User identification in cell phones based on skin contact

ABSTRACT

Screen time-outs on a portable electronic device can be customized based on user activity. In one aspect, a sensing component receives data from one or more sensors located on the portable electronic device, for example, skin conductivity sensors and determines whether the user is using the portable device, either actively or passively and also determines the identity of the user. A configuring component is employed to change one or more features or functions of the portable electronic device based on the information determined by the sensing component. In particular, the configuring component changes one of more features of the portable electronic device based on the preferences predefined by the identified user and device usage (active and passive usage).

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of, and claims the benefit ofpriority to each of, U.S. patent application Ser. No. 14/989,092,entitled “USER IDENTIFICATION IN CELL PHONES BASED ON SKIN CONTACT,”filed on Jan. 6, 2016, which is a continuation of U.S. patentapplication Ser. No. 14/538,745 (now U.S. Pat. No. 9,264,903), entitled“USER IDENTIFICATION IN CELL PHONES BASED ON SKIN CONTACT,” filed onNov. 11, 2014, which is a continuation of U.S. patent application Ser.No. 12/205,430 (now U.S. Pat. No. 8,913,991), entitled “USERIDENTIFICATION IN CELL PHONES BASED ON SKIN CONTACT,” filed on Sep. 5,2008, which is a continuation-in-part of U.S. patent application Ser.No. 12/192,656, filed on Aug. 15, 2008, entitled “CELLPHONE DISPLAYTIME-OUT BASED ON SKIN CONTACT” (now abandoned). The entireties of eachof the above noted applications are incorporated herein by reference.

BACKGROUND

Mobile communication technology is rapidly advancing the exchange ofinformation between users and systems. The user is no longer tied to astationary device such as a personal computer in order to communicatewith another user, listen to music, or watch a video. Further, portablephones (and other portable devices) can be utilized as full-servicecomputing machines. For example, many of the most recent and advancedmobile phones can be associated with word processing software,accounting software, and various other types of software. Portablewireless devices such as cell phones and PDAs (personal digitalassistants), example, employ various power management techniques toextend battery life and support additional computations.

In particular, portable wireless devices, such as cell phones, remainswitched on most of the time, such that, they can receive incoming callsat any time and the desire for longer operational time periods betweenbattery recharge cycles has increased. With advances in portable devicetechnology, newer devices are substantially smaller, but stillincorporate additional features and functions that consume more batterypower. Although new battery technologies, for example lithium-ionbatteries, that are being employed improve the battery life, consumerdemand for longer life batteries is on the increase.

Conventionally, techniques for extending mobile device battery lifeinclude entering a sleep mode if the device is inactive for apredetermined period of time. Most often, conventional systems dim ortime-out display screens to save battery power. However, the screentime-out is based on a fixed setting in the device and/or can be drivenby an off-or-on setting within a software. A few conventional systemsallow a user to enter a user-defined time-out period; however, the userdefined screen time-out is constant and cannot be optimized toefficiently conserve battery power. This leads to user frustration sinceeither the user may be using the phone, actively or passively, evenafter the predefined screen time-out period has elapsed. Further, inmultiuser scenarios, wherein multiple users can utilize the device,power management features cannot be customized for each user.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an example system that can facilitate changing ofsettings on a portable electronic device in an optimal manner, accordingto an aspect of the subject specification.

FIG. 2 illustrates an example system that can be employed to monitorwhether a user is currently employing a portable electronic device inaccordance with the disclosure.

FIG. 3 illustrates an example system that can be employed to identify orverify a user of a portable electronic device, according to an aspect ofsubject disclosure.

FIG. 4 illustrates an example system that can modify one or morefunctions on a portable electronic device in accordance with an aspectof the disclosure.

FIGS. 5A-5C illustrate example views of a portable electronic devicethat can optimize activation of device features based on device usage,according to an aspect of the subject disclosure.

FIG. 6 illustrates an example system that can facilitate automating oneor more features in accordance with the subject disclosure.

FIG. 7 illustrates an example methodology that can be employed to changesettings on an electronic portable device when a user is not touchingthe device in accordance with an aspect of the disclosed subject matter.

FIG. 8 illustrates an example methodology that can be employed to changesettings on an electronic portable device when a user is touching thedevice, according to an aspect of the disclosed subject specification.

