Protecting personal information upon sharing a personal computing device

ABSTRACT

In particular embodiments, a temporary user is able to use another&#39;s personal computing device in shared mode for a short period of time while experiencing a personalized user interface. An indication is detected that a personal computing device associated with a primary user is to be shared with a temporary user. Access to local personal information associated with the primary user is disabled if it is stored on the personal computing device. Access to remote personal information of the primary user that is accessible from the personal computing device is disabled. A personalized user interface incorporating personal information associated with the temporary user is presented on the personal computing device for the temporary user. Personal information of the primary user is not accessible by the temporary user, and vice versa. When shared mode is to be terminated, all personal information of the temporary user is deleted.

BACKGROUND

Mobile computing and communication devices, such as cellphones, PDAs,tablet computers, and mini-laptops have become prevalent in recentyears. Such mobile devices are often tied to a specific individual andtherefore contain personal information, including account information,user profile information, and pre-authorized and pre-authenticatedaccess to Internet-connected applications with further access topersonal, private, and confidential information. This may present aproblem when a device owner or primary user of the device would like totemporarily allow another person to access or “try out” the device andassociated functions—ideally, the other person would be able to try outthe device and its functionality without having access to the primaryuser's personal information. In addition, while the other person istrying out the phone, they may enter their own personal information, towhich they may not want to allow the primary user access.

INTRODUCTION

The present disclosure relates generally to personal computing andcommunication devices associated with private information, and, morespecifically, relates to shielding of private information on such apersonal computing device in connection with temporary usage of thepersonal device.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example network architecture associated with asocial network.

FIGS. 2A-B illustrate an example personal computing device.

FIG. 3 illustrates an example software architecture for information andapplications on a personal computing device.

FIG. 4 illustrates an example wireframe in which a primary usertemporarily allows another user to use his personal computing device.

FIGS. 5A-B illustrate example wireframes in which a temporary user logsin to a personal computing device.

FIG. 6 illustrates a process flow of an example embodiment for enablingan identified temporary user to utilize a personal computing device.

FIG. 7 illustrates an example computer system for performing particularembodiments.

The figures depict various embodiments of the present disclosure forpurposes of illustration only. One skilled in the art will readilyrecognize from the following discussion that alternative embodiments ofthe structures and methods illustrated herein may be employed withoutdeparting from the principles of the invention described herein.

DESCRIPTION OF EXAMPLE EMBODIMENT(S)

This disclosure is now described in detail with reference to a fewembodiments thereof as illustrated in the accompanying drawings. In thefollowing description, numerous specific details are set forth in orderto provide a thorough understanding of this disclosure. However, thisdisclosure may be practiced without some or all of these specificdetails. In other instances, well known process steps and/or structureshave not been described in detail in order not to unnecessarily obscurethis disclosure. In addition, while the disclosure is described inconjunction with the particular embodiments, it should be understoodthat this description is not intended to limit the disclosure to thedescribed embodiments. To the contrary, the description is intended tocover alternatives, modifications, and equivalents as may be includedwithin the spirit and scope of the disclosure as defined by the appendedclaims.

Overview

Particular embodiments relate to a social networking environmentincluding a social networking system and related systems that includeconventional stationary as well as mobile embodiments. A socialnetworking system offers its users the ability to communicate andinteract with other users of the social networking system. Users jointhe social networking system and then add connections to a number ofother users to whom they desire to be connected. Once they are membersof the social network, the users may interact with the social networkitself, by viewing and posting images and video on their own page, or byusing personal computing devices to view and post location-based socialnetworking information.

In particular embodiments, a user may want to share their personalcomputing device with another user. Such an occasion may occurinformally (e.g., a friend who lets a friend try out their device) orformally (e.g., trying out a device in a retail store). When thepersonal computing device utilizes software, e.g., an operating systemand/or applications, that relies upon personal information (includingnot only confidential information, but also any user-specific,user-entered, or user-generated information) to provide a personalizedexperience, the personal computing device may need to shield suchpersonal information belonging to one user from being viewed or accessedby another user. This may include not only the situation where personalinformation is stored on the device itself, but also situations wherecertain applications and/or the operating system have access to personalinformation stored remotely (e.g., email and communication applications,such as Gmail™ or Twitter™, social-networking applications, such asFacebook™ or LinkedIn®, online banking and e-commerce applications, orcontent-sharing applications, such as YouTube™ or Picasa™).

In particular embodiments, a primary user of a personal computing devicecan protect their personal information by indicating that they are aboutto share their device with a temporary user (e.g., by clicking a buttonor selecting a menu option). In particular embodiments, the personalcomputing device may be able to detect that the primary user is holdingor viewing the device by using biometric identification technology; insuch embodiments, the device may also be able to detect when the primaryuser has let go of the device, or is no longer viewing the device, orwhen another user is holding or viewing the device.

In particular embodiments, when the primary user indicates, eitherpassively or actively, that they are about to share the device with atemporary user or have just handed the device to a temporary user, thedevice may take one or more actions to protect personal information: (1)the device may remove or disable access to content, applications,information, or other data for which a user must be authenticated and/orauthorized (e.g., by logging out of a website, or by deleting cookies,or by disabling access to security certificates), (2) the device mayremove or disable personal information stored on the device itself, and(3) the device may clear out any caches, logs, and/or other sources ofinformation that may track actions taken by or events that occurred withrespect to the primary user.

In particular embodiments, the device enables the primary user to sendan invitation with or without a secure authorization code to a potentialtemporary user, who is then able to log in to the device usinginformation in the invitation. In particular embodiments, once theinvitation has been sent, the device pre-loads information associatedwith the potential temporary user, so as to provide a personalizedexperience once the potential temporary user logs in to the device.

In particular embodiments, the device enables sharing with an anonymoustemporary guest user. In particular embodiments, the device can beconfigured as a public device intended for use by multiple temporaryusers. In particular embodiments, for anonymous guest users and/or forpublic use, the device displays a generic set of applications andcontent to allow such temporary users to “try out” features andfunctionality of the device.

FIG. 1 illustrates an example network environment 100. Networkenvironment 100 includes a network 110 coupling one or more servers 120and one or more clients 130 to each other. In particular embodiments,network 110 is an intranet, an extranet, a virtual private network(VPN), a local area network (LAN), a wireless LAN (WLAN), a wide areanetwork (WAN), a metropolitan area network (MAN), a portion of theInternet, a cellular technology-based network, a satellitecommunications technology-based network, or another network 110 or acombination of two or more such networks 110. This disclosurecontemplates any suitable network 110.

