Restricting access to a device

ABSTRACT

A computer system detects that a mobile device of a user is in a location that exceeds a threshold distance from a second device of the user. Based on at least the detecting, the computer system switches the mobile device to stealth mode, wherein switching the mobile device to stealth mode includes determining an image that visually matches a surface directly below the mobile device, and displaying the image on at least one display of the mobile device. The computer system determines that the second device of the user is located within the threshold distance of the mobile device. Based on the determining, the computer system initiates one or more actions to alert the user as to the location of the mobile device.

CROSS REFERENCED TO RELATED APPLICATIONS

This continuation patent application claims priority to and the benefitof U.S. patent application Ser. No. 15/390,032, filed Dec. 23, 2016, andissued on Jul. 17, 2018 as U.S. Pat. No. 10,025,958, the contents ofwhich are incorporated by reference in its entirety.

TECHNICAL FIELD

The present disclosure relates generally to mobile devices, and moreparticularly to restricting access to a mobile device.

BACKGROUND

Everyone loses his or her phone at some point in their lives and it canbe a real headache. New technologies such as smartphone trackingtechnologies that utilize a geolocation module in the phone can helpease the burden of locating the phone. However, these mechanisms do notaddress the potential for theft of a misplaced phone or mobile device.There is a lack of a theft deterrent system for misplaced mobiledevices.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a stealth system, in accordance with an embodiment.

FIG. 2 is a flowchart illustrating the operations of the stealth programof FIG. 1 in switching a mobile device to stealth mode based ondetermining that the mobile device is lost, in accordance with anembodiment.

FIG. 3 is a flowchart illustrating the operations of the stealth programof FIG. 1 in determining whether to provide a user with limited accessto the mobile device, in accordance with an embodiment.

FIG. 4 illustrates the mobile device of FIG. 1 in stealth mode, inaccordance with an embodiment.

FIG. 5 is a block diagram depicting the hardware components of thestealth system of FIG. 1, in accordance with an embodiment.

DETAILED DESCRIPTION

Embodiments of the present disclosure provide a system, method, andprogram product. A computer system detects that a mobile device of auser is in a location that exceeds a threshold distance from a seconddevice of the user. Based on the computer system detecting that themobile device of the user is in a location that exceeds the thresholddistance from the second device of the user, the computer systemswitches the mobile device to stealth mode, wherein switching the mobiledevice to stealth mode includes determining an image that visuallymatches a surface directly below the mobile device, and displaying theimage on at least one display of the mobile device. The computer systemdetermines that the second device of the user is located within thethreshold distance of the mobile device. Based on determining that thesecond device of the user is located within the threshold distance ofthe mobile device, the computer system initiates one or more actions toalert the user as to the location of the mobile device.

In the example embodiment, the present disclosure describes a solution asolution to the problem to deterring a person from finding and utilizinga misplaced or lost mobile device or phone. This solution can be usefulin keeping personal and private information that is stored on a person'smobile device from being accessed by another person. In the exampleembodiment, once a mobile device detects that it is “lost”, the devicegoes into a stealth mode, which includes mimicking the environment thatthe mobile device is located in to prevent other people from seeing thephone and also preventing other people from gaining access to the phoneor certain features of the phone. The determination and utilization ofstealth mode is described in further detail below.

Embodiments of the present disclosure will now be described in detailwith reference to the accompanying Figures.

FIG. 1 illustrates stealth system 100, in accordance with an embodiment.In an example embodiment, stealth system 100 includes mobile device 110and computing device 120 interconnected via network 130.

In the example embodiment, network 130 is the Internet, representing aworldwide collection of networks and gateways to support communicationsbetween devices connected to the Internet. Network 130 may include, forexample, wired, wireless or fiber optic connections. In otherembodiments, network 130 may be implemented as an intranet, a local areanetwork (LAN), or a wide area network (WAN). In general, network 130 canbe any combination of connections and protocols that will supportcommunications between mobile device 110 and computing device 120.

In the example embodiment, computing device 120 is a computing devicecapable of receiving and sending data to and from other computingdevices, such as mobile device 110, via a network, such as network 130.For example, computing device 120 may be a desktop computer, a laptopcomputer, a tablet computer, a handheld device, a smart-phone, a thinclient, or any other electronic device or computing system capable ofreceiving and sending data to and from other computing devices.Computing device 120 is described in more detail with reference to FIG.5.