FIG. 9 illustrates an example methodology to initiate a screen time-outwhen a user is not using a portable electronic device, according to anaspect of the subject disclosure.

FIG. 10 illustrates an example methodology to restore a display screento its active state when a user is using a portable electronic device inaccordance with an aspect of the subject disclosure.

FIG. 11 is an illustration of an example mobile device that can optimizea change in device settings based on data obtained from touch sensitivesensors, in accordance with an aspect of the system.

FIG. 12 illustrates is a schematic block diagram depicting a suitableoperating environment in accordance with an aspect of the subjectdisclosure.

DETAILED DESCRIPTION

The subject disclosure is now described with reference to the drawings,wherein like reference numerals are used to refer to like elementsthroughout. In the following description, for purposes of explanation,numerous specific details are set forth in order to provide a thoroughunderstanding of the subject disclosure. It may be evident, however,that the subject disclosure may be practiced without these specificdetails. In other instances, well-known structures and devices are shownin block diagram form in order to facilitate describing the subjectdisclosure.

As used in this application, the terms “component,” “module,” “system”,“interface”, or the like are generally intended to refer to acomputer-related entity, either hardware, a combination of hardware andsoftware, software, or software in execution. For example, a componentmay be, but is not limited to being, a process running on a processor, aprocessor, an object, an executable, a thread of execution, a program,and/or a computer. By way of illustration, both an application runningon a controller and the controller can be a component. One or morecomponents may reside within a process and/or thread of execution and acomponent may be localized on one computer and/or distributed betweentwo or more computers. As another example, an interface can include I/Ocomponents as well as associated processor, application, and/or APIcomponents.

Furthermore, the subject disclosure may be implemented as a method,apparatus, or article of manufacture using standard programming and/orengineering techniques to produce software, firmware, hardware, or anycombination thereof to control a computer to implement the disclosedsubject matter. The term “article of manufacture” as used herein isintended to encompass a computer program accessible from anycomputer-readable device, carrier, or media. For example, computerreadable media can include but are not limited to magnetic storagedevices (e.g., hard disk, floppy disk, magnetic strips . . . ), opticaldisks (e.g., compact disk (CD), digital versatile disk (DVD) . . . ),smart cards, and flash memory devices (e.g., card, stick, key drive . .. ). Additionally it should be appreciated that a carrier wave can beemployed to carry computer-readable electronic data such as those usedin transmitting and receiving electronic mail or in accessing a networksuch as the Internet or a local area network (LAN). Of course, thoseskilled in the art will recognize many modifications may be made to thisconfiguration without departing from the scope or spirit of the subjectdisclosure.

Moreover, the word “exemplary” is used herein to mean serving as anexample, instance, or illustration. Any aspect or design describedherein as “exemplary” is not necessarily to be construed as preferred oradvantageous over other aspects or designs. Rather, use of the wordexemplary is intended to present concepts in a concrete fashion. As usedin this application, the term “or” is intended to mean an inclusive “or”rather than an exclusive “or”. That is, unless specified otherwise, orclear from context, “X employs A or B” is intended to mean any of thenatural inclusive permutations. That is, if X employs A; X employs B; orX employs both A and B, then “X employs A or B” is satisfied under anyof the foregoing instances. In addition, the articles “a” and “an” asused in this application and the appended claims should generally beconstrued to mean “one or more” unless specified otherwise or clear fromcontext to be directed to a singular form.

As used herein, the term to “infer” or “inference” refer generally tothe process of reasoning about or inferring states of the system,environment, and/or user from a set of observations as captured viaevents and/or data. Inference can be employed to identify a specificcontext or action, or can generate a probability distribution overstates, for example. The inference can be probabilistic—that is, thecomputation of a probability distribution over states of interest basedon a consideration of data and events. Inference can also refer totechniques employed for composing higher-level events from a set ofevents and/or data. Such inference results in the construction of newevents or actions from a set of observed events and/or stored eventdata, whether or not the events are correlated in close temporalproximity, and whether the events and data come from one or severalevent and data sources.