One or more links 150 couple a server 120 or a client 130 to network110. In particular embodiments, one or more links 150 each includes oneor more wireline, wireless, or optical links 150. In particularembodiments, one or more links 150 each includes an intranet, anextranet, a VPN, a LAN, a WLAN, a WAN, a MAN, a portion of the Internet,a cellular technology-based network, a satellite communicationstechnology-based network, or another link 150 or a combination of two ormore such links 150. This disclosure contemplates any suitable links 150coupling servers 120 and clients 130 to network 110.

In particular embodiments, each server 120 may be a unitary server or adistributed server spanning multiple computers or multiple datacenters.Servers 120 may be of various types, such as, for example and withoutlimitation, web server, news server, mail server, message server,advertising server, file server, application server, exchange server,database server, proxy server, another server suitable for performingfunctions and/or processes described herein, or any combination thereof.In particular embodiments, each server 120 may include hardware,software, or embedded logic components or a combination of two or moresuch components for carrying out the appropriate functionalitiesimplemented or supported by server 120. For example, a web server isgenerally capable of hosting websites containing web pages or particularelements of web pages. More specifically, a web server may host HTMLfiles or other file types, or may dynamically create or constitute filesupon a request, and communicate them to clients 130 in response to HTTPor other requests from clients 130. A mail server is generally capableof providing electronic mail services to various clients 130. A databaseserver is generally capable of providing an interface for managing datastored in one or more data stores. In particular embodiments, asocial-networking system 122 may be hosted on a server 120.

In particular embodiments, one or more data storages 140 may becommunicatively linked to one or more severs 120 via one or more links150. In particular embodiments, data storages 140 may be used to storevarious types of information. In particular embodiments, the informationstored in data storages 140 may be organized according to specific datastructures. In particular embodiments, each data storage 140 may be arelational database. Particular embodiments may provide interfaces thatenable servers 120 or clients 130 to manage, e.g., retrieve, modify,add, or delete, the information stored in data storage 140.

In particular embodiments, each client 130 may be an electronic deviceincluding hardware, software, or embedded logic components or acombination of two or more such components and capable of carrying outthe appropriate functionalities implemented or supported by client 130.For example and without limitation, a client 130 may comprise a computersystem such as: a desktop computer, a notebook or laptop, a netbook, atablet, an e-book reader, a GPS device, a camera, a personal digitalassistant (PDA), a handheld electronic device, a mobile telephone, oranother similar processor-based electronic device. This disclosurecontemplates any suitable clients 130. A client 130 may enable a networkuser at client 130 to access network 130. A client 130 may enable itsuser to communicate with other users at other clients 130. In particularembodiments, a client device 130 may comprise a personal computingdevice 200 as described in FIGS. 2A and 2B.

A client 130 may have a web browser 132, such as MICROSOFT® INTERNETEXPLORER®, GOOGLE CHROME™ or MOZILLA FIREFOX®, and may have one or moreadd-ons, plug-ins, or other extensions, such as TOOLBAR or YAHOOTOOLBAR®. A user at client 130 may enter a Uniform Resource Locator(URL) or other address directing the web browser 132 to a server 120,and the web browser 132 may generate a Hyper Text Transfer Protocol(HTTP) request and communicate the HTTP request to server 120. Server120 may accept the HTTP request and communicate to client 130 one ormore Hyper Text Markup Language (HTML) files responsive to the HTTPrequest. Client 130 may render a web page based on the HTML files fromserver 120 for presentation to the user. This disclosure contemplatesany suitable web page files. As an example and not by way of limitation,web pages may render from HTML files, Extensible Hyper Text MarkupLanguage (XHTML) files, or Extensible Markup Language (XML) files,according to particular needs. Such pages may also execute scripts suchas, for example and without limitation, those written in JAVASCRIPT®,JAVA®, MICROSOFT® SILVERLIGHT®, combinations of markup language andscripts such as AJAX (Asynchronous JAVASCRIPT® and XML), and the like.Herein, reference to a web page encompasses one or more correspondingweb page files (which a browser may use to render the web page) and viceversa, where appropriate.

FIG. 2A illustrates an example personal computing device 200. Inparticular embodiments, personal computing device 200 may comprise aprocessor 210, a memory 220, a communication component 230 (e.g.,antenna and communication interface for wireless communications), one ormore input and/or output (I/O) components and/or interfaces 240, and oneor more sensors 250. In particular embodiments, one or more I/Ocomponents and/or interfaces 240 may incorporate one or more sensors250. In particular embodiments, personal computing device 200 maycomprise a computer system or and element thereof as described in FIG. 7and associated description.

In particular embodiments, a personal computing device, such as a mobiledevice, may include various types of sensors 250, such as, for exampleand without limitation: touch sensors (disposed, for example, on adisplay of the device, the back of the device and/or one or more lateraledges of the device) for detecting a user touching the surface of themobile electronic device (e.g., using one or more fingers);accelerometer for detecting whether the personal computing device 200 ismoving and the speed of the movement; thermometer for measuring thetemperature change near the personal computing device 200; proximitysensor for detecting the proximity of the personal computing device 200to another object (e.g., a hand, desk, or other object); light sensorfor measuring the ambient light around the personal computing device200; imaging sensor (e.g., camera) for capturing digital still imagesand/or video of objects near the personal computing device 200 (e.g.,scenes, people, bar codes, QR codes, etc.); location sensors (e.g.,Global Positioning System (GPS)) for determining the location (e.g., interms of latitude and longitude) of the mobile electronic device;sensors for detecting communication networks within close proximity(e.g., near field communication (NFC), Bluetooth, RFID, infrared);chemical sensors; biometric sensors for biometrics-based (e.g.,fingerprint, palm vein pattern, hand geometry, iris/retina, DNA, face,voice, olfactory, sweat) authentication of user of personal computingdevice 200; etc. This disclosure contemplates that a mobile electronicdevice may include any applicable type of sensor. Sensors may providevarious types of sensor data, which may be analyzed to determine theuser's intention with respect to the mobile electronic device at a giventime.

In particular embodiments, a sensors hub 260 may optionally be includedin personal computing device 200. Sensors 250 may be connected tosensors hub 260, which may be a low power-consuming processor thatcontrols sensors 250, manages power for sensors 250, processes sensorinputs, aggregates sensor data, and performs certain sensor functions.In addition, in particular embodiments, some types of sensors 250 may beconnected to a controller 270. In this case, sensors hub 260 may beconnected to controller 270, which in turn is connected to sensor 250.Alternatively, in particular embodiments, there may be a sensor monitorin place of sensors hub 260 for managing sensors 250.

