etc. ofthe first user of the computing device while loading the files, folders,applications, security settings, etc. of the second user of thecomputing device without requiring the first user to log out or lockoperation of the computing device or the second user to manually enterinformation to load and operate the second user profile.

FIG. 1 is a block diagram of an example of a computing device 10. Thecomputing device 10 can be in the form of a computing system includingmultiple computing devices, or in the form of a single computing device,for example, a mobile phone, a tablet computer, a laptop computer, anotebook computer, and the like.

The computing device 10 can include a data processing apparatus, whichin this case is a central processing unit, CPU 12, and a memory 14. Asan example, the CPU 12 can be a conventional central processing unit.Alternatively, the CPU 12 can be any other type of device, or multipledevices now-existing or hereafter developed, capable of manipulating orprocessing information, including, for example, optical processors,quantum and/or molecular processors, general purpose processors, specialpurpose processors, IP cores, ASICS, programmable logic arrays,programmable logic controllers, microcode, firmware, microcontrollers,microprocessors, digital signal processors, memory, or any combinationof the foregoing. In the claims, the term “processor” should beunderstood as including any of the foregoing, either singly or incombination. Although the disclosed embodiments can be practiced with asingle processor as shown, e.g. CPU 12, advantages in speed andefficiency can be achieved using more than one processor.

The memory 14 in the computing device 10 can be a random access memorydevice (RAM). Any other suitable type of storage device can be used asthe memory 14. The memory 14 can include code and data 18 that isaccessed by the CPU 12 using a bus 16. The memory 14 can further includean operating system 20 and application programs 22, the applicationprograms 22 including programs that permit the CPU 12 to perform themethods described herein. For example, the application programs 22 caninclude applications 1 through N which further include a profile utilityapplication that performs the methods described herein. The computingdevice 10 can also include a secondary storage 24, which can, forexample, be a memory card used with a mobile computing device 10.Because the user profiles may contain a significant amount ofinformation, they can be stored in whole or in part in the secondarystorage 24 and loaded into the memory 14 as needed for processing.

The computing device 10 can also include one or more input-outputdevices, such as a display screen 26, which can be a touch sensitivedisplay screen that combines a display with a touch sensitive elementthat is operable to sense touch inputs. The display screen 26 is coupledto the CPU 12 via the bus 16. Other input-output devices that permit auser to program or otherwise use the computing device 10 can be providedin addition to or as an alternative to the display screen 26. When theinput-output device is or includes a display, the display can beimplemented in various ways, including by a liquid crystal display (LCD)or a cathode-ray tube (CRT) or light emitting diode (LED) display, suchas an OLED display.

The computing device 10 can also include an image-sensing device, forexample front-facing camera 28, or any other image-sensing device nowexisting or hereafter developed that can sense the image of a useroperating the computing device 10. The front-facing camera 28 can bepositioned such that it is directed toward a user that is operating thecomputing device 10. Stated another way, the position and optical axisof the front-facing camera 28 can be configured such that the field ofvision of the front-facing camera 28 includes an area that is directlyadjacent to the display screen 26, from which the display screen 26 isvisible. The front-facing camera 28 can be configured to receive images,for example, of the face of a user while the user is operating thecomputing device 10.

Although FIG. 1 depicts the CPU 12 and the memory 14 as being integratedinto a single unit, other configurations can be utilized. The operationsof the CPU 12 can be distributed across multiple machines (each machinehaving one or more of processors) which can be coupled directly oracross a local area or other network. The memory 14 can be distributedacross multiple machines such as network-based memory or memory inmultiple machines performing the operations of the computing device 10.Although depicted here as a single bus, the bus 16 can be composed ofmultiple buses. Further, the secondary storage 24 can be directlycoupled to the other components of the computing device 10 or can beaccessed via a network and can comprise a single integrated unit such asa memory card or multiple units such as multiple memory cards. Thecomputing device 10 can thus be implemented in a wide variety ofconfigurations.

FIGS. 2A and 2B are illustrations showing the operation of a profileutility application as displayed on the input-output device, in thiscase a display screen 26, of a computing device 10. The computing device10 includes the image-sensing device, in this case the front-facingcamera 28, described in FIG. 1. The front-facing camera 28 faces theuser while the user operates the computing device 10 and is capable ofreceiving an image. The computing device 10 also includes variousapplication programs 22 as described in FIG. 1. Icons 32 a-e whichrender on the display screen 26 can represent a set of applicationprograms 22 with each icon 32 a-e being capable of selection by a userto operate a given application program 22 on the computing device 10.Different users of the same computing device 10 can each establish auser profile which includes preferences for operating the computingdevice 10 associated with the user.