Inference can also refer to techniques employed for composinghigher-level events from a set of events or data. Such inference canresult in the construction of new events or actions from a set ofobserved events and/or stored event data, whether or not the events arecorrelated in close temporal proximity, and whether the events and datacome from one or several event and data sources. Various classificationschemes and/or systems (for example, support vector machines, neuralnetworks, expert systems, Bayesian belief networks, fuzzy logic, datafusion engines, or other similar systems) can be employed in connectionwith performing automatic and/or inferred actions.

Furthermore, various embodiments are described herein in connection witha mobile device. A mobile device can also be called a system, subscriberunit, subscriber station, mobile station, mobile, remote station, remoteterminal, access terminal, user terminal, terminal, wirelesscommunication device, user agent, user device, or user equipment (UE).The terms “mobile device”, “portable device”, “device” are usedinterchangeably herein and are intended to refer to most any portableelectronic device such as, but not limited to a cellular telephone, acordless telephone, a Session Initiation Protocol (SIP) phone, awireless local loop (WLL) station, a personal digital assistant (PDA), ahandheld device having wireless connection capability, computing device,or other processing device connected to a wireless modem, a mediaplayer, a media recorder, a camera, etc., or a combination thereof.

Conventional systems employ various power management techniques topreserve battery life of portable devices, such as, but not limited tocell phone, music players, cameras, etc. As an example, conventionalsystems dim or time-out display screens on the portable device when thedevice is not in use by employing a fixed time-out period. However, thescreen time-out is not optimized to conserve maximum battery power basedon device usage. Furthermore, screen time-out cannot be customized formultiple users based on user preferences.

Systems and/or methods are presented herein that can efficiently managepower in portable electronic devices and customize power management foreach user, for example, by optimizing screen time-outs. In particular,the system employs skin conductivity sensors to determine if a user istouching the device and identify the user touching the device. Based onthe data from the skin conductivity sensors, the system determineswhether the portable device should be in an active state or an inactivestate and accordingly optimizes screen time-outs.

The systems and methods disclosed herein, in one aspect thereof, canfacilitate optimizing a display screen time-out of a portable electronicdevice based on device usage by a particular user. Touch sensitivesensors, for example, skin conductivity sensors, can be employed todetermine if a user is in contact with the portable electronic device.Further, a sensing component can determine whether the user is currentlyusing the device, either actively or passively. Furthermore, anidentification component can determine the identity of the user usingthe device. Additionally, a configuring component can change one or moredevice functions based on the preferences of the identified user, suchas display screen time-outs, when a user stops using the portableelectronic device. In one aspect, the configuring component can restorethe one or more device functions to their original values when the userstarts using the portable electronic device (either actively orpassively). Moreover, the portable electronic device can identify a userinteracting with the device and optimize the one or more devicefunctions based on user identification.

In accordance with another aspect of the system, a time-out determiningcomponent can be employed to optimize a screen time-out of the portableelectronic device. The time-out determining component can start or stopa screen time-out based on data received from one or more sensors, forexample, skin conductivity sensors, located on the portable electronicdevice. In particular, the time-out determining component can initiate adisplay screen time-out when the user is not using the portable device(actively or passively). Thus, during the time that the user is notemploying the device, the time-out determining component can dim orswitch off a display screen. In addition, when the user starts activelyor passively employing the portable device, the time-out determiningcomponent can switch on the display screen or restore the display screento the original brightness. Further, the time-out settings can becustomized by a user and applied when the particular user employs thedevice.

Another aspect of the subject disclosure comprises a current modedetermining component that can determine a current mode of operation forthe portable electronic device based on the data received from one ormore sensors, for example, skin conductivity sensors. The current modedetermining component can change the current mode of operation of theportable device based on whether the identified user is currentlyutilizing the portable device and/or preferences set by the identifieduser. The utilization of the portable device can be active or passiveand can be determined based in part on the user's contact with theportable electronic device. Thus, the current mode determining componentcan change the current operating mode of the portable device to apreferred mode based on the device usage, without an active indicationfrom the user.

Still another aspect of the system comprises a current settingdetermining component that modifies one or more settings of the portabledevice based on the device usage. It can be appreciated that thesettings are not limited to power saving options but can be a settingfor most any feature of the portable electronic device. Further, thechange in settings can be based on, for example, a predefined userpreference configured via a user input or can be automaticallydetermined by a machine learning technique. Thus, the current settingdetermining component changes settings for one or more features orfunctions of the portable device based in part on whether the user iscurrently using (actively or passively) the portable device. Moreover,each user can predefine the one or more features or functions that canbe changed when determined that the particular user is utilizing theportable device.