In particular embodiments, in addition to the front side, personalcomputing device 200 may have one or more sensors for performingbiometric identification. Such sensors may be positioned on any surfaceof personal computing device 200. In example embodiments, as the user'shand touches personal computing device 200 to grab hold of it, the touchsensors may capture the user's fingerprints or palm vein pattern. Inexample embodiments, while a user is viewing the screen of personalcomputing device 200, a camera may capture an image of the user's faceto perform facial recognition. In example embodiments, while a user isviewing the screen of personal computing device 200, an infrared scannermay scan the user's iris and/or retina. In example embodiments, while auser is in contact or close proximity with personal computing device200, chemical and/or olfactory sensors may capture relevant data about auser. In particular embodiments, upon detecting that there is a changein state with respect to the identity of the user utilizing personalcomputing device 200, either by itself or in combination with othertypes of sensor indications, personal computing device 200 may determinethat it is being shared.

In particular embodiments, in addition to the front side, the personalcomputing device 200 may have touch sensors on the left and right sides.Optionally, the personal computing device 200 may also have touchsensors on the back, top, or bottom side. Thus, as the user's handtouches personal computing device 200 to grab hold of it, the touchsensors may detect the user's fingers or palm touching personalcomputing device 200. In particular embodiments, upon detecting thatthere is a change in state with respect to a user touching personalcomputing device 200, either by itself or in combination with othertypes of sensor indications, personal computing device 200 may determinethat it is being shared.

In particular embodiments, personal computing device 200 may have anaccelerometer in addition to or instead of the touch sensors on the leftand right sides. Sensor data provided by the accelerometer may also beused to estimate whether a new user has picked up personal computingdevice 200 from a resting position, e.g., on a table or desk, displayshelf, or from someone's hand or from within someone's bag. When theuser picks up personal computing device 200 and brings it in front ofthe user's face, there may be a relatively sudden increase in themovement speed of personal computing device 200. This change in thedevice's movement speed may be detected based on the sensor datasupplied by the accelerometer. In particular embodiments, upon detectingthat there is a significant increase in the speed of the device'smovement, either by itself or in combination with other types of sensorindications, personal computing device 200 may determine that it isbeing shared.

In particular embodiments, personal computing device 200 may have aGyrometer in addition or instead of the touch sensors on the left andright sides. A Gyrometer, also known as a gyroscope, is a device formeasuring the orientation along one or more axis. In particularembodiments, a Gyrometer may be used to measure the orientation ofpersonal computing device 200. When personal computing device 200 isstored on a shelf or in the user's bag, it may stay mostly in oneorientation. However, when the user grabs hold of personal computingdevice 200 and lifts it up and/or moves it closer to bring it in frontof the user's face, there may be a relatively sudden change in theorientation of personal computing device 200. The orientation ofpersonal computing device 200 may be detected and measured by thegyrometer. If the orientation of personal computing device 200 haschanged significantly, In particular embodiments, upon detecting thatthere is a significant change in the orientation of personal computingdevice 200, either by itself or in combination with other types ofsensor indications, personal computing device 200 may determine that itis being shared.

In particular embodiments, personal computing device 200 may have alight sensor. When personal computing device 200 is stored in a user'spocket or case, it is relatively dark around personal computing device200. On the other hand, when the user brings personal computing device200 out of his pocket, it may be relatively bright around personalcomputing device 200, especially during day time or in well-lit areas.The sensor data supplied by the light sensor may be analyzed to detectwhen a significant change in the ambient light level around personalcomputing device 200 occurs. In particular embodiments, upon detectingthat there is a significant increase in the ambient light level aroundpersonal computing device 200, either by itself or in combination withother types of sensor indications, personal computing device 200 maydetermine that it is being shared.

In particular embodiments, personal computing device 200 may have aproximity sensor. The sensor data supplied by the proximity sensor maybe analyzed to detect when personal computing device 200 is in closeproximity to a specific object, such as the user's hand. For example,mobile device 200 may have an infrared LED (light-emitting diode) 290(i.e., proximity sensor) placed on its back side. When the user holdssuch a mobile device in his hand, the palm of the user's hand may coverinfrared LED 290. As a result, infrared LED 290 may detect when theuser's hand is in close proximity to mobile device 200. In particularembodiments, upon detecting that personal computing device 200 is inclose proximity to the user's hand, either by itself or in combinationwith other types of sensor indications, personal computing device 200may determine that it is being shared.

A personal computing device 200 may have any number of sensors ofvarious types, and these sensors may supply different types of sensordata. Different combinations of the individual types of sensor data maybe used together to detect and estimate a user's current intention withrespect to personal computing device 200 (e.g., whether the user reallymeans to take personal computing device 200 out of his pocket and useit). Sometimes, using multiple types of sensor data in combination mayyield a more accurate, and thus better, estimation of the user'sintention with respect to personal computing device 200 at a given timethan only using a single type of sensor data. Nevertheless, it ispossible to estimate the user's intention using a single type of sensordata (e.g., touch-sensor data).

FIG. 2B illustrates the exterior of an example personal computing device200. Personal computing device 200 has approximately six sides: front,back, top, bottom, left, and right. Touch sensors may be placed anywhereon any of the six sides of personal computing device 200. For example,in FIG. 2, a touchscreen incorporating touch sensors 280A is placed onthe front of personal computing device 200. The touchscreen may functionas an input/output (I/O) component for personal computing device 200. Inaddition, touch sensors 280B and 280C are placed on the left and rightsides of personal computing device 200, respectively. Touch sensors 280Band 280C may detect a user's hand touching the sides of personalcomputing device 200. In particular embodiments, touch sensors 280A,280B, 280C may be implemented using resistive, capacitive, and/orinductive touch sensors. The electrodes of the touch sensors 280A, 280B,280C may be arranged on a thin solid piece of material or a thin wiremesh. In the case of capacitive touch sensors, there may be two types ofelectrodes: transmitting and receiving. These electrodes may beconnected to a controller (e.g., controller 270 illustrated in FIG. 2),which may be a microchip designed to drive the transmitting electrodeswith electrical pulses and measure the changes in capacitance from thereceiving electrodes caused by a user's touches in order to detect thelocations of the user touches.

Of course, personal computing device 200 is merely an example. Inpractice, a device may have any number of sides, and this disclosurecontemplates devices with any number of sides. The touch sensors may beplaced on any side of a device.

In particular embodiments, personal computing device 200 may have aproximity sensor 290 (e.g., an infrared LED) placed on its back side.Proximity sensor 290 may be able to supply sensor data for determiningits proximity, and thus the proximity of personal computing device 200,to another object.

