Mobile device locking

ABSTRACT

Systems and methods for securing access to a mobile device are disclosed. A method includes: synchronizing, by a first mobile computer device, with a remote mobile computer device; transmitting, by the first mobile computer device, a tone to a surface of an object; receiving, by the first mobile computer device, a compound resonance frequency from the object based on the transmitted tone; determining, by the first mobile computer device, the received compound resonance frequency conforms to a stored compound resonance frequency; unlocking, by the first mobile computer device, the first computer device based on the determining; and establishing, by the first mobile computer device, a group connection with the remote mobile computer device based on the unlocking.

BACKGROUND

The present invention relates generally to mobile device security and,more particularly, to a system and method for securing access to amobile device according to a resonance frequency received by the mobiledevice.

Currently, individuals access digital information in ever increasingquantities and across a disparate set of devices. As access toinformation technology improves, security attacks on the devices used bythe individuals continue to spread. Almost every week, news reports ofhigh level security breaches of consumer data with the latest securityprotections being circumvented. Presently, security measures implementedon mobile devices include password protection and other methods ofdirect user authentication.

SUMMARY

In an aspect of the invention, a computer implemented method includes:synchronizing, by a first mobile computer device, with a remote mobilecomputer device; transmitting, by the first mobile computer device, atone to a surface of an object; receiving, by the first mobile computerdevice, a compound resonance frequency from the object based on thetransmitted tone; determining, by the first mobile computer device, thereceived compound resonance frequency conforms to a stored compoundresonance frequency; unlocking, by the first mobile computer device, thefirst computer device based on the determining; and establishing, by thefirst mobile computer device, a group connection with the remote mobilecomputer device based on the unlocking.

In another aspect of the invention, a computer program product comprisesa computer readable storage medium having program instructions embodiedtherewith. The program instructions are executable by a computing deviceto cause the computing device to: transmit synchronization informationto a remote mobile computer device; receive synchronization responsedata from the remote mobile computer device based on transmitting thesynchronization information; transmit a tone to a surface of an objectbased on receiving the synchronization response data; receive a compoundresonance frequency from the object based on the transmitted tone;determine the received compound resonance frequency conforms to a storedcompound resonance frequency; unlock the mobile computer device based onthe determining; and establish a group connection with the remote mobilecomputer device based on the unlocking.

In another aspect of the invention, there is a system for securingaccess to a mobile device. The system includes: a CPU, a computerreadable memory and a computer readable storage medium associated with amobile computer device; program instructions to synchronize the mobilecomputer device with a remote mobile computer device; programinstructions to transmit a tone to a surface of an object; programinstructions to receive a compound resonance frequency from the objectbased on the transmitted tone; program instructions to determine thereceived compound resonance frequency conforms to a stored compoundresonance frequency; program instructions to unlock the mobile computerdevice based on the determining; and program instructions to establish agroup connection between the mobile computer device and the remotemobile computer device based on the unlocking. The program instructionsare stored on the computer readable storage medium for execution by theCPU via the computer readable memory.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is described in the detailed description whichfollows, in reference to the noted plurality of drawings by way ofnon-limiting examples of exemplary embodiments of the present invention.

FIG. 1 depicts a block diagram of components of a computing deviceaccording to an embodiment of the present invention.

FIG. 2 shows an exemplary environment in accordance with aspects of theinvention.

FIG. 3 illustrates an example graph of a resonance frequency inaccordance with aspects of the invention.

FIG. 4 shows an exemplary use in accordance with embodiments of theinvention.

FIG. 5 illustrates a flowchart of steps of a method in accordance withaspects of the invention.

FIG. 6 shows an exemplary use in accordance with embodiments of theinvention.

FIG. 7 illustrates a flowchart of steps of a method in accordance withaspects of the invention.

FIG. 8 shows an exemplary use in accordance with embodiments of theinvention.

FIG. 9 illustrates a flowchart of steps of a method in accordance withaspects of the invention.

FIG. 10 shows an exemplary use in accordance with embodiments of theinvention.

FIG. 11 illustrates a flowchart of steps of a method in accordance withaspects of the invention.

DETAILED DESCRIPTION

The present invention relates generally to mobile device security and,more particularly, to a system and method for securing access to themobile device according to a resonance signature received by the mobiledevice. Traditionally, individuals accessed data only on desktopsystems; however, with advances in computing technology, individuals nowaccess data on an ever increasing number of mobile and smart systems.Security measures, such as fingerprint recognition, voice recognition,and numerical pass codes that have proved successful in the past are nowbeing circumvented on mobile devices. As individuals consume more datathan before from electronic storage systems, more unauthorized attemptsto obtain valuable data from these system devices will occur. As theseelectronic storage systems are gateways to cloud based applicationsservices and infrastructure, there exists the possibility that anattacker (who is able to circumvent the device security) may causedamage to server side infrastructure since the attacker has access to atrusted device. Aspects of the invention recognize that, with the numberof mobile devices with poor security protection, it is advantageous toprotect data on mobile devices from unwarranted intrusion. Aspects ofthe invention are also directed to securing data on a mobile devicethrough non-traditional security procedures.