Yet another aspect of the disclosed subject matter relates to a methodthat can be employed to change settings on a mobile device based ondevice usage. In one aspect, it can be sensed that skin is no longer intouch with the mobile device and the identity of the user that stoppedtouching the mobile device can be determined. Further, a time-out can bestarted based on the preferences of the identified user, such that adisplay screen on the portable electronic device can be either dimmed orswitched off to conserve battery power. Furthermore, most any powersaving features can be activated based on the time-out. In addition, oneor more settings of the mobile device can be changed based in part onthe user's preferences. In another aspect, it can be sensed that skin innow in contact with the mobile electronic device and the user touchingthe device can be identified. Based on the preferences of the identifieduser, the time-out can be stopped. The display screen on the mobiledevice can be switched on or restored to its original brightness and oneor more settings on the mobile device can be changed or reset to anoriginal value since it is determined that the user is currently usingthe device.

Referring initially to FIG. 1, illustrated is an example system 100 thatcan facilitate a change in settings of a portable electronic device inan optimal manner, according to an aspect of the subject specification.The portable electronic device can be most any mobile device, such as,but not limited to, a cell phone, a media player, a camera, a voicerecorder, a personal digital assistant (PDA), a laptop, etc. The system100 can typically include a sensing component 102 that can be employedto sense when a user is using the portable device and/or identify theuser. As an example, while actively or passively using the portabledevice, a user typically touches the device. Specifically, the user cantouch the keys and/or the display on the portable device and/or hold thedevice while actively or passively using the device. Further, thesensing component 102 can also determine the identity of the usertouching the portable device by employing most any identification and/orverification technique.

The sensing component 102 can receive data from one or more sensors (notshown) on the device that indicates that the device is being touched bythe user. The sensors can employ most any monitoring technique, such as,but not limited to, a skin conductivity sensing technique and/or apressure sensing technique. Based in part on the data received from thesensors, the sensing component 102 can determine whether a user iscurrently using a device or not and identify/verify the user based on ananalysis of the received data. Further, the sensing component 102 cansend this data to a configuring component 104. Typically, users hold theportable device in their hands while actively or passively using thedevice. As an example, if a user is actively using a cellular phone, theuser can press input keys, touch display touch screens, utilize rockercontrols and/or click wheels. Further, if a user is passively using acellular phone, for example, while watching a video, reading text, orwaiting for an instant message (IM) to arrive, the user typically restshis/her fingers on the keys or anywhere on the phone. However, if theuser is not using the cellular phone, he/she will place the phone, forexample, in a pocket, holster or on a table etc. Thus, the fact that theuser is touching the phone can be enough evidence to the sensingcomponent 102 that the user is currently using the phone and thus thephone should remain active.

The configuring component 104 can change one or more features orfunctions of the portable device based on the information received fromthe sensing component 102. Thus, the configuring component 104 canswitch between options based on whether the portable device is currentlybeing used or not and based on the preferences of the identified user.For example, the sensing component 102 can determine that a user hascurrently stopped using a cell phone because the user is not touchingthe phone. The configuring component 104 can receive this informationand change the current mode of the cell phone to a sleep mode, and/ortime-out or dim the display screen to conserve battery power (e.g. asset by the identified user). As another example, when the user touchesthe cell phone, the sensing component 102 can determine that theidentified user is now using the cell phone. Based on the data from thesensing component 102, the configuring component 104 can change thecurrent mode of the cell phone to an active mode, and/or restore orswitch on the display screen as specified by the identified user.

It can be appreciated that the subject specification is not limited tochanging display screen settings but can be employed to change any othersetting on the portable device. As an example, the configuring component104 can change the current volume settings on a cellular phone based inpart on the data received from the sensing component 102. According toan aspect, the sensing component 102 can determine that the user iscurrently touching the cellular phone and based on this data, theconfiguring component 104 can change the ringer volume of the phone to alower setting or to a vibrate mode. Since, the user is in closeproximity to the phone, a lower ring or vibration can be easily heard orsensed by the user and can be less intrusive method of notification.Accordingly, the sensing component 102 can facilitate passive monitoringand identification of a user and the configuring component 104 canchange a setting for one or more feature of a portable electronic deviceeven though the user is not taking an active system action based in parton the identity of the user.