FIG. 3 illustrates an example software architecture 300 for informationand applications on a personal computing device 200. In particularembodiments, software architecture 300 may comprise software 310 anddata store(s) 320. In particular embodiments, personal information maybe stored in an application data cache 320 and/or a profile data store320 and/or another data store 320. In particular embodiments, one ormore software applications may be executed on personal computing device200. In particular embodiments, they may be web-based applicationshosted on servers. For example, a web-based application may beassociated with a URI (Uniform Resource Identifier) or URL (UniformResource Locator). From personal computing device 200, a user may accessthe web-based application through its associated URI or URL (e.g., byusing a web browser). Alternatively, in other embodiments, they may benative applications installed and residing on personal computing device200. Thus, software 310 may also include any number of application userinterfaces 330 and application functions 340. For example, oneapplication (e.g., Google Maps®) may enable a device user to view a map,search for addresses and businesses, and get directions; a secondapplication may enable the device user to read, send, and receiveemails; a third application (e.g., a web browser) may enable the deviceuser to browse and search the Internet; a fourth application may enablethe device user to take photos or record videos using personal computingdevice 200; a fifth application may allow the device user to receive andinitiate VoIP and/or cellular network calls, and so on. Each applicationhas one or more specific functionalities, and the software (e.g., one ormore software modules) implementing these functionalities may beincluded in application functions 340. Each application may also have auser interface that enables the device user to interact with theapplication, and the software implementing the application userinterface may be included in application user interfaces 330. Inparticular embodiments, the functionalities of an application may beimplemented using JavaScript®, Java®, C, or other suitable programminglanguages. In particular embodiments, the user interface of anapplication may be implemented using HyperText Markup Language (HTML),JavaScript®, Java®, or other suitable programming languages.

In particular embodiments, the user interface of an application mayinclude any number of screens or displays. In particular embodiments,each screen or display of the user interface may be implemented as a webpage. Thus, the device user may interact with the application through aseries of screens or displays (i.e., a series of web pages). Inparticular embodiments, operating system 350 is Google's Android™ mobiletechnology platform. With Android®, there is a Java® package called“android.webkit”, which provides various tools for browsing the web.Among the “android.webkit” package, there is a Java class called“android.webkit.WebView”, which implements a View for displaying webpages. This class uses the WebKit rendering engine to display web pagesand includes methods to navigate forward and backward through a history,zoom in, zoom out, perform text searches, and so on. In particularembodiments, an application user interface 330 may utilize Android'sWebView application programming interface (API) to display each web pageof the user interface in a View implemented by the“android.webkit.WebView” class. Thus, in particular embodiments,software 310 may include any number of web views 360, each fordisplaying one or more web pages that implement the user interface of anapplication.

During the execution of an application, the device user may interactwith the application through its user interface. For example, the usermay provide inputs to the application in various displays (e.g., webpages). Outputs of the application may be presented to the user invarious displays (e.g., web pages) as well. In particular embodiments,when the user provides an input to the application through a specificdisplay (e.g., a specific web page), an event (e.g., an input event) maybe generated by, for example, a web view 360 or application userinterfaces 330. Each input event may be forwarded to applicationfunctions 340, or application functions 340 may listen for input eventsthus generated. When application functions 340 receive an input event,the appropriate software module in application functions 340 may beinvoked to process the event. In addition, specific functionalitiesprovided by operating system 350 and/or hardware (e.g., as described inFIGS. 1 and 2A-B) may also be invoked. For example, if the event isgenerated as a result of the user pushing a button to take a photo withpersonal computing device 200, a corresponding image processing modulemay be invoked to convert the raw image data into an image file (e.g.,JPG or GIF) and store the image file in the storage 320 of personalcomputing device 200. As anther example, if the event is generated as aresult of the user selecting an icon to compose an instant message, thecorresponding short message service (SMS) module may be invoked toenable the user to compose and send the message.

In particular embodiments, when an output of the application is ready tobe presented to the user, an event (e.g., an output event) may begenerated by, for example, a software module in application functions340 or operating system 350. Each output event may be forwarded toapplication user interfaces 330, or application user interfaces 330 maylisten for output events thus generated. When application userinterfaces 330 receive an output event, it may construct a web view 360to display a web page representing or containing the output. Forexample, in response to the user selecting an icon to compose an instantmessage, an output may be constructed that includes a text field thatallows the user to input the message. This output may be presented tothe user as a web page and displayed to the user in a web view 360 sothat the user may type into the text field the message to be sent.

The user interface of an application may be implemented using a suitableprogramming language (e.g., HTML, JavaScript®, or Java®). Morespecifically, in particular embodiments, each web page that implements ascreen or display of the user interface may be implemented using asuitable programming language. In particular embodiments, when a webview 360 is constructed to display a web page (e.g., by application userinterfaces 330 in response to an output event), the code implementingthe web page is loaded into web view 360.

FIG. 4 illustrates an example scenario in which a primary user allows atemporary user to use his personal computing device. FIG. 4 illustratesan example personal computing device 400, which comprises a personalcomputing device as described above. In particular embodiments, personalcomputing device 400 includes a touch screen 405 and a sensor 410.

In particular embodiments, the primary user may be able to navigatethrough menus in the user interface (e.g., in the Device Settings menu)to activate shared mode. The user interface displayed on touch screen405 shows one or more menu options 430 for device settings. To share thepersonal computing device, the primary user can click button 440 (“Let aFriend Try It”), which links to an interface forauthentication/authorization (see FIG. 5A) where the temporary user canlog in.

In particular embodiments, the primary user may be able to pull up theoption to activate shared mode by pulling down a special menu bar (e.g.,the Facebook Uberbar), or by making a particular gesture, or by speakinga particular voice command, or by activating a physical button orswitch, or in another conventional manner of transmitting input to apersonal computing device.

In particular embodiments, a temporary user may wish to log in to ageneric personal computing device 400 (e.g., a demo model at a retailstore). In particular embodiments, the demo model has a default mode ofplaying a looped video demonstrating features and functionality of thedevice; in particular embodiments, a temporary user in the retail storecan pick up the generic personal computing device, tap on the screen (orinput another appropriate indication), and open up an interface forauthentication/authorization (see FIG. 5A) where the temporary user canlog in. In particular embodiments, a default demo user account has beenused to log in to the generic personal computing device 400 prior tobeing made available at a retail store as a demo model. In particularembodiments, an obfuscated gesture or code may be used to easily resetthe generic personal computing device 400.