In aspects, a device is calibrated to unlock only when a specificfrequency is emitted when the device is placed on a specific surface.Since the device is aware of resting on a particular surface, the deviceemits a frequency (i.e., an acoustic wave), which is complementary tothe surface. If the acoustic frequency wave (e.g., resonance frequency)emitted from the particular surface conforms to (e.g., matches) storedacoustic frequency wave (e.g., stored resonance frequency), the deviceunlocks.

In aspects, a mobile device is configured to emit a tone in thedirection of a surface of an object in response to the mobile devicecontacting the object. In aspects, the mobile device receives aresonance frequency from the object based on the tone transmitted to theobject. In other aspects, the mobile device compares the receivedresonance frequency to a stored resonance frequency of the object. Basedon the comparing, the mobile device is configured to one of: grantaccess (i.e., unlock the mobile device) when the received resonancefrequency conforms to the stored resonance frequency of the object; anddeny access (i.e., lock the mobile device) when the received resonancefrequency does not conform to the stored resonance frequency of theobject.

The present invention may be a system, a method, and/or a computerprogram product at any possible technical detail level of integration.The computer program product may include a computer readable storagemedium (or media) having computer readable program instructions thereonfor causing a processor to carry out aspects of the present invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, configuration data for integrated circuitry, oreither source code or object code written in any combination of one ormore programming languages, including an object oriented programminglanguage such as Smalltalk, C++, or the like, and procedural programminglanguages, such as the “C” programming language or similar programminglanguages. The computer readable program instructions may executeentirely on the user's computer, partly on the user's computer, as astand-alone software package, partly on the user's computer and partlyon a remote computer or entirely on the remote computer or server. Inthe latter scenario, the remote computer may be connected to the user'scomputer through any type of network, including a local area network(LAN) or a wide area network (WAN), or the connection may be made to anexternal computer (for example, through the Internet using an InternetService Provider). In some embodiments, electronic circuitry including,for example, programmable logic circuitry, field-programmable gatearrays (FPGA), or programmable logic arrays (PLA) may execute thecomputer readable program instructions by utilizing state information ofthe computer readable program instructions to personalize the electroniccircuitry, in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the blocks may occur out of theorder noted in the Figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

Referring now to FIG. 1, a block diagram of components of a computingdevice 102, in accordance with an embodiment of the present invention isshown. In an exemplary embodiment, computing device 102 includes one ormore processors 110, one or more computer-readable RAMs 112, one or morecomputer-readable ROMs 114, and one or more computer-readable storagedevices 118 on one or more buses 116. One or more operating systems 130,and one or more apps or program modules 132 are stored on the one ormore computer-readable tangible storage devices 118 for execution by oneor more of the processors 110 via one or more of the RAMs 112 (whichtypically include cache memory). In the illustrated embodiment, each ofthe computer-readable tangible storage devices 118 is a semiconductorstorage device such as ROM 114, EPROM, flash memory or any othercomputer-readable tangible storage device that can store a computerprogram and digital information. Alternatively, each of thecomputer-readable tangible storage devices 118 is a magnetic diskstorage device of an internal hard drive.

Computing device 102 also includes a read/write (R/W) interface 122, forexample, a USB port, to read from and write to external computingdevices or one or more portable computer-readable storage devices suchas a CD-ROM, DVD, memory stick, magnetic disk, optical disk orsemiconductor storage device. The apps and program modules 132 can bestored on the external computing devices or one or more of the portablecomputer-readable tangible storage devices, read via the R/W interface122 and loaded onto the computer-readable tangible storage device 118.

Computing device 102 also includes a network adapter or interface 120,such as a TCP/IP adapter card or wireless communication adapter (such asa 4G wireless communication adapter using OFDMA technology). The appsand programs modules 132 can be downloaded to computing device 102 froman external computer or external storage device via a network (forexample, the Internet, a local area network, a wide area network, or awireless network) and network adapter or interface 120. From the networkadapter or interface 120, apps and program modules 132 are loaded intocomputer-readable tangible storage device 118. The network may comprisecopper wires, optical fibers, wireless transmission, routers, firewalls,switches, gateway computers and/or edge servers.

Computing device 102 also includes a touch screen 126, sensors 140, forexample, touch screen sensors and magnetically sensitive circuits, anddevice drivers 124 to interface to touch screen 126 for imaging, tosensors 140 for pressure sensing of alphanumeric character entry anduser selections and for detecting magnetic flux and polarity. Computingdevice 102 also includes a camera 142, a speaker 144, and a microphone146. The device drivers 124, R/W interface 122 and network adapter orinterface 120 comprise hardware and software (stored incomputer-readable tangible storage device 118 and/or ROM 114).

It should be appreciated that FIG. 1 provides only an illustration ofone implementation and does not imply any limitations with regard to theenvironments in which different embodiments may be implemented. Manymodifications to the depicted environment may be made.

The programs described herein are identified based upon the applicationfor which they are implemented in a specific embodiment of theinvention. However, it should be appreciated that any particular programnomenclature herein is used merely for convenience, and thus theinvention should not be limited to use solely in any specificapplication identified and/or implied by such nomenclature.