Referring now to FIG. 2, there illustrated is an example system 200 thatcan be employed to monitor whether a user is utilizing a portableelectronic device in accordance with the disclosure. The portableelectronic device can include, but is not limited to, a mobile phone, anMP3 player, a portable GPS navigator, a PDA, a portable gaming module, aradio player, a media recorder, or a combination thereof. It can beappreciated that the sensing component 102 can include functionality, asmore fully described herein, for example, with regard to system 100.

As seen from FIG. 2, the sensing component 102 can be connected tomultiple sensors (202-206). It can be appreciated that although onlythree sensors are depicted in the figure, one or more sensors can beemployed to monitor a user. The sensors, sensor 1 to sensor N (where Ncan be a natural number from one to infinity) can be employed topassively collect data that identifies whether a user is touching theportable device. Further, the sensors (202-206) can also collectinformation that can help the sensing component 102 determine and/orverify the identity of the user. When a user is interacting (actively)with a portable device, the user can typically touch the keys and/or thetouch-screen display on the portable device. Thus, the sensors (202-206)can preferably be located on the keys and/or the display. However, whena user passively interacts with the portable device, the user cantypically hold the device in his/her hand. Thus, the sensors (202-206)can be placed on the side and/or the back of the device. It can beappreciated that the sensors (202-206) can be placed anywhere on theportable device in a manner that is transparent to the user.Additionally or alternately, the sensors (202-206) can be located in adedicated area that is visible to the user. As an example, “Touch hereto activate” or “wake up device” or the like can be written over thededicated area, such that the user can easily identify where to touchthe device.

Sensors (202-206) can include, but are not limited to, skin conductivitysensors, pressure sensors, multi touch sensors, optical sensors, thermalsensors and/or a combination thereof. In an aspect, sensors (202-206)collect data that helps sensing component 102 to identify a user anddetermine whether the user is currently touching the portable device.The sensors (202-206) can employ the electrical conduction of the user'sfinger, as in capacitive touch technologies, to determine that a user istouching the phone. It can be appreciated that most any touch technologycan be employed including, but not limited to, resistive, capacitive,infrared and/or surface acoustic wave (SAW) touch technology.

Resistive touch sensors are typically simple and relatively inexpensiveand overall, the technology is simple. According to one aspect, sensors(202-206) can employ resistive touch technology to detect that a user istouching the portable device, for example, in cases wherein a user iswearing gloves. Various technologies that can detect touch can beemployed by the sensors (202-206), such that, some can even detectnear-touches without making contact. According to another aspect,sensors (202-206) can employ capacitive touch technology, wherein thecapacitive sensor can includes a simple supporting sheet of glass with aconductive coating on one side. A printed circuit pattern can beemployed around the outside of a viewing area. The printed circuitpattern can set a charge across the surface, which is disturbed by aconductive material, such as, a finger touching the sensor. Typically,capacitive sensing methods determine if a user is touching the portabledevice based on electrical disturbance. Hence, the electricalcharacteristics of the touching object are important. Human skin is aconductive material and the capacitive sensor can thus detect itspresence. Employing capacitive touch technology in one or more of thesensors (202-206) can facilitate identification that a user has touchedthe portable device and reduce false alarms due to a touch by otherobjects. Sensors (202-206) that employ capacitive touch technology candifferentiate between a touch by a conductive material and a nonconductive material and accordingly reduce errors in reading humantouch. As an example, if a user is currently not using a media playerand has kept the player in a purse/bag, the sensors (202-206) will notidentify a touch by another object in the purse/bag as the touch of theuser. It can be appreciated that sensors (202-206) can be a combinationof various sensors that employ different types of touch technologies.

The sensing component 102 can receive data from the various sensors(202-206) and analyze it to reduce false sensing and accuratelydetermine when a user has touched the portable device. Further, thesensing component 102 can also determine when the user is utilizing theportable device (actively or passively) based on the analysis. In oneembodiment, if the sensing component 102 receives data the sensors(202-206) that are located on the keys and/or display screen of theportable device, the sensing component 102 can determine that the useris using the device actively or passively. In another embodiment, if thesensing component 102 receives data the sensors (202-206) that are onlylocated on the back and/or sides of the portable device, the sensingcomponent 102 can determine that the user is merely holding the device.Accordingly, power saving features can be activated since the user iscurrently not using the device (neither actively nor passively).Additionally, the sensing component 102 can determine the identity ofthe user based on the data received from the various sensors (202-206).One or more features, including power saving features of the device, canbe modified based on the preferences set by the identified user.