FIGS. 5A-B illustrate example wireframes in which a temporary user logsin to a personal computing device. FIG. 5A illustrates an example userinterface that appears on personal computing device 400 once aninvitation has been sent. In particular embodiments, a message 435displayed on personal computing device 400 invites the temporary user toenter their authorization information (e.g., a login interface for ausername 442 and password 444). In particular embodiments, the temporaryuser can indicate (e.g., by marking a checkbox 436) that they would liketo receive additional information regarding the trial software and/orhardware. In particular embodiments, when the temporary user clicks the“Start” button 438 to log in, personal computing device 400 enablesshared mode. In particular embodiments, the temporary user can alsocancel initiation of shared mode by clicking a button 440 to go back tothe previous screen or cancel the action.

FIG. 5B illustrates an example user interface that appears on thepersonal computing device 400 once the temporary user has logged in. Inparticular embodiments, personal computing device 400 loads thetemporary user's personal information upon successful login, so that theexample user interface showns in FIG. 5B is personalized for thetemporary user. In particular embodiments, personal computing device 400adopts a personalized interface that is customized to provide thetemporary user with a complete experience (as if personal computingdevice 400 belonged to the temporary user). In particular embodiments,any personal information of a primary user of personal computing device400 is securely hidden, deleted, or disabled prior to enabling sharedmode.

Aspects of personalization may include (1) pre-configured devicesettings (e.g., background color, background images, ringtones,notification modes, time zone, time/date format,arrangement/format/font/size of icons and text, power conservationsettings), (2) pre-loaded and pre-configured applications (e.g., theselection of applications that are installed, pre-authentication forapplications that access remote data, application configurationsettings, dashboard/desktop configuration, browser bookmarks, calendaritems, phone contact list, social network contacts, personalstatus/messaging/email history, notifications and alarms,geolocation-related information and saved locations), and (3) pre-loadedcontent (e.g., music, pictures, videos, e-books, game-related content,documents, other data).

In particular embodiments, shared mode is intended to betemporary—lasting only until the device receives an indication thatshared mode is to be terminated (see below for further description ofdifferent types of such indications). In the example wireframeillustrated in FIG. 5B, a shared mode status bar 450 is displayed inorder to allow the temporary user to explicitly terminate shared mode.In particular embodiments, any personal information of a temporary userof personal computing device 400 is securely deleted or otherwiseremoved or made inaccessible upon termination of shared mode.

FIG. 6 illustrates a process flow of an example embodiment for sharing apersonal computing device with a temporary user. In step 605, the devicedetects an indication that the device is to be shared with a temporaryuser. In particular embodiments, step 605 may comprise detecting anaffirmative action, such as the primary user clicking on a button, asshown in the examples illustrated in FIGS. 4A-D, or, for example, avoice command, a particular shaking motion detectable by anaccelerometer, a particular gesture detectable on a touchscreen, removalof the user's fingertips or palm from an area of the device intended toprovide constant biometric identification, or a signal from a remotecontrol device.

In particular embodiments, step 610 may comprise disabling access topersonal information associated with the primary user. In particularembodiments, access to data stores on the personal computing device (orto portions thereof) is disabled so as to prevent any possible access bythe temporary user to personal information of the primary user. Inparticular embodiments, caches storing application data, profileinformation, or other personal information are flushed. In particularembodiments, the device is configured to switch over to use alternatedata stores and/or caches and/or disk partitions. In particularembodiments, personal information stored remotely is disabled bydisabling or deleting any of the following: cookies, authorizationtokens, security certificates, saved usernames and passwords, other userprofile information, or any combination thereof.

In particular embodiments, step 615 may comprise presenting anauthentication and/or authorization interface (e.g., login interface),one example of which is described herein with respect to FIG. 5A. Anyconventional method of authentication and/or authorization suitable forembodiments described herein may be utilized to authenticate thetemporary user (step 620).

In particular embodiments, personal information associated with thetemporary user is retrieved (step 625) in order to prepare the devicefor use by the temporary user (e.g., by pre-loading the temporary user'spersonal information, applications, and content onto the device). Inparticular embodiments, personal computing device 400 then displays apersonalized user interface for the temporary user (step 630), asdescribed above with respect to FIG. 5B.

In particular embodiments, step 635 may comprise detecting anaffirmative action by the temporary user indicating that shared mode isto be terminated, such as a button click, a gesture on a touchscreen, avoice command, a particular shaking motion detectable by anaccelerometer, or a signal from a remote control device. In particularembodiments, step 635 may comprise detecting a passive action by thetemporary user that warrants termination of shared mode, such as removalof the user's fingertips or palm from an area of the device intended toprovide constant biometric identification, putting the device down orputting the device away such that a camera of the device is no longerable to perform facial recognition or a scanner of the device is nolonger able to scan the temporary user's iris or retina. In particularembodiments, step 635 may comprise detecting an event that warrantstermination of shared mode, such as an incoming phone call or textmessage, a timeout (e.g., after 10 minutes of usage, or after 30 secondsof lack of activity or input-idle), a power cycle or device reset, or aforbidden action by the temporary user, such as an attempt to hack intoprotected or disabled data stores.

In particular embodiments, upon detecting an indication that shared modeis to be terminated (step 635), personal information of the temporaryuser is automatically removed or deletect (step 640), and personalinformation of any primary user of the device is automatically restored(step 650) so that the primary user can begin using their device 400again. In particular embodiments, where there is no primary user (e.g.,with respect to the demo model at the retail store example describedabove), after step 640, the device reverts back to its default state ofdisplaying a looped video. In particular embodiments, step 635 mayfurther comprise displaying a “locked screen” or login screen so as torequire the primary user to log back in or perform some otheraffirmative action to regain access to the device (step 645), at whichpoint the primary user's personal information or access thereto isrestored on the device (step 650). In particular embodiments, theprimary user's personal information or access thereto is restored byswitching back to using the original data stores and/or caches and/ordisk partitions.

In particular embodiments, step 605 may comprise detecting a passiveaction—that is, when the device detects that a user other than theprimary user is attempting to use or view the device, for example, bymeans of biometric identification techniques. For example, if a primaryuser puts their device down on a table, and another user picks up thedevice without the primary user's knowledge, the device may detect themotion of the user picking up the device (e.g., using embedded touchsensors, an accelerometer, and/or a gyroscope), perform biometricidentification on the user (e.g., using a camera to perform facialrecognition, using a scanner to scan the user's iris, retina,fingerprints, and/or palm veins, and/or using chemical or olfactorysensors), determine that the user is not the primary user, automaticallydisable access to the primary user's personal information (step 610),and display an interface for authentication and/or authorization (step615).

As one of skill in the relevant field of art would be aware, it iscertainly within the scope of this disclosure to personalize personalcomputing device 400 for the temporary user to a lesser degree.