Mobile device 110 includes stealth program 112 and user database 114. Inthe example embodiment, mobile device 110 is a mobile device such as asmartphone, however in other embodiments, mobile device 110 may be adesktop computer, a laptop computer, a tablet computer, a handhelddevice, a thin client, or any other electronic device or computingsystem capable of receiving and sending data to and from other computingdevices, such as computing device 120, via network 130. Furthermore, inthe example embodiment, mobile device 110 has a display screen on thefront of the device and on the back of the device. Furthermore, in theexample embodiment, mobile device 110 has a camera on the front of thedevice and the back of the device. In other embodiments, mobile device110 has a display screen on one side of the device (front or back) and acamera on one side of the device (front or back). In furtherembodiments, mobile device 110 may have more than two screens (andcameras), for example, if mobile device 110 is shaped as a cube, eachside may have a display screen and a camera. Mobile device 110 isdescribed in more detail with reference to FIG. 5.

User Database 114 includes a description of one or more users. In theexample embodiment, the one or more users may include friends and familyof the user of mobile device 110. In other embodiments, the one or moreusers may include acquaintances, and even users not directly known bythe user of mobile device 110. Furthermore, the description of the oneor more users may include a name, an image/photograph of the user (ormultiple images/photographs), a driver's license number, an address, aphone number, a voice recording and additional identificationinformation. In one embodiment, the user of mobile device 110 may inputbasic identification information such as a name and an address, andstealth program 112 may obtain additional information such asphotographs and a driver's license number from external sources (such asa social media, and a DMV database, respectively) via network 130. Userdatabase 114 additionally includes information associated with an amountof access each of the one or more users is allotted. In the example,embodiment, the user of mobile device 110 inputs the informationpertaining the amount of access each of the one or more users isallotted, however, in other embodiments, the information may be input byanother party. Furthermore, the amount of access may be determined basedon the category that each of the one or more users belongs to.

In the example embodiment, stealth program 112 is a program capable ofdetermining whether mobile device 110 is more than a threshold distancefrom a second device of the user (computing device 120) by communicatingwith computing device 120 via network 130. Furthermore, stealth program112 is capable of utilizing an accelerometer on mobile device 110 todetermine to determine whether the mobile device 110 has been dropped,and further taking pictures of an area (surface) that mobile device 110lands on. In addition, stealth program 112 is capable of switching on“stealth mode” based on determining that mobile device 110 is more thana threshold distance from computing device 120. In the exampleembodiment, stealth program 112 is also capable of determining whethermobile device 110 has been picked up by a user, determining who the useris, and providing a specific amount of access based on identification ofthe user. The operations of stealth program 112 are described in furtherdetail with reference to FIGS. 2 and 3.

FIG. 2 is a flowchart illustrating the operations of stealth program 112in switching mobile device 110 to stealth mode based on determining thatmobile device 110 is lost, in accordance with an embodiment.

In the example embodiment, stealth program 112 determines if mobiledevice 110 is lost (decision 202). In the example embodiment, stealthprogram 112 determines if mobile device 110 is within a thresholddistance of computing device 120, which is a secondary device of theuser of mobile device 110. If stealth program 112 determines that mobiledevice 110 is in a location that is more than the threshold distanceaway from computing device 120, stealth program 112 determines thatmobile device 110 is lost. If stealth program 112 determines that mobiledevice 110 is in a location that is less than a threshold distance awayfrom computing device 120, stealth program 112 determines that mobiledevice 110 is not lost.

In another embodiment, stealth program 112 utilizes an accelerometerpresent on the mobile device 110 to determine that mobile device 110 isin the process of falling. Furthermore, stealth program 112 utilizes acamera present on mobile device 110 to capture images (and possiblyvideo) of the environment in which mobile device 110 is falling into.For example, as mobile device 110 is falling, stealth program 112communicates with the accelerometer to determine that mobile device 110is in the process of falling. Stealth program 112 then utilizes thecamera on mobile device 110 to capture images of the environment andsurface towards which mobile device 110 is falling towards. Based onstealth program 112 determining that mobile device 110 has fallen,stealth program 112 then determines if mobile device 110 is in alocation that is more than the threshold distance away from computingdevice 120. As stated above, if stealth program 112 determines thatmobile device 110 is in a location that is more than the thresholddistance away from computing device 120, stealth program 112 determinesthat mobile device 110 is lost. If stealth program 112 determines thatmobile device 110 is in a location that is less than a thresholddistance away from computing device 120, stealth program 112 determinesthat mobile device 110 is not lost.