FIG. 3 illustrates an example system 300 that can be employed toidentify or verify a user of a portable electronic device, according toan aspect of subject disclosure. The portable electronic device can be acellular telephone, a cordless telephone, an SIP phone, a cordlessphone, a PDA, a battery operated handheld device, computing device, orother processing device, a portable media player, a portable mediarecorder, a camera or the like, or a combination thereof. It can beappreciated that the sensing component 102 can include functionality, asmore fully described herein, for example, with regard to systems 100 and200.

The sensing component 102 can receive skin sensitivity data associatedwith the user's touch from multiple sensors located on the device. Thesensing component 102 can include an identification component 302 thatcan be employed to determine an identity of the user touching the devicebased in part on the data received from the sensors. It can beappreciated that the identification component 302 can be employed foridentification and/or verification of a user's identity. For example,the identification component 302 can identify a user (e.g. who istouching is device?) and/or verify the identity of a user (e.g., Is userX touching the device?). In one aspect, the identification component 302can be employed for security purposes, such that, only an authorized setof users can access the device.

The identification component 302 can employ various techniques toidentify or verify a user's identity, such as, but not limited tomeasuring Body Mass Index (BMI), body temperature, salt level,electrical characteristic and/or a combination thereof. Additionally,most any biometric techniques can also be employed to improve accuracy.Typically, an initial setup can be performed to store informationassociated with a particular user that can help in identification whenthe user touches the device. The information can be stored in a database304. The database 302 can comprise non-volatile memory, such as a flashmemory device (e.g., single-bit flash memory, multi-bit flash memory),and/or volatile memory (e.g., static random access memory (SRAM)).Additionally, the database 302 can be internal or external to theportable electronic device.

Further, the database 304 can also store user preferences associatedwith each user (e.g. via an initial setup), such that, on identificationof the user, the user's preferences can be activated. For example, oneor more features of the portable electronic device can be modified, aspredefined by a user A, when identified that user A is touching thedevice. Further, one or more features of the portable electronic devicecan be modified, as predefined by a user A, when the user A stopstouching the device. Thus, the portable electronic device can becustomized for each user.

According to an example, a cell phone can be customized by a user, suchthat the cell phone will not turn on the display unless an authorizeduser utilizes the phone. The identification component 302 can verify ifthe user touching the phone is an authorized user based in part oncomparing data from the sensors to data stored in the database 304. Onlywhen the identification component determines that the user touching thephone is an authorized user, the cell phone display will be turned on.Further, the preference settings specified by the identified user can beactivated. According to one aspect, a guest profile can be assigned tounauthorized users, wherein an unauthorized user can be allowed toaccess a minimal number of features on the phone.

As another example, in a multiuser situation, wherein an MP3 player isshared by members of a household, the identification component 302 canidentify the user touching the player and accordingly changepreferences. For example, a different playlist can be provided to eachmember of the household. Additionally, preferences, such as, but notlimited to, screen savers, background, font, volume, etc. can becustomized for each member via an initial setup. Thus, when theidentification component 302 identifies the user, the preferences storedby the identified user (e.g. in database 304) can be set.

FIG. 4 illustrates an example configuring component 104 that can modifyone or more functions on a portable electronic device in accordance withan aspect of the disclosure. The portable electronic device can be acell phone, media player, camera, media recorder, etc. According to anaspect, the configuring component 104 can include a time-out determiningcomponent 402, a current mode determining component 404 and/or a currentsetting determining component 406. It can be appreciated that theconfiguring component 104 can include functionality, as more fullydescribed herein, for example, with regard to system 100.