FIG. 7 illustrates an example computer system 700. In particularembodiments, one or more computer systems 700 perform one or more stepsof one or more methods described or illustrated herein. In particularembodiments, one or more computer systems 700 provide functionalitydescribed or illustrated herein. In particular embodiments, softwarerunning on one or more computer systems 700 performs one or more stepsof one or more methods described or illustrated herein or providesfunctionality described or illustrated herein. Particular embodimentsinclude one or more portions of one or more computer systems 700.

This disclosure contemplates any suitable number of computer systems700. This disclosure contemplates computer system 700 taking anysuitable physical form. As example and not by way of limitation,computer system 700 may be an embedded computer system, a system-on-chip(SOC), a single-board computer system (SBC) (such as, for example, acomputer-on-module (COM) or system-on-module (SOM)), a desktop computersystem, a laptop or notebook computer system, an interactive kiosk, amainframe, a mesh of computer systems, a mobile telephone, a personaldigital assistant (PDA), a server, a tablet computer system, or acombination of two or more of these. Where appropriate, computer system700 may include one or more computer systems 700; be unitary ordistributed; span multiple locations; span multiple machines; spanmultiple datacenters; or reside in a cloud, which may include one ormore cloud components in one or more networks. Where appropriate, one ormore computer systems 700 may perform without substantial spatial ortemporal limitation one or more steps of one or more methods describedor illustrated herein. As an example and not by way of limitation, oneor more computer systems 700 may perform in real time or in batch modeone or more steps of one or more methods described or illustratedherein. One or more computer systems 700 may perform at different timesor at different locations one or more steps of one or more methodsdescribed or illustrated herein, where appropriate.

In particular embodiments, computer system 700 includes a processor 702,memory 704, storage 706, an input/output (I/O) interface 708, acommunication interface 710, and a bus 712. Although this disclosuredescribes and illustrates a particular computer system having aparticular number of particular components in a particular arrangement,this disclosure contemplates any suitable computer system having anysuitable number of any suitable components in any suitable arrangement.

In particular embodiments, processor 702 includes hardware for executinginstructions, such as those making up a computer program. As an exampleand not by way of limitation, to execute instructions, processor 702 mayretrieve (or fetch) the instructions from an internal register, aninternal cache, memory 704, or storage 706; decode and execute them; andthen write one or more results to an internal register, an internalcache, memory 704, or storage 706. In particular embodiments, processor702 may include one or more internal caches for data, instructions, oraddresses. Although this disclosure describes and illustrates aparticular processor, this disclosure contemplates any suitableprocessor.

In particular embodiments, memory 704 includes main memory for storinginstructions for processor 702 to execute or data for processor 702 tooperate on. As an example and not by way of limitation, computer system700 may load instructions from storage 706 or another source (such as,for example, another computer system 700) to memory 704. Processor 702may then load the instructions from memory 704 to an internal registeror internal cache. To execute the instructions, processor 702 mayretrieve the instructions from the internal register or internal cacheand decode them. During or after execution of the instructions,processor 702 may write one or more results (which may be intermediateor final results) to the internal register or internal cache. Processor702 may then write one or more of those results to memory 704. Inparticular embodiments, processor 702 executes only instructions in oneor more internal registers or internal caches or in memory 704 (asopposed to storage 706 or elsewhere) and operates only on data in one ormore internal registers or internal caches or in memory 704 (as opposedto storage 706 or elsewhere). One or more memory buses (which may eachinclude an address bus and a data bus) may couple processor 02 to memory704. Bus 712 may include one or more memory buses, as described below.In particular embodiments, one or more memory management units (MMUs)reside between processor 702 and memory 704 and facilitate accesses tomemory 704 requested by processor 702. Although this disclosuredescribes and illustrates particular memory, this disclosurecontemplates any suitable memory.

In particular embodiments, storage 706 includes mass storage for data orinstructions. Storage 706 may include removable or non-removable (i.e.,fixed) media, where appropriate. Storage 706 may be internal or externalto computer system 700, where appropriate. In particular embodiments,storage 706 is non-volatile, solid-state memory. Where appropriate,storage 706 may include one or more storages 706. Although thisdisclosure describes and illustrates particular storage, this disclosurecontemplates any suitable storage.

In particular embodiments, I/O interface 708 includes hardware,software, or both providing one or more interfaces for communicationbetween computer system 700 and one or more I/O devices. Computer system700 may include one or more of these I/O devices, where appropriate. Oneor more of these I/O devices may enable communication between a personand computer system 700. As an example and not by way of limitation, anI/O device may include a keyboard, keypad, microphone, monitor, mouse,printer, scanner, speaker, still camera, stylus, tablet, touchscreen,trackball, video camera, another suitable I/O device or a combination oftwo or more of these. An I/O device may include one or more sensors.This disclosure contemplates any suitable I/O devices and any suitableI/O interfaces 708 for them. Where appropriate, I/O interface 708 mayinclude one or more device or software drivers enabling processor 702 todrive one or more of these I/O devices. I/O interface 708 may includeone or more I/O interfaces 708, where appropriate. Although thisdisclosure describes and illustrates a particular I/O interface, thisdisclosure contemplates any suitable I/O interface.

In particular embodiments, communication interface 710 includeshardware, software, or both providing one or more interfaces forcommunication (such as, for example, packet-based communication) betweencomputer system 700 and one or more other computer systems 700 or one ormore networks. As an example and not by way of limitation, communicationinterface 710 may include a network interface controller (NIC) ornetwork adapter for communicating with an Ethernet or other wire-basednetwork or a wireless NIC (WNIC) or wireless adapter for communicatingwith a wireless network, such as a Wi-Fi network. This disclosurecontemplates any suitable network and any suitable communicationinterface 710 for it. Although this disclosure describes and illustratesa particular communication interface, this disclosure contemplates anysuitable communication interface.

In particular embodiments, bus 712 includes hardware, software, or bothcoupling components of computer system 700 to each other. Although thisdisclosure describes and illustrates a particular bus, this disclosurecontemplates any suitable bus or interconnect.