Based on the foregoing, a computer system, method and program producthave been disclosed for selecting a user environment based on a devicecover. However, numerous modifications and substitutions can be madewithout deviating from the scope of the present invention. Therefore,the present invention has been disclosed by way of example and notlimitation.

FIG. 2 shows an exemplary environment in accordance with aspects of theinvention. The environment includes a mobile device 60 which maycomprise a computing device 102 of FIG. 1, and may be connected to anetwork 50 (e.g., via the network adapter 120 of FIG. 1). The network 50may be any suitable communication network or combination of networks,such as a local area network (LAN), a general wide area network (WAN), apublic network (e.g., the Internet), a 3G network, a Long-Term Evolution(LTE) network, and/or a 5G network.

Referring to FIG. 2, the mobile device 60 may be a general purposemobile computing device, such as laptop computer, tablet computer,smartphone, etc. In aspects, the mobile device 60 may comprise aplurality of modules configured to perform one or more functionsdescribed herein. In aspects, the mobile devices 60 may include one ormore components of a computer system similar to the computing system 102of FIG. 1, to store information in a memory (e.g., one or more of 112,114 and 118 of FIG. 1). In aspects, the mobile device 60 may includeadditional or fewer modules than those shown in FIG. 2. In aspects,separate components may be integrated into a single computing componentor module. Additionally, or alternatively, a single module may beimplemented as multiple computing components or modules.

In aspects, the mobile device 60 includes a microphone (e.g., microphone146 of FIG. 1), a speaker (e.g., speaker 144 of FIG. 1), a devicecalibrating module 80, a tone transmitting module 82, a resonancefrequency receiving module 84, a comparing module 86, and a devicesecuring module 88, which may each comprise one or program modules(e.g., program module 132 of FIG. 1) executed by the mobile device 60.In aspects, the device calibrating module 80 is configured to calibratethe mobile device 60 to detect a resonance frequency (i.e., frequencyresponse) from a trusted object and store the resonance frequency of thetrusted object in a memory. In aspects, the tone transmitting module 82is configured to cause the mobile device 60 to transmit a tone to asurface of an object (e.g., a wood table). In aspects, the resonancefrequency receiving module 84 is configured to receive a resonancefrequency from an object based on a transmitted tone. In aspects, thecomparing module 86 is configured to compare a received resonancefrequency from an object with a stored resonance frequency of a trustedobject. In aspects, the device securing module 88 is configured tolock/unlock the mobile device 60 based on the comparison of a receivedresonance frequency from an object with a stored resonance frequency ofa trusted object.

Still referring to FIG. 2, the mobile device 60 may be configured fordirect point-to-point communication (e.g., Bluetooth) with one or moremobile devices 92 a-n and wireless communication (e.g., 3G, LTE) withone or more mobile devices 92 a-n over the network 50. In aspects, themobile devices 92 a-n may each be a general purpose mobile computingdevice, such as laptop computer, tablet computer, smartphone, etc. Inaspects, the mobile devices 92 a-n may include one or more components ofa computer system similar to the computing system 102 of FIG. 1, tostore information in a memory (e.g., one or more of 112, 114 and 118 ofFIG. 1). In aspects, the mobile devices 92 a-n may include one or moreof the modules of the mobile device 60. In aspects, the mobile devices92 a-n are represented as mobile device 92 a to mobile device 92 n,where n may be any appropriate number of separate mobile devices thatperform wireless communication with the mobile device 60 over thenetwork 50 and point to point communication with other mobile devices.

Referring to FIG. 2, the mobile device 60 and the mobile devices 92 a-nmay be configured for communication with a server 70 over the network50. The server 70 may be a computer system similar to computing system102 in FIG. 1. In aspects, the server 70 includes an authenticatingmodule 72 configured to transmit authentication information to establisha group connection between the mobile device 60 and the mobile devices92 a-n.

In accordance with embodiments of the invention, the device calibratingmodule 80 calibrates the mobile device 60 to detect a resonancefrequency of a trusted object. Each type of object, e.g., glass, oakwood, birch wood, emits a resonance frequency in response to a drivingof the surface of the object with a signal from a vibrating system. Atthe resonance frequency, the driving of the surface of the object withsmall periodic driving forces produces large amplitude oscillations, dueto the storage of vibrational energy in the object. In aspects, thesurface of the object absorbs more energy from the driving signal as afrequency of the driving signal approaches the resonance frequency ofthe object. That is, as the signal from the vibrating system conforms toa resonance frequency of the object, the rate of transmissibility (e.g.,the ratio of the output frequency over the input frequency or theamplitude of the oscillation) from the object increases. By way ofexample, at the resonance frequency, the amplitude of the oscillationemitted from the object increases as the surface of the object absorbsmore energy from the driving signal.

In accordance with aspects of the invention, the device calibratingmodule 80 may calibrate the mobile device 60 to a trusted object bytransmitting multiple signals from the mobile device 60 to the surfaceof the trusted object and receiving a resonance frequency from thetrusted object. In aspects, the device calibrating module 80 stores theresonance frequency of the trusted object in a memory (e.g., one or moreof 112, 114 and 118 of FIG. 1). In aspects, the device calibratingmodule 80 is configured to calibrate the mobile device 60 to multipletrusted objects and store the resonance frequency of each trustedobject. For example, the device calibrating module 80 may calibrate themobile device 60 to detect resonance frequency of a trusted birch woodtable in a work environment of a user and store the resonance frequencyof the trusted birch wood table.