If stealth program 112 determines that mobile device 110 is not lost(decision 202, “NO” branch), stealth program 112 continues to monitorthe distance of mobile device 110 from computing device 120. If stealthprogram 112 determines that mobile device 110 is lost (decision 202,“YES” branch), stealth program 112 switches mobile device 110 to stealthmode (step 204). In the example embodiment, stealth mode involvesstealth program 112 displaying an image on the display of mobile device110 to match the surface below mobile device 110. Therefore, if a personwere to look at mobile device 110 from an aerial view, mobile device 110would blend in with the surrounding surface. In the example embodiment,stealth program 112 utilizes a global positioning system (GPS) module onmobile device 110 to determine the location of mobile device 110.Stealth program 112 then retrieves satellite images from a map or GPSapplication via network 130 corresponding to the determined location. Inthe other embodiment, where stealth program 112 utilized a camerapresent on mobile device 110 to capture images (and possibly video) ofthe environment in which mobile device 110 fell into, stealth programmay display an image from the captured images on the display of mobiledevice 110 so that mobile device 110 would blend in with the surroundingsurfaces. For example, if mobile device 110 fell onto a carpet, stealthprogram 112 would capture images of the carpet during the process offalling, and stealth program 112 would display an image matching thecarpet pattern on the display of mobile device 110 in order to makemobile device 110 blend into the pattern of the carpet. Furthermore,stealth program 112 may utilize a clock present on mobile device 110 todetermine the amount of time that passes from when the image(s) iscaptured until mobile device 110 makes contact with the surface.Utilizing this information, stealth program 112 utilizes geometrictechniques to determine the distance mobile device 110 was from thesurface when the image was captured, and resizes the image in order tomatch the pattern of the surface. Additionally, stealth program 112utilizes the accelerometer on mobile device 110 to determine anorientation of mobile device 110 in order to determine whether todisplay the captured image on the front display or the back display.Stealth program 112 then displays the image on one of the front or backdisplay based on the determined orientation. In other embodiments,stealth program 112 may display the image on the front display and theback display.

Stealth program 112 determines whether the secondary device of the user(computing device 120) is within a first threshold distance of mobiledevice 110 (decision 206). In the example embodiment, the firstthreshold distance in this step is the same threshold distance utilizedin determining whether mobile device 110 was lost. In other embodiments,the first threshold distance in this step may be a different thresholddistance from the threshold distance utilized in determining whethermobile device 110 was lost. If stealth program 112 determines thatcomputing device 120 is not within the first threshold distance ofmobile device 110 (decision 206, “NO” branch), stealth program 112continues in stealth mode (step 208).

If stealth program 112 determines that computing device 120 is withinthe first threshold distance of mobile device 110 (decision 206, “YES”branch), stealth program 112 initiates actions to help the user ofmobile device 110 locate mobile device 110 (step 210). In the exampleembodiment, stealth program 112 may initiate actions including playingmusic (or other types of auditory stimuli), changing the display to aflashing light, transmitting location information to computing device120 (such as coordinates), transmitting the captured images to computingdevice 120. Furthermore, stealth program 112 may further change theactions based on whether computing device 120 is detected as movingcloser or further away from mobile device 110. For example, stealthprogram 112 may auditorily state the distance that computing device 120is from mobile device 110, and update the distance as computing device120 moves closer or further away from mobile device 110. In anotherexample, stealth program 112 may only transmit the location informationof mobile device 110 (and/or captured images) to computing device 120until computing device 120 comes within a second threshold distance, atwhich point, stealth program 112 may initiate auditory and visualactions (such as playing a siren/music/distance and flashing). In thisembodiment, the second threshold distance is a smaller distance than thefirst threshold distance. This embodiment further prevents anotherperson from locating and stealing the phone prior to the user of mobiledevice 110 locating it.