FIG. 2A shows the operation of a first user profile with the icons 32a-e representing five different application programs 22 that a firstuser can operate on the computing device 10 as associated with the firstuser profile. FIG. 2B shows the operation of a second user profile withthe icons 32 a-c representing three different application programs 22that a second user can operate on the computing device 10 as associatedwith the second user profile. User profiles can include differentapplication programs 22 that are available to different users, differentsettings for the computing device 10 such as font size and icon 32 a-esize as shown by comparing the icon 32 a-e size between FIG. 2A and FIG.2B, different files and folders as initiated and stored by differentusers, and different security and access settings that regulate whattypes of application programs 22 can be operated by the user on thecomputing device 10. For example, the first user profile shown in FIG.2A has access to the Internet through icon 32 d and to a camera throughicon 32 e, whereas the second user profile shown in FIG. 2B does nothave icons enabling access to the internet or to the camera. The variousapplication programs 22, display settings, security and access settings,and files and folders available for a given user profile can becollectively described as “programs.”

FIG. 3 is an illustration showing an operation in which a different userprofile is selected for operation of the computing device 10. In thisexample, a first user 40 and a second user 42 have both previouslyestablished user profiles on the computing device 10. The image-sensingdevice, in this example the front-facing camera 28, is operable tocapture one or more images of the first user 40 while the first user 40is operating the computing device 30 by interacting with the displayscreen 26. The computing device 10 can configure at least some programsthat are operating on the computing device 10 using a first user profilethat has been established by the first user 40 and is associated withthe first user 40. The first user profile can include a value thatrepresents the first user 40, such as an image of the first user's face,or data that is derived from or representative of the first user's face.

In this example, during the time period when the computing device 10 isconfigured according to the first user profile (i.e. operating under thefirst user profile), the device can be handed to or picked up by thesecond user 42. The front-facing camera 28 can capture an image of thesecond user 42. The computing device 10 can configure at least someprograms operating on the computing device 10 using the second userprofile if the computing device 10 determines that the image of thesecond user 42 corresponds to a value that is stored in the second userprofile. A second user profile can be utilized to configure thecomputing device 10 if the second user profile is associated in some waywith the captured image of the second user 42. This operation can beperformed without an affirmative action that “logs out” the first user40, suspends operation of the computing device 10, or locks operation ofthe computing device 10.

In other examples, the first user 40 can be “logged out” of the deviceor have otherwise placed the computing device 10 into a low power state,a locked state, or other state in which the computing device 10 is nolonger in active use. The computing device 10 may or may not continue tobe configured according to the first user profile. When the computingdevice 10 is picked up by the second user 42, the front-facing camera 28can capture an image of the second user 42. The computing device 10 canconfigure at least some programs operating on the computing device 10using the second user profile if the computing device 10 determines thatthe image of the second user 42 corresponds to a value that is stored inthe second user profile. That is to say that the second user profile isutilized to configure the computing device 10 if the second user profileis associated in some way with the captured image of the second user 42.

In other examples, the second user 42 may not have previouslyestablished a user profile on the computing device 10. In theseexamples, the computing device 10 can deny access to the second user 42or can allow access to the second user 42. Examples for allowing accessto the second user 42 when a user profile has not previously beenestablished will be explained herein. The operations of the variousmethods of dynamically switching a user profile on the computing device10 are further explained in connection with FIG. 4 below.

FIG. 4 is a flow chart showing an example of a process 50 fordynamically switching a user profile on a computing device 10. Inprocess 50, the computing device 10 is initially configured according toand operating under a first user profile.

In stage 52, the computing device 10 can identify a first user profileunder which the computing device 10 is operating. The first user profilecan be associated with a first user value indicative of a first user.The first user value can have been previously generated by the computingdevice 10 based on one or more images associated with a first user ofthe computing device 10. For example, one or more images of the firstuser can be captured by the image-sensing device, e.g. the front-facingcamera 28, on the computing device 10 and an image-analysis algorithmcan be employed to analyze the one or more images of the first user andgenerate geometric data indicative of one or more facial features in theone or more images that can be used as a first user value. The firstuser value can be the basis for comparison to geometric data generatedfrom images captured during operation of the computing device 10 by acurrent user.

In stage 54, the computing device 10 can receive an image from thefront-facing camera 28. The image received can be that of the face ofthe current user of the computing device 10.