Herein, reference to a computer-readable storage medium encompasses oneor more non-transitory, tangible, computer-readable storage mediapossessing structure. As an example and not by way of limitation, acomputer-readable storage medium may include a semiconductor-based orother integrated circuit (IC) (such, as for example, afield-programmable gate array (FPGA) or an application-specific IC(ASIC)), a hard disk, an HDD, a hybrid hard drive (HHD), an opticaldisc, an optical disc drive (ODD), a magneto-optical disc, amagneto-optical drive, a floppy disk, a floppy disk drive (FDD),magnetic tape, a holographic storage medium, a solid-state drive (SSD),a RAM-drive, a SECURE DIGITAL card, a SECURE DIGITAL drive, or anothersuitable computer-readable storage medium or a combination of two ormore of these, where appropriate. Herein, reference to acomputer-readable storage medium excludes any medium that is noteligible for patent protection under 35 U.S.C. §101. Herein, referenceto a computer-readable storage medium excludes transitory forms ofsignal transmission (such as a propagating electrical or electromagneticsignal per se) to the extent that they are not eligible for patentprotection under 35 U.S.C. §101. A computer-readable non-transitorystorage medium may be volatile, non-volatile, or a combination ofvolatile and non-volatile, where appropriate.

This disclosure contemplates one or more computer-readable storage mediaimplementing any suitable storage. In particular embodiments, acomputer-readable storage medium implements one or more portions ofprocessor 702 (such as, for example, one or more internal registers orcaches), one or more portions of memory 704, one or more portions ofstorage 706, or a combination of these, where appropriate. In particularembodiments, a computer-readable storage medium implements RAM or ROM.In particular embodiments, a computer-readable storage medium implementsvolatile or persistent memory. In particular embodiments, one or morecomputer-readable storage media embody software. Herein, reference tosoftware may encompass one or more applications, bytecode, one or morecomputer programs, one or more executables, one or more instructions,logic, machine code, one or more scripts, or source code, and viceversa, where appropriate. In particular embodiments, software includesone or more application programming interfaces (APIs). This disclosurecontemplates any suitable software written or otherwise expressed in anysuitable programming language or combination of programming languages.In particular embodiments, software is expressed as source code orobject code.

Herein, “or” is inclusive and not exclusive, unless expressly indicatedotherwise or indicated otherwise by context. Therefore, herein, “A or B”means “A, B, or both,” unless expressly indicated otherwise or indicatedotherwise by context. Moreover, “and” is both joint and several, unlessexpressly indicated otherwise or indicated otherwise by context.Therefore, herein, “A and B” means “A and B, jointly or severally,”unless expressly indicated otherwise or indicated otherwise by context.

This disclosure encompasses all changes, substitutions, variations,alterations, and modifications to the example embodiments herein that aperson having ordinary skill in the art would comprehend. Similarly,where appropriate, the appended claims encompass all changes,substitutions, variations, alterations, and modifications to the exampleembodiments herein that a person having ordinary skill in the art wouldcomprehend. Moreover, reference in the appended claims to an apparatusor system or a component of an apparatus or system being adapted to,arranged to, capable of, configured to, enabled to, operable to, oroperative to perform a particular function encompasses that apparatus,system, component, whether or not it or that particular function isactivated, turned on, or unlocked, as long as that apparatus, system, orcomponent is so adapted, arranged, capable, configured, enabled,operable, or operative.

The foregoing description of the embodiments of the invention has beenpresented for the purpose of illustration; it is not intended to beexhaustive or to limit the invention to the precise forms disclosed.Persons skilled in the relevant art can appreciate that manymodifications and variations are possible in light of the abovedisclosure. For example, although the foregoing embodiments have beendescribed in the context of a social network system, it will apparent toone of ordinary skill in the art that the invention may be used with anyelectronic social network service and, even if it is not providedthrough a website. Any computer-based system that provides socialnetworking functionality can be used in accordance with the presentinvention even if it relies, for example, on e-mail, instant messagingor other form of peer-to-peer communications, and any other techniquefor communicating between users. The invention is thus not limited toany particular type of communication system, network, protocol, formator application.

Some portions of this description describe the embodiments of theinvention in terms of algorithms and symbolic representations ofoperations on information. These algorithmic descriptions andrepresentations are commonly used by those skilled in the dataprocessing arts to convey the substance of their work effectively toothers skilled in the art. These operations, while describedfunctionally, computationally, or logically, are understood to beimplemented by computer programs or equivalent electrical circuits,microcode, or the like. Furthermore, it has also proven convenient attimes, to refer to these arrangements of operations as modules, withoutloss of generality. The described operations and their associatedmodules may be embodied in software, firmware, hardware, or anycombinations thereof.

Any of the steps, operations, or processes described herein may beperformed or implemented with one or more hardware or software modules,alone or in combination with other devices. In one embodiment, asoftware module is implemented with a computer program productcomprising a computer-readable medium containing computer program code,which can be executed by a computer processor for performing any or allof the steps, operations, or processes described.

Embodiments of the invention may also relate to an apparatus forperforming the operations herein. This apparatus may be speciallyconstructed for the required purposes, and/or it may comprise ageneral-purpose computing device selectively activated or reconfiguredby a computer program stored in the computer. Such a computer programmay be stored in a tangible computer readable storage medium or any typeof media suitable for storing electronic instructions, and coupled to acomputer system bus. Furthermore, any computing systems referred to inthe specification may include a single processor or may be architecturesemploying multiple processor designs for increased computing capability.

While the foregoing processes and mechanisms can be implemented by awide variety of physical systems and in a wide variety of network andcomputing environments, the server or computing systems described belowprovide example computing system architectures for didactic, rather thanlimiting, purposes.

The present invention has been explained with reference to specificembodiments. For example, while embodiments of the present inventionhave been described as operating in connection with a social networksystem, the present invention can be used in connection with anycommunications facility that allows for communication of messagesbetween users, such as an email hosting site. Other embodiments will beevident to those of ordinary skill in the art. It is therefore notintended that the present invention be limited, except as indicated bythe appended claims.

Finally, the language used in the specification has been principallyselected for readability and instructional purposes, and it may not havebeen selected to delineate or circumscribe the inventive subject matter.It is therefore intended that the scope of the invention be limited notby this detailed description, but rather by any claims that issue on anapplication based hereon. Accordingly, the disclosure of the embodimentsof the invention is intended to be illustrative, but not limiting, ofthe scope of the invention, which is set forth in the following claims.