FIG. 3 is a flowchart illustrating the operations of stealth program 112in determining whether to provide a user with limited access to themobile device, in accordance with an embodiment.

In the example embodiment, stealth program 112 determines if mobiledevice 110 is lost (decision 302). In the example embodiment, stealthprogram 112 determines if mobile device 110 is within a thresholddistance of computing device 120, which is a secondary device of theuser of mobile device 110. If stealth program 112 determines that mobiledevice 110 is in a location that is more than the threshold distanceaway from computing device 120, stealth program 112 determines thatmobile device 110 is lost. If stealth program 112 determines that mobiledevice 110 is in a location that is less than a threshold distance awayfrom computing device 120, stealth program 112 determines that mobiledevice 110 is not lost.

In another embodiment, stealth program 112 utilizes an accelerometerpresent on the mobile device 110 to determine that mobile device 110 isin the process of falling. Furthermore, stealth program 112 utilizes acamera present on mobile device 110 to capture images (and possiblyvideo) of the environment in which mobile device 110 is falling into.For example, as mobile device 110 is falling, stealth program 112communicates with the accelerometer to determine that mobile device 110is in the process of falling. Stealth program 112 then utilizes thecamera on mobile device 110 to capture images of the environment andsurface towards which mobile device 110 is falling towards. Based onstealth program 112 determining that mobile device 110 has fallen,stealth program 112 then determines if mobile device 110 is in alocation that is more than the threshold distance away from computingdevice 120. As stated above, if stealth program 112 determines thatmobile device 110 is in a location that is more than the thresholddistance away from computing device 120, stealth program 112 determinesthat mobile device 110 is lost. If stealth program 112 determines thatmobile device 110 is in a location that is less than a thresholddistance away from computing device 120, stealth program 112 determinesthat mobile device 110 is not lost.

In a further embodiment, stealth program 112 determines if mobile device110 is in a designated “safe space”. In the example embodiment, thelocation of “safe spaces”, such as coordinate or GPS locations may beinput by the user of mobile device 110 and stored on user preferenceslocated on mobile device 110. In this embodiment, stealth program 112may determine if mobile device 110 is in the process of falling in asimilar manner as described above. Stealth program 112 may then comparethe location of mobile device 110 to the location informationcorresponding to the designated “safe spaces”. If stealth program 112determines that the location of mobile device 110 is within a “safespace”, stealth program 112 may determine that mobile device 110 is notlost. If stealth program 112 determines that the location of mobiledevice 110 is not within a “safe space”, stealth program 112 maydetermine that mobile device 110 is lost.

If stealth program 112 determines that mobile device 110 is not lost(decision 302, “NO” branch), stealth program 112 continues to monitorthe distance of mobile device 110 from computing device 120.Furthermore, if stealth program 112 determines that mobile device 110 isnot lost, stealth program 112 may maintain normal functionality ofmobile device 110. If stealth program 112 determines that mobile device110 is lost (decision 302, “YES” branch), stealth program 112 switchesmobile device 110 to stealth mode (step 304). In the example embodiment,stealth mode involves stealth program 112 displaying an image on thedisplay of mobile device 110 to match the surface below mobile device110. Therefore, if a person were to look at mobile device 110 from anaerial view, mobile device 110 would blend in with the surroundingsurface. In the example embodiment, stealth program 112 utilizes aglobal positioning system (GPS) module on mobile device 110 to determinethe location of mobile device 110. Stealth program 112 then retrievessatellite images from a map or GPS application via network 130corresponding to the determined location. In the other embodiment, wherestealth program 112 utilized a camera present on mobile device 110 tocapture images (and possibly video) of the environment in which mobiledevice 110 fell into, stealth program may display an image from thecaptured images on the display of mobile device 110 so that mobiledevice 110 would blend in with the surrounding surfaces. For example, ifmobile device 110 fell onto a carpet, stealth program 112 would captureimages of the carpet during the process of falling, and stealth program112 would display an image matching the carpet pattern on the display ofmobile device 110 in order to make mobile device 110 blend into thepattern of the carpet. Additionally, stealth program 112 utilizes theaccelerometer on mobile device 110 to determine an orientation of mobiledevice 110 in order to determine whether to display the captured imageon the front display or the back display. Stealth program 112 thendisplays the image on one of the front or back display based on thedetermined orientation. In other embodiments, stealth program 112 maydisplay the image on the front display and the back display.