In stage 56, the computing device 10 can generate a current user valueindicative of the current user of the computing device 10 based on theimage received in stage 54. For example, the current user value can begenerated by a facial recognition application program detecting one ormore specific positions, or coordinates, of facial features (e.g.corners of the eyes, corners of the mouth, top and bottom edges of thelips, etc.). Other facial features and positions are also possible andcan be detected by the facial recognition application to generate thecurrent user value.

In stage 58, the computing device 10 can compare the current user valueto the first user value. For example, the computing device 10 cancompare the coordinates of facial features of the first user value andcurrent user value.

In decision block 60, the computing device 10 can make a determinationas to whether the current user value corresponds to the first uservalue. For example, the computing device 10 can determine if acoordinate comparison between the current user value and first uservalue indicates that the coordinates are similar enough to indicate tothe computing device 10 that the current user has the same identity asthe first user having the first user profile operating on the computingdevice 10.

If, at decision block 60, the computing device 10 determines that thecurrent user value corresponds to the first user value, the computingdevice 10 can continue to operate using the first user profile at stage62. If the computing device 10 continues to operate using the first userprofile, the process 50 ends. The current user, in this case the firstuser, need not be aware that the process 50 has occurred, allowingseamless operation of the computing device 10. Stages 52 through 58 anddecision block 60 of process 50 can occur periodically, at a setinterval or prompt by an application program, or continuously during theoperation of the computing device 10. The profile utility applicationcan also be disabled by the current user in the case where the currentuser wishes to allow another user to operate the computing device 10without switching profiles.

If, at decision block 60, the computing device 10 determines that thecurrent user value does not correspond to the first user value, thecomputing device 10 can be configured to operate at least some programsusing a second user profile that is selected based on the current uservalue at stage 64. If the computing device 10 configures at least someprograms using the second user profile, the process 50 ends. There areseveral embodiments of stage 64 that will be described below.

In one embodiment of stage 64 where the current user value does notcorrespond to the first user value, the computing device 10 can comparethe current user value to a stored user value of each user profile of aplurality of stored user profiles. If the current user value does notcorrespond to the stored user value of any user profile of the pluralityof stored user profiles, the computing device 10 can select a guestprofile as the second user profile. The guest profile can have limitedaccess to application programs 22, files, folders, etc. This embodimentallows a current user without a stored user profile to operate thecomputing device 10 without exposing the security settings, files,folders, application programs 22, etc. of stored user profiles to thecurrent user.

In another embodiment of stage 64 where the current user value does notcorrespond to the first user value, the computing device 10 can comparethe current user value to a stored user value of each user profile of aplurality of stored user profiles. If the current user value does notcorrespond to the stored user value of any user profile of the pluralityof stored user profiles, the computing device 10 can create the seconduser profile for the current user and display an interface forconfiguring the second user profile to the current user. This embodimentallows a current user without a stored user profile to configure theirown user profile on the computing device 10 specifying the securitysettings, application programs 22, etc. the current user prefers to usewhile operating the computing device 10 without exposing the securitysettings, files, folders, application programs 22, etc. of stored userprofiles to the current user.

In another embodiment of stage 64 where the current user value does notcorrespond to the first user value, the computing device 10 can comparethe current user value to a stored user value of each user profile of aplurality of stored user profiles. If the current user value does notcorrespond to the stored user value of any stored user profile of theplurality of stored user profiles, the computing device 10 can displayone or more indicators, wherein each indicator of the one or moreindicators is associated with a respective stored user profile of theplurality of stored user profiles. The current user can select anindicator using the user interface of the computing device 10. Thecomputing device 10 can receive the signal that the current user hasselected an indicator of the one or more indicators, and the computingdevice 10 can select the stored user profile that is associated with theselected indicator as the second user profile to be configured on thecomputing device 10. This embodiment is useful in the case where thecurrent user value does not correspond to a stored user value due tochanges to the physical features of the current user, for example,changes in facial hair, low lighting during the image capture, changesin eyeglasses for the current user, an inconvenient black eye, etc. Thecomputing device 10 can further require additional security measures,such as a password or PIN number entry, if the current user selects astored user profile due to the current user value failing to correspondto a stored user value.