The time-out determining component 402 can be employed to optimize ascreen time-out of the portable electronic device. Based on the datareceived from the sensing component 102 (FIG. 1), the time-outdetermining component 402 can start or stop a screen time-out. In oneaspect, the time-out determining component 402 can include a time-outcounter that can be set or reset according to the data obtained from thesensing component 102 (FIG. 1). Specifically, if it is determined thatthe user is not actively or passively using the portable device (e.g. bythe sensing component 102), the time-out determining component 402 caninitiate a display screen time-out. The display screen time-out can becustomized for a user, for example, via an initial setup. Thus, thetime-out determining component 402 can initiate the display screentime-out associated with the identified user's preferences. According toan aspect, during the time that the user is not employing the device,the time-out determining component 402 can dim or switch off a displaycomponent 408. The display component 408 can include, but not limitedto, a display screen or touch screen. Further, if it is determined thatthe user is employing the portable device (actively or passively), thetime-out determining component 402 can activate the display screen byswitching on the display screen or restoring the display screen to theoriginal brightness.

As an example, when a user is not touching an MP3 player, it can bedetermined that the user is not using the player (actively or passively)and the time-out determining component 402 can initiate a display screentime-out and conserve battery power as predefined by the user. Further,when the user touches, for example, a key or circle wheel on the player,the time-out determining component 402 automatically restores to theoriginal screen settings based on the user's preference.

The current mode determining component 406 can determine a current modefor the portable electronic device based on the data received from thesensing component 102 (FIG. 1) relating to device usage. The currentmode determining component 406 can determines a current mode ofoperation of the portable device based on the preferences of the userand whether the user is currently utilizing the portable device.According to an aspect, if the user is not using the portable device,the current mode determining component 406 can change the current modeto a preferred user mode, such as, a sleep, stand by, or low power modeto conserve battery power. According to another aspect, if the user isusing the portable device, either actively or passively, the currentmode determining component 406 can change the current mode to apreferred user mode, such as a normal operation mode. Thus, the currentmode determining component 406 can modify the current operating mode ofthe portable device without an active indication from the user based onpredefined user preferences.

The configuring component 104 can further include a current settingdetermining component 406 that modifies one or more settings of theportable device based on the device usage and predefined user settings.It can be appreciated that the settings are not limited to power savingoptions but can be a setting for most any feature of the portableelectronic device as specified by the user. Depending on which user isutilizing the portable device and whether the user is currently using(actively or passively) the portable device, the current settingdetermining component 406 changes settings for one or more features orfunctions of the portable device. As an example, if a user is touching acellular phone, the ringer volume can be minimized or changed to avibrate mode by the current setting determining component 406 based onthe identified user's preference setting and when the user is nottouching the phone, the current setting determining component 406 canrestore the original ringer volume as predefined by the identified user.This can provide a user with a less intrusive method of notification. Inone aspect, the change in the settings can be predefined by a user via auser input or can be automatically determined by employing artificialintelligence and/or machine learning techniques. Therefore, a setting ofthe portable device can be modified by the current setting determiningcomponent 406 without an active indication from the user.

Referring now to FIG. 5, there illustrated is an example portableelectronic device 500 that can optimize activation of device featuresbased on device usage, according to an aspect of the subject disclosure.FIG. 5A depicts a front view of the portable electronic device 500, FIG.5B depicts a side view of the portable electronic device 500 and FIG. 5Cdepicts a back view of the portable electronic device 500. The portableelectronic device 500 can be most any mobile device including, but notlimited to, a cellular telephone, a cordless telephone, an SIP phone, acordless phone, a WLL station, a PDA, a battery operated handhelddevice, computing device, or other processing device, a portable mediaplayer, a portable media recorder, a camera etc.

The portable electronic device 500 typically includes a display screen502 that can output and/or input data from a user. The display screen502 can be a single or multiple touch screen. The display screen 502 canprovide users an easy and effective means of communication with theportable electronic device 500. A sensor 504 can be provided under thedisplay screen 502 to detect when a user touches the display 502. Thesensor 504 can be a skin conductivity sensor, pressure sensor, multitouch sensor, optical sensor, thermal sensor and/or a combinationthereof. The sensor 504 collects data that can determine whether a useris touching the display screen 502.