What is claimed is:
 1. A method comprising: detecting, by a personalcomputing device associated with a primary user, an indication that atemporary user is about to log in to the personal computing device;disabling, by the personal computing device, access to local personalinformation associated with the primary user that is stored on thepersonal computing device; disabling, by the personal computing device,access to remote personal information associated with the primary userthat is accessible from the personal computing device; receiving, by thepersonal computing device, authentication information provided by thetemporary user; by the personal computing device, in response toreceiving the authentication information: logging the temporary user into the personal computing device based at in part on the providedauthentication information; and retrieving, from a server, based atleast in part on the provided authentication information, remotepersonal information associated with the temporary user; presenting, bythe personal computing device, a personalized user interface on a screenof the personal computing device for the temporary user, wherein thepersonalized user interface comprises at least a portion of theretrieved personal information; detecting, by the personal computingdevice, an indication that access to the personal computing device bythe temporary user is to be disabled; disabling, by the personalcomputing device, access to local personal information associated withthe temporary user that is stored on the personal computing device;disabling, by the personal computing device, access to the remotepersonal information associated with the temporary user; detecting, bythe personal computing device, authorization from the primary user torestore access to the local and remote personal information associatedwith the primary user; restoring, by the personal computing device,access to the local personal information associated with primary user;and restoring, by the personal computing device, access to the remotepersonal information associated with the primary user.
 2. The method ofclaim 1, further comprising: presenting an authentication interface; andreceiving, from the temporary user, via the authentication interface,the authentication information.
 3. The method of claim 1, furthercomprising presenting a generic user interface on the screen, thegeneric user interface comprising one or more of: a looped video; a setof generic applications; generic media content; an indication thataccess to the personal computing device has been disabled; or anauthentication interface.
 4. The method of 1, wherein detecting anindication that a temporary user is about to log in to the personalcomputing device comprises detecting one or more of: a user inputreceived by the personal computing device; a voice command; a signalfrom an accelerometer associated with the personal computing device; asignal from a biometric identification sensor associated with thepersonal computing device; or a signal from a remote control deviceassociated with the personal computing device.
 5. The method of claim 1,wherein detecting an indication that access to the personal computingdevice by the temporary user is to be disabled comprises detecting oneor more of: a user input received by the personal computing device; avoice command; a signal from an accelerometer associated with thepersonal computing device; a signal from a biometric identificationsensor associated with the personal computing device; a signal from aremote control device associated with the personal computing device; anincoming call; an incoming text message; a timeout; a power cycle; or adevice reset.
 6. The method of claim 1, wherein disabling access tolocal personal information stored on the personal computing devicecomprises one or more of: disabling access to a local data store;switching to an alternate data store; clearing a local cache; disablingor deleting cookies; disabling or deleting an authorization token;disabling or deleting security certificates; or disabling or deletingother user profile information.
 7. The method of 1, wherein disablingaccess to remote personal information accessible from the personalcomputing device comprises one or more of: disabling access to a localdata store; switching to an alternate data store; clearing a localcache; disabling or deleting cookies; disabling or deleting anauthorization token; disabling or deleting security certificates; ordisabling or deleting other user profile information.
 8. A personalcomputing device associated with a primary user, comprising: a screen;one or more processors; and a memory coupled to the processorscomprising instructions executable by the processors, the processorsbeing operable when executing the instructions to: detect an indicationthat a temporary user is about to log into the personal computingdevice; disable access to local personal information associated with theprimary user that is stored on the personal computing device; disableaccess to remote personal information associated with the primary userthat is accessible from the personal computing device; receiveauthentication information provided by the temporary user; in responseto receiving the authentication information: log the temporary user into the personal computing device based at least in part on the providedauthentication information; and retrieve, from a server, based at leastin part on the provided authentication information, remote personalinformation associated with the temporary user; present a personalizeduser interface on the screen for the temporary user, wherein thepersonalized user interface comprises at least a portion of theretrieved personal information; detect an indication that access to thepersonal computing device by the temporary user is to be disabled;disable access to local personal information associated with thetemporary user that is stored on the personal computing device; disableaccess to the remote personal information associated with the temporaryuser; detect authorization from the primary user to restore access tothe local and remote personal information of the primary user; restoreaccess to the local personal information associated with the primaryuser; and restore access to the remote personal information associatedwith the primary user.
 9. The personal computing device of claim 8,wherein the processors are further operable when executing theinstructions to: present an authentication interface; and receive, fromthe temporary user, via the authentication interface, the authenticationinformation.
 10. The personal computing device of claim 8, whereindisabling access to local personal information stored on the personalcomputing device comprises one or more of: disabling access to a localdata store; switching to an alternate data store; clearing a localcache; disabling or deleting cookies; disabling or deleting anauthorization token; disabling or deleting security certificates; ordisabling or deleting other user profile information.
 11. The personalcomputing device of claim 8, wherein disabling access to remote personalinformation accessible from the personal computing device comprises oneor more of: disabling access to a local data store; switching to analternate data store; clearing a local cache; disabling or deletingcookies; disabling or deleting an authorization token; disabling ordeleting security certificates; or disabling or deleting other userprofile information.
 12. One or more computer-readable non-transitorystorage media embodying software that is operable when executed by oneor more processors associated with one or more computer systems to:detect, using the processors, an indication that a temporary user isabout to log into a personal computing device associated with a primaryuser; disable, using the processors, access to local personalinformation associated with the primary user that is stored on thepersonal computing device; disable, using the processors, access toremote personal information associated with the primary user that isaccessible from the personal computing device; receive, using theprocessors, authentication information provided by the temporary user;using the processors, in response to receiving the authenticationinformation: log the temporary user in to the personal computing devicebased at least in part on the provided authentication information; andretrieve, from a server, based at least in part on the providedauthentication information, remote personal information associated withthe temporary user; present, using the processors, a personalized userinterface on a screen of the personal computing device for the temporaryuser, wherein the personal user interface comprises at least a portionof the retrieved personal information; detect, using the processors, anindication that access to the personal computing device by the temporaryuser is to be disabled; disable, using the processors, access to localpersonal information associated with the temporary user that is storedon the personal computing device; disabling, using the personalcomputing device, access to the remote personal information associatedwith the temporary user; detect, using the processors, authorizationfrom the primary user to restore access to the local and remote personalinformation associated with the primary user; restore, using theprocessors, access to the local personal information associated withprimary user; and restore, using the processors, access to the remotepersonal information associated with the primary user.
 13. The method ofclaim 1, further comprising: sending an invitation to the temporary userto log in to the personal computing device.
 14. The method of claim 13,wherein the invitation comprises a secure authorization code to log into the primary user's personal computing device.
 15. The method of claim14, wherein the authentication information comprises the secureauthorization code.
 16. The system of claim 8, wherein the processorsare further operable when executing the instructions to: send aninvitation to the temporary user to log in to the personal computingdevice.
 17. The system of claim 16, wherein the invitation comprises asecure authorization code to log in to the primary user's personalcomputing device.
 18. The system of claim 17, wherein the authenticationinformation comprises the secure authorization code.
 19. The media ofclaim 12, wherein the software is further operable when executed to:send an invitation to the temporary user to log in to the personalcomputing device.
 20. The media of claim 19, wherein the invitationcomprises a secure authorization code to log in to the primary user'spersonal computing device, wherein the authentication informationcomprises the secure authorization code.