Stealth program 112 determines that a user is attempting to utilizemobile device 110 (step 306). In the example embodiment, stealth program112 determines that a user is attempting to utilize mobile device 110 byutilizing the accelerometer on mobile device 110 to determine thatmobile device 110 has been picked up. In another embodiment, stealthprogram 112 may utilize a camera on mobile device 110 to determine thata user is looking at mobile device 110. In this embodiment, stealthprogram 112 may track the eye movement of the user and utilize geometrictechniques to determine that the view direction of the user is towardsmobile device 110. In further embodiments, stealth program 112 mayutilize haptic sensors or audio sensors present on mobile device 110 todetermine that mobile device 110 has been picked up. For example,stealth program 112 may utilize haptic sensors to determine that a useris making contact with mobile device 110 and is therefore attempting toutilize mobile device 110. In another example, stealth program 112 mayutilize audio sensors to capture a sound recording. Stealth program 112may then utilize natural language processing techniques to determinewhether the sound recording includes any speech discussing mobile device110. For example, if stealth program 112 determines that the soundrecording states “look a phone”, stealth program may determine that auser is attempting to utilize mobile device 110.

Stealth program 112 determines whether the user attempting to utilizemobile device 110 is a known user (decision 308). In the exampleembodiment, stealth program 112 determines whether the user attemptingto utilize mobile device 110 is a known user by utilizing the camera onmobile device 110 to view the user and/or capture an image(s) of theuser. In the example embodiment, stealth program 112 views the userand/or captures an image(s) of the user without alerting the user thathe/she is being monitored. For example, the images may be capturedwithout the use of flash, without any noise being made, and withoutanything being shown on the display (or any other visual/audio/hapticcues). Stealth program 112 then utilizes facial recognition technologyto cross-reference the image of the user attempting to utilize mobiledevice 110 with user database 114 to determine if an image of the one ormore users in user database 114 corresponds to the image of the userattempting to utilize mobile device 110. In the example embodiment, animage of the one or more users in user database 114 corresponds to theimage of the user attempting to utilize mobile device 110 if the facesin the images share a threshold amount of features as determined by theutilized facial recognition techniques. If stealth program 112determines that an image of the one or more users in user database 114corresponds to the image of the user attempting to utilize mobile device110, stealth program determines that the user attempting to utilizemobile device 110 is a known user. Additionally or alternatively,stealth program 112 may utilize a microphone on mobile device 110 tocapture a voice recording of the voice of the user attempting to utilizemobile device 110. Stealth program 112 may then utilize voicerecognition technology to cross-reference the captured voice recordingwith user database 114 in order to determine if the user attempting toutilize mobile device 110 corresponds to a user of the one or moreusers. For example, if stealth program 112 utilizes voice recognitiontechnology and determines that the voice recording matches a voicerecording associated with the one or more users in user database 114,stealth program 112 determines that the user attempting to utilizemobile device 110 is a known user. In other embodiments, additionalinformation may be identified and cross-referenced with user database114 in order to determine if the user attempting to utilize mobiledevice 110 is a known user, such as a passport number, a driver'slicense (and/or driver's license number), or an alternative form ofidentification.

If stealth program 112 determines that the user attempting to utilizemobile device 110 is not a known user (decision 308, “NO” branch),stealth program 112 continues to keep mobile device 110 in stealth mode(step 310). In other embodiments, stealth program 112 may additionallyperform a memory wipe of mobile device 110, or alternatively deletefiles designated as private or confidential by the user of mobile device110. In further embodiments, stealth program 112 may provide limitedaccess to the unknown user, such as access to make a phone call to theowner of mobile device 110 (the user of mobile device 110) or a contacton a contact list input by the user of mobile device 110 (such as afriend or family member).