In another embodiment of stage 64 where the current user value does notcorrespond to the first user value, the computing device 10 can comparethe current user value to a stored user value of each user profile of aplurality of stored user profiles. If the current user value correspondsto a stored user value of a stored user profile, the computing device 10can send a notification to the user, the notification requestingselection of the first user profile, e.g. the current user profile, orthe second user profile, e.g. the stored user profile. The notificationcan be, for example, an indicator that another profile is available foruse displayed in the background or on a notification bar on the displayscreen 26 of the computing device 10. In this example, if the computingdevice 10 receives a signal indicating selection of the first userprofile, the computing device 10 continues to operate using the firstuser profile. If the computing device 10 receives a signal indicatingselection of the second user profile, the computing device 10 configuresat least some programs using the second user profile. If thenotification is ignored, the computing device 10 continues to operateusing the first user profile. This embodiment is useful in the casewhere a second user seeks to update settings, applications, or featuresfor a first user without immediately switching user profiles. Forexample, the second user can be a parent and the first user a child withthe parent picking up the computing device 10 to install a newapplication for the child currently using the computing device 10.

In each of the embodiments of the process 50 for dynamically switching auser profile on a computing device 10, the first user profile and seconduser profile can be stored in a location external to the computingdevice 10. For example, a computing device 10 can be a public devicesuch as a clock-radio in a hotel room capable of operating with userprofiles. The current user of the clock-radio can have a user profilestored using a cloud computing service, or the cloud. The cloud caninclude hundreds or thousands of servers configured to provide scalablecomputing resources. Storing the user profile on the cloud can, forexample, allow more than one computing device 10 to access the userprofile. In this example, the current user of the clock-radio can accesspersonal files, folders, and/or application programs 22 on theclock-radio after the clock-radio has been configured with the storeduser profile associated with the current user.

The embodiments of the computing device 10 (and the algorithms, methods,instructions etc. stored thereon and/or executed thereby) can berealized in hardware including, for example, intellectual property (IP)cores, application-specific integrated circuits (ASICs), programmablelogic arrays, optical processors, programmable logic controllers,microcode, firmware, microcontrollers, servers, microprocessors, digitalsignal processors or any other suitable circuit. In the claims, the term“processor” should be understood as encompassing any the foregoing,either singly or in combination. The terms “signal” and “data” are usedinterchangeably. Further, portions of computing device 10 do notnecessarily have to be implemented in the same manner.

In one embodiment, the computing device 10 can be implemented using ageneral purpose computer/processor with a computer program that, whenexecuted, carries out any of the respective methods, algorithms and/orinstructions described herein. In addition or alternatively, forexample, a special purpose computer/processor can be utilized which cancontain specialized hardware for carrying out any of the methods,algorithms, or instructions described herein.

Further, all or a portion of embodiments described can take the form ofa computer program product accessible from, for example, acomputer-usable or computer-readable medium. A computer-usable orcomputer-readable medium can be any device that can, for example,tangibly contain, store, communicate, or transport the program for useby or in connection with any processor. The medium can be, for example,an electronic, magnetic, optical, electromagnetic, or a semiconductordevice. Other suitable mediums are also available.

While this disclosure includes what is presently considered to be themost practical and preferred embodiments, it is to be understood thatthe disclosure is not to be limited to the disclosed embodiments but, onthe contrary, is intended to cover various modifications and equivalentarrangements included within the spirit and scope of the appendedclaims, which scope is to be accorded the broadest interpretation so asto encompass all such modifications and equivalent structures as ispermitted under the law.