In accordance with aspects of the invention, the tone transmittingmodule 82 may transmit a tone 402 a (e.g., as shown in FIG. 4) from themobile device 60 to a surface of an object. In aspects, the tone 402 amay include a sound pulse (e.g., a pulse of white noise, a pulse of aparticular frequency, or other acoustic pulse) transmitted as an energywave for a short time duration (e.g, one or two seconds) from thespeaker 144 of the mobile device 60. For example, the tone transmittingmodule 82 may transmit a short pulse of a monotonic tone from thespeaker 144 of the mobile device 60 to a surface of a birch wood table.

In accordance with aspects of the invention, based on the transmitting,the resonance frequency receiving module 84 may receive (e.g., at themicrophone 146 on the mobile device 60) a resonance frequency from theobject. In aspects, the resonance frequency receiving module 84 mayreceive multiple signals (e.g., resonance frequencies from multipleobjects) received at the microphone 146 on the mobile device 60 andperform a Fast Fourier Transform to determine an amplitude per signal.In aspects, the resonance frequency receiving module 84 may include afilter array to filter the resonance frequencies from multiple objectssuch that only the resonance frequency from a particular object (e.g.,the surface of the birch wood table) is processed by the comparingmodule 86.

In aspects, the received resonance frequency may include informationrelating to: a time period of the transmission of the tone to thereception of the resonance frequency (temporal period), atransmissibility of the surface of the object, and a damping coefficient(e.g., a dimensionless measure describing the coefficient of howoscillations in a system decay over time) of the surface of the object.In aspects, the resonance frequency receiving module 84 may determinethe temporal period, the transmissibility, and the damping coefficientof the object based on receiving the resonance frequency of the object.For example, the resonance frequency receiving module 84 may receive, atthe microphone 146 of the mobile device 60, a resonance frequency fromthe surface of the birch wood table based on the transmission of theshort pulse of the monotonic tone from the speaker 144 of the mobiledevice 60 and determine the temporal period, the transmissibility, andthe damping coefficient of the birch wood table.

In accordance with aspects of the invention, based on receiving theresonance frequency from the object, the comparing module 86 comparesthe received resonance frequency of the object to a stored resonancefrequency of the trusted object. By way of example, each trusted objecthas a specific resonance frequency, temporal period, transmissibility,and damping coefficient which may be detected by the resonance frequencyreceiving module 84 on the mobile device 60. In aspects, based onreceiving the resonance frequency from the object, the comparing module86 compares the received resonance frequency from the object todetermine the received resonance frequency conforms or does not conformto the stored resonance frequency of the trusted object.

In aspects, the comparing module 86 compares the temporal period, thetransmissibility, and the damping coefficient of received from theobject on the received resonance frequency with the temporal period, thetransmissibility, and the damping coefficient of the trusted object. Inaspects, each trusted object has a specific resonance frequency,temporal period, transmissibility, and damping coefficient which may bedetected by the resonance frequency receiving module 84 and compared tothe stored specific resonance frequency, temporal period,transmissibility, and damping coefficient of the trusted object whichare stored as a table in memory (e.g., one or more of 112, 114 and 118of FIG. 1), examples of which are illustrated in Table 1.

TABLE 1 Object Resonance Table Transmissibility/ Resonance TemporalDamping Surface Frequency Period Coefficient Birch Wood 110 Hertz 3seconds 2.5/0.2 Table Oak Wood 440 Hertz 5 seconds 4.8/0.1 Table GlassSurface 900 Hertz 4 seconds 3.45/0.25

For example, the comparing module 86 may compare the resonancefrequency, temporal period, transmissibility, and damping coefficient ofthe received resonance frequency of the birch wood table to determinethe received resonance frequency does or does not conform to theresonance frequency (110 Hz), temporal period (3 seconds),transmissibility/damping coefficient (2.5/0.2) of a trusted birch woodtable stored in memory (e.g., one or more of 112, 114 and 118 of FIG.1).

In accordance with aspects of the invention, based on the comparing, thedevice securing module 88 locks/unlocks the mobile device 60. Inaspects, locking the mobile device includes securing the mobile devicefrom unwarranted access to information on the mobile device 60. Inaspects, unlocking the mobile device 60 includes granting access toinformation on the mobile device 60. In aspects, based on the receivedresonance frequency from the object conforming to the stored resonancefrequency of the trusted object, the device securing module 88 unlocksthe mobile device 60. In other aspects, based on the received resonancefrequency from the surface of the object not conforming to the storedresonance frequency of the trusted object, the device securing module 88locks the mobile device 60. For example, based on the received resonancefrequency from the birch wood table conforming or not conforming to theresonance frequency of the trusted birch wood table, the device securingmodule 88 may unlock or lock the mobile device 60.