If stealth program 112 determines that the user attempting to utilizemobile device 110 is a known user (decision 308, “YES” branch), stealthprogram 112 provides limited access based on the preferences associatedwith the known user in user database 114 (step 312). In the exampleembodiment, as stated above, user database 114 includes informationdetailing an amount of access each of the one or more users is to beallotted, and therefore, stealth program 112 references user database114 to identify the amount of access the known user is to be allotted.In other embodiments, as stated above, stealth program 112 may determinethe amount of access based on the category that each of the one or moreusers belongs to. For example, an immediate family member may beallotted a first amount of access, a friend in friend circle 1 may beallotted a second amount of access (that may be less than the firstamount of access), and a friend in friend circle 2 may be allotted athird amount of access (that may be less than the second amount ofaccess). In this embodiment, stealth program 112 may determine whichcategory the known user belongs to based on communicating with socialnetworks to determine if the user is designated as a family member, as afriend from friend circle 1, or a friend from friend circle 2. Forexample, if stealth program 112 determines that the known user is afamily member, then stealth program 112 may provide the known user withthe first amount of access that may include access to certainapplications, and calling/text features, but not include access toadditional applications on mobile device 110.

In further embodiments, stealth program 112 may sort users based on anamount of communication that each of the one or more users has had withthe user of mobile device 110 over a certain period of time. Forexample, stealth program 112 may identify the amount of communicationbetween the user of mobile device 110 and a user of the one or moreusers based on an amount of text messages, an amount of phone calls (andthe length of the phone calls), an amount of social media messages, afrequency of text messages/phone calls/social media messages, andadditional electronic communication between the user of mobile device110 and the respective user of the one or more users. Stealth program112 then provides the determined amount of access to the known user.

In an additional embodiment, information corresponding to the user ofmobile device 110 may also be included in user database 114. In thisadditional embodiment, stealth program 112 may determine that the userattempting to utilize mobile device 110 is the user of mobile device 110in the same manner as described above. For example, an image of the userof mobile device 110 may be captured when mobile device 110 is picked upand cross-referenced with user database 114 to determine if the user ofmobile device 110 is a known user. In an additional example, athumbprint of the user of mobile device 110 may be cross-referenced witha thumbprint of the user of mobile device 110 stored in user database114 in order to determine the identity of the user of mobile device 110.Once stealth program 112 identifies the user of mobile device 110,stealth program 112 may turn off stealth mode and restore fullfunctionality of mobile device 110.

FIG. 4 illustrates mobile device 110 in stealth mode, in accordance withan embodiment. In the example embodiment, environment 402 represents theenvironment that mobile device 110 is located in. As stated above, inthe example embodiment, if stealth program 112 determines that mobiledevice 110 is lost, as described above, stealth program switches mobiledevice 110 in stealth mode. Representation 404 is a depiction of mobiledevice 110 after stealth program 112 has switched to stealth mode. Theimage displayed in representation 404 of mobile device 110 matches thepattern of environment 402.

The foregoing description of various embodiments of the presentdisclosure has been presented for purposes of illustration anddescription. It is not intended to be exhaustive nor to limit thedisclosure to the precise form disclosed. Many modifications andvariations are possible. Such modifications and variations that may beapparent to a person skilled in the art of the disclosure are intendedto be included within the scope of the disclosure as defined by theaccompanying claims.

FIG. 5 depicts a block diagram of components of computing devicescontained in stealth system 100 of FIG. 1, in accordance with anembodiment. It should be appreciated that FIG. 5 provides only anillustration of one implementation and does not imply any limitationswith regard to the environments in which different embodiments may beimplemented. Many modifications to the depicted environment may be made.

Computing devices may include one or more processors 502, one or morecomputer-readable RAMs 504, one or more computer-readable ROMs 506, oneor more computer readable storage media 508, device drivers 512,read/write drive or interface 514, network adapter or interface 516, allinterconnected over a communications fabric 518. Communications fabric518 may be implemented with any architecture designed for passing dataand/or control information between processors (such as microprocessors,communications and network processors, etc.), system memory, peripheraldevices, and any other hardware components within a system.