1. A method of operating a computing device having an image-sensingdevice, the method comprising: identifying a first user profile underwhich the computing device is operating, the first user profileassociated with a first user value indicative of a first user; receivingan image from the image-sensing device; generating a current user valueindicative of a current user of the computing device based on thereceived image; determining if the current user value corresponds to thefirst user value; and configuring at least some programs operating onthe computing device using a second user profile that is selected basedon the current user value if the current user value does not correspondto the first user value.
 2. The method in claim 1, further comprising:continuing to operate the computing device using the first user profileif the current user value corresponds to the first user value.
 3. Themethod in claim 1, further comprising: comparing the current user valueto a stored user value of each user profile of a plurality of storeduser profiles if the current user value does not correspond to the firstuser value; and selecting a guest profile as the second user profile ifthe current user value does not correspond to the stored user value ofany user profile of the plurality of stored user profiles.
 4. The methodin claim 1, further comprising: comparing the current user value to astored user value of each user profile of a plurality of stored userprofiles if the current user value does not correspond to the first uservalue; creating the second user profile if the current user value doesnot correspond to the stored user value of any user profile of theplurality of stored user profiles; and displaying an interface forconfiguring the second user profile.
 5. The method in claim 1, furthercomprising: comparing the current user value to a stored user value ofeach user profile of a plurality of stored user profiles if the currentuser value does not correspond to the first user value; displaying oneor more indicators if the current user value does not correspond to thestored user value of any user profile of the plurality of stored userprofiles, wherein each indicator of the one or more indicators isassociated with a respective stored user profile of the plurality ofstored user profiles; receiving a signal selecting an indicator of theone or more indicators; and selecting the stored user profile that isassociated with the selected indicator as the second user profile. 6.The method of claim 1 wherein the first user profile and second userprofile are stored in a location external to the computing device.
 7. Amethod of operating a computing device having an image-sensing device,the method comprising: identifying a first user profile under which thecomputing device is operating, the first user profile associated with afirst user value indicative of a first user; receiving an image from theimage-sensing device; generating a current user value indicative of acurrent user of the computing device based on the received image;determining if the current user value corresponds to the first uservalue; and determining if a second user profile is available to thecomputing device if the current user value does not correspond to thefirst user value, the second user profile associated with a second uservalue.
 8. The method in claim 7, further comprising: continuing tooperate the computing device using the first user profile if the currentuser value corresponds to the first user value.
 9. The method in claim7, further comprising: determining if the current user value correspondsto the second user value; and retrieving the second user profile if thecurrent user value corresponds to the second user value; and sending anotification to the user if the second user profile is retrieved, thenotification requesting selection of the first user profile or thesecond user profile.
 10. The method in claim 9, further comprising:receiving a signal indicating selection of the first user profile; andcontinuing to operate the computing device using the first user profilein response to selection of the first user profile.
 11. The method inclaim 9, further comprising: receiving a signal indicating selection ofthe second user profile; and configuring at least some programsoperating on the computing device using the second user profile inresponse to selection of the second user profile.
 12. The method inclaim 7, further comprising: configuring at least some programsoperating on the computing device using a guest profile if the currentuser value does not correspond to the second user value.
 13. The methodin claim 7, further comprising: determining if the current user valuecorresponds to the second user value; displaying one or more indicatorsif the current user value does not correspond to the second user value,wherein each indicator of the one or more indicators is associated witha respective user profile of a plurality of user profiles; receiving asignal selecting an indicator of the one or more indicators; retrievingthe user profile that is associated with the selected indicator; andconfiguring at least some programs operating on the computing deviceusing the user profile that is associated with the selected indicator.14. The method in claim 7, further comprising: displaying an interfacefor establishing a user profile for the current user if the current uservalue does not correspond to the second user value.
 15. The method ofclaim 7 wherein the first user profile and second user profile arestored in a location external to the computing device.
 16. A computingdevice comprising: an input-output device; an image-sensing device; amemory; and one or more processors wherein the one or more processorsare configured to execute instructions stored in the memory to: identifya first user profile under which the computing device is operating, thefirst user profile associated with a first user value indicative of afirst user; receive an image from the image-sensing device; generate acurrent user value indicative of a current user of the computing devicebased on the received image; determine if the current user valuecorresponds to the first user value; and configure at least someprograms operating on the computing device using a second user profilethat is selected based on the current user value if the current uservalue does not correspond to the first user value.
 17. The computingdevice of claim 16, wherein the processor is further configured to:continue to operate the computing device using the first user profile ifthe current user value corresponds to the first user value.
 18. Thecomputing device of claim 16, wherein the processor is furtherconfigured to: compare the current user value to a stored user value ofeach user profile of a plurality of stored user profiles if the currentuser value does not correspond to the first user value; and select aguest profile as the second user profile if the current user value doesnot correspond to the stored user value of any user profile of theplurality of stored user profiles.
 19. The computing device of claim 16,wherein the processor is further configured to: compare the current uservalue to a stored user value of each user profile of a plurality ofstored user profiles if the current user value does not correspond tothe first user value; create the second user profile if the current uservalue does not correspond to the stored user value of any user profileof the plurality of stored user profiles; and display an interface forconfiguring the second user profile.
 20. The computing device of claim16, wherein the processor is further configured to: compare the currentuser value to a stored user value of each user profile of a plurality ofstored user profiles if the current user value does not correspond tothe first user value; display one or more indicators if the current uservalue does not correspond to the stored user value of any user profileof the plurality of stored user profiles, wherein each indicator of theone or more indicators is associated with a respective stored userprofile of the plurality of stored user profiles; receive a signalselecting an indicator of the one or more indicators; and select thestored user profile that is associated with the selected indicator asthe second user profile.