FIG. 3 illustrates an example graph of a resonance frequency of anobject. The example graph illustrates the frequency ratio in Megahertz(Mhz), the transmissibility over time, and the damping coefficient ofthe surface of an object. In aspects, as described with reference toFIG. 2, based on the tone transmitting module 82 transmitting a tone toa surface of an object, a received resonance frequency from the objectmay be illustrated as a graph similar to the graph of FIG. 3. Inaspects, based on the received resonance frequency, the comparing module86 compares the received resonance frequency of the object with a storedresonance frequency of a trusted object stored in the a memory (e.g.,one or more of 112, 114 and 118 of FIG. 1). In aspects, based on thereceived resonance frequency of the object conforming to the storedresonance frequency of the trusted object, the device securing module 88unlocks the mobile device 60.

FIG. 4 depicts an exemplary use scenario in accordance with embodimentsof the invention wherein the mobile device 60 is placed on a singlesurface of an object (i.e., the wood table 400) to unlock the featuresof the mobile device 60. The scenario of FIG. 4 may be performed in theenvironment of FIG. 2. In aspects, based on placing the mobile device 60on the wood table 400, the tone transmitting module 82 on the mobiledevice 60 transmits a tone 402 onto a surface 403 of a wood table 400.In aspects, based on transmitting the tone 402, the resonance frequencyreceiving module 84 on the mobile device 60 receives a wood tableresonance frequency 404 from the wood table 400. In aspects, based onreceiving the wood table resonance frequency 404, the comparing module86 on the mobile device 60 compares the wood table resonance frequency404 with a stored resonance frequency of a trusted wood table stored inmemory (e.g., one or more of 112, 114 and 118 of FIG. 1). In aspects,based on the received wood table resonance frequency 404 of the woodtable 400 conforming to the stored resonance frequency of the trustedwood table, the device securing module 88 unlocks the mobile device 60.

FIG. 5 shows a flowchart of steps of a method in accordance with aspectsof the invention. The steps of the method may be performed in the systemof FIG. 2 and are described with reference to the elements and functionsdescribed in FIGS. 2 and 4.

At step 500, the mobile device 60 transmits a tone 402 a to a surface ofan object. In aspects, the tone transmitting module 82 transmits thetone 402 a from the mobile device 60 to the surface of the object. Thetone 402 a may be a pulse of white noise, a pulse of a particularfrequency, or other acoustic pulse and may be transmitted from a speaker144 of the mobile device 60.

At step 502, based on transmitting the tone 402 a at step 500, themobile device 60 receives a resonance frequency (i.e., frequencyresponse) from the object. In aspects, based on transmitting the tone402 a at step 500, the resonance frequency receiving module 84 receivesthe resonance frequency from the object. In aspects, the resonancefrequency includes information such as: the temporal period, thetransmissibility, and the damping coefficient of the surface of theobject.

At step 504, based on receiving the resonance frequency from the objectat step 502, the mobile device 60 determines the received resonancefrequency from the object to a stored resonance frequency of a trustedobject. In aspects, based on receiving the resonance frequency from theobject at step 502, the comparing module 86 determines whether thereceived resonance frequency conforms to the stored resonance frequencyof the trusted object. In aspects, the comparing includes comparing theresonance frequency, temporal period, transmissibility, and dampingcoefficient of the object with the resonance frequency, temporal period,transmissibility, and damping coefficient of the trusted object storedin memory (e.g., one or more of 112, 114 and 118 of FIG. 1).

At step 506, based on determining that the received resonance frequencyconforms to the stored resonance frequency of the trusted object at step504, the mobile device 60 unlocks. In aspects, as described with respectto FIG. 2, based on determining that the received resonance frequencyconforms to the stored resonance frequency of the trusted object at step504, the device securing module 88 unlocks the mobile device 60.Unlocking may comprise, for example, changing the displayed output ofthe mobile device 60 from a lock screen (e.g., via which a user may notaccess applications or data stored on the mobile device 60) to a homescreen (e.g., via which a user may access applications or data stored onthe mobile device 60).

FIG. 6 depicts an exemplary use scenario in accordance with embodimentsof the invention, wherein the mobile device 60 is placed on multiplesurfaces to unlock the features of the mobile device 60. The scenario ofFIG. 6 may be performed in the environment of FIG. 2. In aspects, themobile device 60 undergoes a first sequence, which is similar to thesequence of FIG. 4, comprising: placing the mobile device 60 on a firstobject (i.e., a wood table 400), transmitting a tone 402 a, receiving awood table resonance frequency 404, and comparing the wood tableresonance frequency 404 with a stored resonance frequency of a trustedwood table. In the example of FIG. 6, the mobile device 60 alsoundergoes a secondary sequence in order to unlock the mobile device 60.In aspects, based on the received wood table resonance frequency 404 ofthe wood table 400 conforming to the stored resonance frequency of thetrusted wood table, the mobile device 60 may be placed on a secondsurface (i.e., a glass table 600). In aspects, based on the placing, thetone transmitting module 82 transmits a tone 402 b onto the surface ofthe glass table 600. In aspects, based on transmitting the tone 402 b tothe surface of the glass table 600, the resonance frequency receivingmodule 84 receives a glass table resonance frequency 602. In aspects,based on transmitting the tone 402 b, the comparing module 86 comparesthe glass table resonance frequency 602 with a stored resonancefrequency of a trusted glass table. In aspects, based on the receivedwood table resonance frequency 404 of the wood table 400 conforming tothe stored resonance frequency of the trusted wood table and based onthe received glass table resonance frequency 602 conforming to thestored resonance frequency of the trusted glass table, the devicesecuring module 88 unlocks the mobile device 60.