One or more operating systems 510, and one or more application programs511, for example, stealth program 112, are stored on one or more of thecomputer readable storage media 508 for execution by one or more of theprocessors 502 via one or more of the respective RAMs 504 (whichtypically include cache memory). In the illustrated embodiment, each ofthe computer readable storage media 508 may be a magnetic disk storagedevice of an internal hard drive, CD-ROM, DVD, memory stick, magnetictape, magnetic disk, optical disk, a semiconductor storage device suchas RAM, ROM, EPROM, flash memory or any other computer-readable tangiblestorage device that can store a computer program and digitalinformation.

Computing devices may also include a R/W drive or interface 514 to readfrom and write to one or more portable computer readable storage media526. Application programs 511 on the computing devices may be stored onone or more of the portable computer readable storage media 526, readvia the respective R/W drive or interface 514 and loaded into therespective computer readable storage media 508.

Computing devices may also include a network adapter or interface 516,such as a TCP/IP adapter card or wireless communication adapter (such asa 4G wireless communication adapter using OFDMA technology). Applicationprograms 511 on the computing devices may be downloaded to the computingdevices from an external computer or external storage device via anetwork (for example, the Internet, a local area network or other widearea network or wireless network) and network adapter or interface 516.From the network adapter or interface 516, the programs may be loadedonto computer readable storage media 508. The network may comprisecopper wires, optical fibers, wireless transmission, routers, firewalls,switches, gateway computers and/or edge servers.

Computing devices may also include a display screen 520, and externaldevices 522, which may include, for example a keyboard, a computer mouseand/or touchpad. Device drivers 512 interface to display screen 520 forimaging, to external devices 522, and/or to display screen 520 forpressure sensing of alphanumeric character entry and user selections.The device drivers 512, R/W drive or interface 514 and network adapteror interface 516 may comprise hardware and software (stored on computerreadable storage media 508 and/or ROM 506).

The programs described herein are identified based upon the applicationfor which they are implemented in a specific embodiment. However, itshould be appreciated that any particular program nomenclature herein isused merely for convenience, and thus the disclosure should not belimited to use solely in any specific application identified and/orimplied by such nomenclature.

Based on the foregoing, a computer system, method, and computer programproduct have been disclosed. However, numerous modifications andsubstitutions can be made without deviating from the scope of thepresent disclosure. Therefore, the various embodiments have beendisclosed by way of example and not limitation.

Various embodiments of the present disclosure may be a system, a method,and/or a computer program product. The computer program product mayinclude a computer readable storage medium (or media) having computerreadable program instructions thereon for causing a processor to carryout aspects of the present disclosure.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present disclosure may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, configuration data for integrated circuitry, oreither source code or object code written in any combination of one ormore programming languages, including an object oriented programminglanguage such as Smalltalk, C++, or the like, and procedural programminglanguages, such as the “C” programming language or similar programminglanguages. The computer readable program instructions may executeentirely on the user's computer, partly on the user's computer, as astand-alone software package, partly on the user's computer and partlyon a remote computer or entirely on the remote computer or server. Inthe latter scenario, the remote computer may be connected to the user'scomputer through any type of network, including a local area network(LAN) or a wide area network (WAN), or the connection may be made to anexternal computer (for example, through the Internet using an InternetService Provider). In some embodiments, electronic circuitry including,for example, programmable logic circuitry, field-programmable gatearrays (FPGA), or programmable logic arrays (PLA) may execute thecomputer readable program instructions by utilizing state information ofthe computer readable program instructions to personalize the electroniccircuitry, in order to perform aspects of the present disclosure.

Aspects of the present disclosure are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of thedisclosure. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present disclosure. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the blocks may occur out of theorder noted in the Figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