FIG. 7 shows a flowchart of steps of a method in accordance with aspectsof the invention. The steps of the method may be performed in the systemof FIG. 2 and are described with reference to the elements and functionsdescribed in FIGS. 2 and 6.

At steps 700, 702, and 704, the mobile device 60 transmits a first toneto a surface of a first object, receives a first resonance frequencyfrom the first object, and compares the first received resonancefrequency from the first object to determine the first receivedresonance frequency conforms to a first stored resonance frequency of afirst trusted object. In aspects, the tone transmitting module 82transmits the first tone from the mobile device 60 to the surface of thefirst object at step 700. At step 702, based on transmitting the firsttone at step 700, the resonance frequency receiving module 84 mayreceive the first resonance frequency (i.e., frequency response) fromthe first object. At step 704, based on receiving the first resonancefrequency at step 702, the comparing module 86 may compare the firstreceived resonance frequency from the first object to determine thefirst received resonance frequency conforms to the first storedresonance frequency of the first trusted object.

At steps 706, 708, 710, and 712, based on determining the first receivedresonance frequency conforms to the first stored resonance frequency ofthe first trusted object at step 704, the mobile device 60 transmits asecond tone to a surface of a second object, receives a second resonancefrequency from the second object, and compares the second receivedresonance frequency from the second object to determine the secondreceived resonance frequency conforms to a second stored resonancefrequency of a second trusted object. At step 706, based on determiningthe first received resonance frequency conforms to the first storedresonance frequency of the first trusted object at step 704, the tonetransmitting module 82 may transmit the second tone from the mobiledevice 60 to the surface of the second object. At step 708, based ontransmitting the second tone to the surface of the second object at step706, the resonance frequency receiving module 84 may receive the secondresonance frequency from the second object. At step 710, based onreceiving the second resonance frequency at step 708, the comparingmodule 86 may compare the second received resonance frequency from thesecond object to determine the second received resonance frequencyconforms to the second stored resonance frequency of the second trustedobject.

At step 712, based on determining the first received resonance frequencyconforms to the first stored resonance frequency of the first trustedobject at step 704 and based on determining the second receivedresonance frequency conforms to the second stored resonance frequency ofthe second trusted object at step 710, the device securing module 88unlocks the mobile device 60.

FIG. 8 depicts an exemplary use scenario in accordance with embodimentsof the invention, wherein multiple devices are placed on a singlesurface at the same location to unlock the multiple devices for aspecific purpose (e.g., file transfer amongst the devices). The scenarioof FIG. 8 may be performed in the environment of FIG. 2. In aspects,based on the mobile devices (60, 92 a, and 92 n) being placed on anobject (i.e., a joint work table 800), the device calibrating module 80of the mobile device 60 synchronizes with the calibrating modules of themobile device 92 a and the mobile device 92 n. In aspects, the devicecalibrating module 80 transmits (e.g., over Bluetooth) synchronizationinformation to the calibrating modules of the mobile device 92 a and themobile device 92 n. In aspects, the synchronization information includestiming data of a time to transmit a tone to the surface of the jointwork table 800.

In aspects, based on transmitting the synchronization information, thedevice calibrating module 80 of the mobile device 60 receivessynchronization response data from the calibrating modules of the mobiledevice 92 a and the mobile device 92 n. The synchronization responsedata includes verification that the synchronization information has beenreceived by the calibrating modules of the mobile device 92 a and themobile device 92 n and acknowledgment that the mobile device 92 a andthe mobile device 92 n will simultaneously transmit the tone to thesurface of the joint work table 800 at a predefined time (e.g., at atime specified by the mobile device 60).

In aspects, based on the receiving the synchronization response data,the mobile devices (60, 92 a, and 92 n) simultaneously transmit a toneto the surface of the joint work table 800. In aspects, based onsimultaneously transmitting the tone, the mobile devices (60, 92 a, and92 n) each receive a compound resonance frequency from the joint worktable 800. In aspects, the compound resonance frequency is a resonancefrequency from an object (i.e., the joint work table 800) when theobject is driven by multiple vibrating devices (i.e., the mobile devices60, 92 a, and 92 n).

In aspects, based on receiving the compound resonance frequency, thecomparing module 86 of each of the mobile devices (60, 92 a, and 92 n)compares the received compound resonance frequency from the joint worktable 800 with the stored compound resonance frequency of a trustedjoint work table. In aspects, based on receiving the compound resonancefrequency from the joint work table 800 conforming to the storedcompound resonance frequency of the trusted joint work table, the devicesecuring module 88 of each of the mobile devices (60, 92 a, and 92 n)unlocks the respective mobile devices (60, 92 a, and 92 n). In aspects,based on unlocking of the mobile devices (60, 92 a, and 92 n), thecalibration module 80 of each of the mobile devices (60, 92 a, and 92 n)transmits a request to establish a group connection between the mobiledevices (60, 92 a, and 92 n) to share information between the mobiledevices (60, 92 a, and 92 n).

FIG. 9 shows a flowchart of steps of a method in accordance with aspectsof the invention. The steps of the method may be performed in the systemof FIG. 2 and are described with reference to the elements and functionsdescribed in FIGS. 2 and 8.

At step 900, the mobile device 60 synchronizes with the mobile device 92a and the mobile device 92 n. In aspects, the device calibrating module80 of the mobile device 60 synchronizes with device calibrating moduleof the mobile device 92 a and the device calibrating module of themobile device 92 n. In aspects, the device calibrating module 80transmits synchronization information to the calibrating modules of themobile devices 92 a and 92 n and receives synchronization response datafrom the calibrating modules of the mobile devices 92 a and 92 n.

At step 902, based on synchronizing of the mobile devices (60, 92 a, and92 n) at step 900, the mobile devices (60, 92 a, and 92 n)simultaneously transmit a tone to a surface of an object. In aspects,based on synchronizing of the mobile devices (60, 92 a, and 92 n) atstep 900, each of the tone transmitting modules (e.g., the transmittingmodule 82 of the mobile device 60) of the mobile devices (60, 92 a, and92 n) simultaneously transmit the tone to the surface of the object.

At step 904, based on simultaneous transmitting the tone at step 902,the mobile device 60 receives a compound resonance frequency (i.e.,frequency response) from the object. In aspects, based on simultaneoustransmitting the tone at step 902, each of the resonance frequencyreceiving modules (e.g., the resonance frequency receiving module 84 ofthe mobile device 60) of the mobile devices (60, 92 a, and 92 n) receivethe compound resonance frequency from the object.

At step 906, based on receiving the compound resonance frequency at step904, the mobile device 60 compares the received compound resonancefrequency of the object to determine the received compound resonancefrequency conforms to a stored compound resonance frequency of a trustedobject. In aspects, based on receiving the compound resonance frequencyat step 904, each of the comparing modules (e.g., the comparing module86 of the mobile device 60) of the mobile devices (60, 92 a, and 92 n)compares the received compound resonance frequency to determine thereceived compound resonance frequency conforms to the stored compoundresonance frequency of the trusted object.

At step 908, based on determining the received compound resonancefrequency conforms to the stored compound resonance frequency at step906, the mobile device 60 unlocks. In aspects, based on determining thereceived compound resonance frequency conforms to the stored compoundresonance frequency at step 906, each of the device securing modules(e.g., the device securing module 88) of the mobile devices (60, 92 a,and 92 n) unlock.

At step 910, based on unlocking the mobile devices (60, 92 a, and 92 n)at step 908, the mobile device 60 transmits a request to establish agroup connection between the mobile devices (60, 92 a, and 92 n). Inaspects, based on unlocking the mobile devices (60, 92 a, and 92 n) atstep 908, each of the device calibrating modules (e.g., the devicecalibrating module 80) of the mobile devices (60, 92 a, and 92 n)transmits a request to each other to establish the group connectionbetween the mobile devices (60, 92 a, and 92 n). In aspects, based onestablishing a connection, the mobile devices (60, 92 a, and 92 n) shareinformation with each other.

FIG. 10 depicts an exemplary use scenario in accordance with embodimentsof the invention, wherein multiple devices are placed on a surface of anobject at different locations. The scenario of FIG. 10 may be performedin the environment of FIG. 2. In this scenario, the mobile devices (60,92 a, and 92 n) are placed on an office table 1000, a home table 1002,and a conference table 1004, respectively. In aspects, the server 70communicates with the mobile devices (60, 92 a, and 92 n) at remotelocations. In aspects, the server 70 receives a request from the mobiledevice 60 to establish a collaborative group communication with themobile device 92 a and the mobile device 92 n. In aspects, the requestincludes the identity of the mobile device 60 making the request and theidentity of the mobile device 92 a and the mobile device 92 n used inthe collaborative group communication. In aspects, based on receivingthe request for establishing the collaborative group communication, theauthenticating module 72 transmits authentication information to themobile devices (60, 92 a, and 92 n) over the network 50. In aspects,based on transmitting authentication information, the authenticatingmodule 72 receives the results of the unlocking of the mobile devices(60, 92 a, and 92 n). In aspects, based on receiving the results of theunlocking, the server 70 establishes group communication between themobile devices (60, 92 a, and 92 n).

FIG. 11 shows a flowchart of steps of a method in accordance withaspects of the invention. The steps of the method may be performed inthe system of FIG. 2 and are described with reference to the elementsand functions described in FIGS. 2 and 10.

At step 1100, the server 70 receives a request from the mobile device 60to establish a collaborative group communication with the mobile device92 a and the mobile device 92 n. At step 1102, based on receiving therequest at step 1100, the authenticating module 72 transmitsauthentication information to the mobile devices (60, 92 a, and 92 n).