1. (canceled)
 2. A system comprising: one or more computer-readablememories storing program instructions; and one or more processorsconfigured to execute the program instructions to cause the system toperform operations comprising: determining that a first mobile device,associated with a first user, is in the process of falling or has fallenduring a first time period; in response to the determining that thefirst mobile device is in the process of falling or has fallen during afirst time period, determining if the first mobile device is locatedwithin a safe space; and in response to determining that the firstmobile device is not located within the safe space, switching the firstmobile device to stealth mode, wherein switching the first mobile deviceto stealth mode includes determining an image that visually matches atleast a portion of a surface that is underneath the first mobile device,and displaying the image on at least one display of the first mobiledevice.
 3. The system of claim 2, the operations further comprising: inresponse to determining, at a later time period, that the first mobiledevice is located within the safe space, switching the first mobiledevice from stealth mode to a normal operating mode.
 4. The system ofclaim 2, wherein the safe space is a location designated by the firstuser.
 5. The system of claim 2, the operations further comprising: inresponse to determining that the first mobile device has been picked upby a second user, deleting one or more files from the first mobiledevice.
 6. The system of claim 5, wherein the determining that the firstmobile device has been picked up by the second user includes:determining that a second mobile device of the first user is outside ofa threshold distance of the first mobile device.
 7. The system of claim2, the operations further comprising: in response to determining thatthe first mobile device has been picked up by a second user, determiningif the second user is a known user; and in response to determining thatthe second user is a known user, providing limited access to the firstmobile device.
 8. The system of claim 7, wherein determining if thesecond user is a known user includes: capturing an image of the seconduser; and cross-referencing the image with a database containing aplurality of images to identify if the image corresponds to one of theplurality of images.
 9. A method comprising: determining that a firstmobile device, associated with a first user, is in the process offalling or has fallen during a first time period; in response to thedetermining that the first mobile device is in the process of falling orhas fallen during a first time period, determining if the first mobiledevice is located within a safe space; and in response to determiningthat the first mobile device is not located within the safe space,switching the first mobile device to stealth mode, wherein switching thefirst mobile device to stealth mode includes determining an image thatvisually matches at least a portion of a surface that is underneath thefirst mobile device, and displaying the image on at least one display ofthe first mobile device.
 10. The method of claim 9, further comprising:in response to determining, at a later time period, that the firstmobile device is located within the safe space, switching the firstmobile device from stealth mode to a normal operating mode.
 11. Themethod of claim 9, wherein the safe space is a location designated bythe first user.
 12. The method of claim 9, further comprising: inresponse to determining that the first mobile device has been picked upby a second user, deleting one or more files from the first mobiledevice.
 13. The method of claim 12, wherein the determining that thefirst mobile device has been picked up by the second user includes:determining that a second mobile device of the first user is outside ofa threshold distance of the first mobile device.
 14. The method of claim9, further comprising: in response to determining that the first mobiledevice has been picked up by a second user, determining if the seconduser is a known user; and in response to determining that the seconduser is a known user, providing limited access to the first mobiledevice.
 15. The method of claim 14, wherein the determining if thesecond user is a known user includes: capturing an image of the seconduser; and cross-referencing the image with a database containing aplurality of images to identify if the image corresponds to one of theplurality of images.
 16. A non-transitory computer readable mediumstoring program instructions, the program instructions when executedcause a machine to perform operations comprising: determining that afirst mobile device, associated with a first user, is in the process offalling or has fallen during a first time period; in response to thedetermining that the first mobile device is in the process of falling orhas fallen during a first time period, determining if the first mobiledevice is located within a safe space; and in response to determiningthat the first mobile device is not located within the safe space,switching the first mobile device to stealth mode, wherein switching thefirst mobile device to stealth mode includes determining an image thatvisually matches at least a portion of a surface that is underneath thefirst mobile device, and displaying the image on at least one display ofthe first mobile device.
 17. The non-transitory computer readable mediumof claim 16, the operations further comprising: in response todetermining, at a later time period, that the first mobile device islocated within the safe space, switching the first mobile device fromstealth mode to a normal operating mode.
 18. The non-transitory computerreadable medium of claim 16, wherein the safe space is a locationdesignated by the first user.
 19. The non-transitory computer readablemedium of claim 16, the operations further comprising: in response todetermining that the first mobile device has been picked up by a seconduser, determining if the second user is a known user; and in response todetermining that the second user is a known user, providing limitedaccess to the first mobile device.
 20. The non-transitory computerreadable medium of claim 19, wherein the determining that the firstmobile device has been picked up by the second user includes:determining that a second mobile device of the first user is outside ofa threshold distance of the first mobile device.
 21. The non-transitorycomputer readable medium of claim 20, wherein determining if the seconduser is a known user includes: capturing an image of the second user;and cross-referencing the image with a database containing a pluralityof images to identify if the image corresponds to one of the pluralityof images.