At step 1104, based on transmitting authentication information at step1102, the authenticating module 72 receives the results of the unlockingof the mobile devices (60, 92 a, and 92 n). In aspects, the unlocking ofthe mobile devices (60, 92 a, and 92 n) is based on each of the mobiledevices (60, 92 a, and 92 n) transmitting a tone to a surface of theirrespective objects, receiving a resonance frequency from theirrespective objects, and comparing the received resonance frequency theirrespective objects to determine that the received resonance frequencyconforms to a stored resonance frequency of their respective trustedobjects. At step 1106, based on receiving the results of the unlockingat step 1104, the server 70 establishes group communication between themobile devices (60, 92 a, and 92 n).

In embodiments, a service provider could offer to perform the processesdescribed herein. In this case, the service provider can create,maintain, deploy, support, etc., the computer infrastructure thatperforms the process steps of the invention for one or more customers.These customers may be, for example, any business that requires mobiledevice security. In return, the service provider can receive paymentfrom the customer(s) under a subscription and/or fee agreement and/orthe service provider can receive payment from the sale of advertisingcontent to one or more third parties.

In still another embodiment, the invention provides acomputer-implemented method. In this case, a computer infrastructure,such as computing system 102 (FIG. 1), can be provided and one or moresystems for performing the processes of the invention can be obtained(e.g., created, purchased, used, modified, etc.) and deployed to thecomputer infrastructure. To this extent, the deployment of a system cancomprise one or more of: (1) installing program code on a computingdevice, such as computing system 102 (as shown in FIG. 1), from acomputer-readable medium; (2) adding one or more computing devices tothe computer infrastructure; and (3) incorporating and/or modifying oneor more existing systems of the computer infrastructure to enable thecomputer infrastructure to perform the processes of the invention.

The descriptions of the various embodiments of the present inventionhave been presented for purposes of illustration, but are not intendedto be exhaustive or limited to the embodiments disclosed. Manymodifications and variations will be apparent to those of ordinary skillin the art without departing from the scope and spirit of the describedembodiments. The terminology used herein was chosen to best explain theprinciples of the embodiments, the practical application or technicalimprovement over technologies found in the marketplace, or to enableothers of ordinary skill in the art to understand the embodimentsdisclosed herein.

What is claimed is:
 1. A computer implemented method, comprising:synchronizing, by a first mobile computer device, with a remote mobilecomputer device; transmitting, by the first mobile computer device, atone to a surface of an object; receiving, by the first mobile computerdevice, a compound resonance frequency from the object based on thetransmitted tone; determining, by the first mobile computer device, thereceived compound resonance frequency conforms to a stored compoundresonance frequency; unlocking, by the first mobile computer device, thefirst mobile computer device based on the determining; and establishing,by the first mobile computer device, a group connection with the remotemobile computer device based on the unlocking.
 2. The method of claim 1,wherein the synchronizing comprises: transmitting synchronizationinformation to the remote mobile computer device; and receivingsynchronization response data from the remote mobile computer devicebased on transmitting the synchronization information.
 3. The method ofclaim 1, wherein the synchronizing comprises: transmittingsynchronization information including timing data of a time to transmita tone to a surface of an object; and receiving synchronization responsedata based on the transmitting synchronization information.
 4. Themethod of claim 1, wherein the compound resonance frequency comprises atemporal period, a transmissibility, and a damping coefficient of thesurface of the object.
 5. The method of claim 1, further comprisinglocking, by the first mobile computer device, the first mobile computerdevice based on determining the received compound resonance frequencydoes not conform to the stored compound resonance frequency.
 6. Themethod of claim 1, wherein the tone comprises one of a pulse of whitenoise and a pulse of a particular frequency.
 7. The method of claim 1,wherein a speaker on the first mobile computer device transmits thetone.
 8. The method of claim 1, wherein a microphone on the first mobilecomputer device receives the compound resonance signal.
 9. The method ofclaim 1, wherein the stored compound resonance frequency is a storedcompound resonance frequency of a trusted object.
 10. The method ofclaim 9, wherein the determining comprises comparing a resonancefrequency, temporal period, transmissibility, and damping coefficient ofthe received compound resonance frequency from the object to the storedresonance frequency, temporal period, transmissibility, and dampingcoefficient of the trusted object.
 11. The method of claim 1, whereinthe unlocking is based on the compound resonance frequency from theobject conforming to the stored compound resonance frequency of atrusted object.
 12. A computer implemented method, comprising:synchronizing, by a first mobile computer device, with a remote mobilecomputer device; transmitting, by the first mobile computer device, atone to a surface of an object; receiving, by the first mobile computerdevice, a compound resonance frequency from the object, wherein thecompound resonance frequency is a frequency response of the object whenthe object is driven by the first mobile computer device and the remotemobile computer device; determining, by the first mobile computerdevice, the received compound resonance frequency conforms to a storedcompound resonance frequency; and unlocking, by the first mobilecomputer device, the first mobile computer device based on thedetermining.
 13. The method of claim 12, further comprisingtransmitting, by the first mobile computer device and based on theunlocking, a request to establish a group connection with the remotemobile computer device.