Additionally or alternately, a sensor 506 can be placed below each key508 on the portable electronic device 500. The sensor 506 can beemployed to sense whether a user is touching one or more keys 508 on akeypad. It can be appreciated that the sensor 506 can include a skinconductivity sensor, pressure sensor, multi touch sensor, opticalsensor, thermal sensor and/or a combination thereof. Further, sensors510 employed to collect data associated with a user's touch can also belocated on the sides of the portable device 500. Although only threesensors 510 are depicted in the figure, zero or more sensors can beemployed. Additionally, sensors 516 can be located at the back of theportable electronic device 500 to collect data relating to a user'stouch. In one aspect, sensors 504, 506, 510 and 516 can be located in amanner that is invisible to the user.

According to another aspect, a sensor 512 can be located in a dedicatedarea on the body of the device 500 that can be visible or known to theuser. As an example, sensor 512 can be located at the bottom of thefront face of the portable electronic device 500. When a user would liketo use or active the device 500, the user can simply touch the sensor512. In accordance with yet another aspect, the dedicated area on thebody of the device 500 can be highlighted by displaying, for example,text such as “Touch here to active” or “wake up device”, etc. as shownat 514. A sensor can be located below area 514 that can collect databased on the electrical conduction of the user's skin. Further, sensors504, 506, 510, 512, 514 and 516, alone or in combination, can beemployed to determine the identity of the user currently touching theportable electronic device 500.

FIG. 6 illustrates an example system 600 that employs a machine learningcomponent 602, which can facilitate automating one or more features inaccordance with the subject disclosure. It can be appreciated that thesensing component 102 and configuring component 104 can each includetheir respective functionality, as more fully described herein, forexample, with regard to systems 100, 200, 300 and 400.

The subject disclosure (e.g., in connection with optimizing screentime-out, changing current mode or settings) can employ various AI-basedschemes for carrying out various aspects thereof. For example, a processfor determining which setting or mode can be modified based on deviceusage can be facilitated via an automatic classifier system and process.Moreover, the classifier can be employed to determine which mode orsetting will be selected as a current mode or setting based onhistorical data and/or preferences. Additionally, the classifier can beemployed to identify the user touching the device and/or the preferencesof the identified user.

A classifier is a function that maps an input attribute vector, x=(x1,x2, x3, x4, xn), to a confidence that the input belongs to a class, thatis, f(x)=confidence(class). Such classification can employ aprobabilistic and/or statistical-based analysis (e.g., factoring intothe analysis utilities and costs) to prognose or infer an action that auser desires to be automatically performed.

A support vector machine (SVM) is an example of a classifier that can beemployed. The SVM operates by finding a hypersurface in the space ofpossible inputs, which the hypersurface attempts to split the triggeringcriteria from the non-triggering events. Intuitively, this makes theclassification correct for testing data that is near, but not identicalto training data. Other directed and undirected model classificationapproaches include, e.g., naïve Bayes, Bayesian networks, decisiontrees, neural networks, fuzzy logic models, and probabilisticclassification models providing different patterns of independence canbe employed. Classification as used herein also is inclusive ofstatistical regression that is utilized to develop models of priority.

As will be readily appreciated from the subject specification, thesubject disclosure can employ classifiers that are explicitly trained(e.g., via a generic training data) as well as implicitly trained (e.g.,via observing user behavior, receiving extrinsic information). Forexample, SVM's are configured via a learning or training phase within aclassifier constructor and feature selection module. Thus, theclassifier(s) can be used to automatically learn and perform a number offunctions, including but not limited to determining according to apredetermined criteria, which settings should be changed based on usageof the portable device or what value should the selected settings changeby, or optimizing display screen time-out etc.

FIGS. 7-10 illustrate methodologies and/or flow diagrams in accordancewith the disclosed subject matter. For simplicity of explanation, themethodologies are depicted and described as a series of acts. It is tobe understood and appreciated that the subject disclosure is not limitedby the acts illustrated and/or by the order of acts, for example actscan occur in various orders and/or concurrently, and with other acts notpresented and described herein. Furthermore, not all illustrated actsmay be required to implement the methodologies in accordance with thedisclosed subject matter. In addition, those skilled in the art willunderstand and appreciate that the methodologies could alternatively berepresented as a series of interrelated states via a state diagram orevents. Additionally, it should be further appreciated that themethodologies disclosed hereinafter and throughout this specificationare capable of being stored on an article of manufacture to facilitatetransporting and transferring such methodologies to computers. The termarticle of manufacture, as used herein, is intended to encompass acomputer program accessible from any computer-readable device, carrier,or media.

Referring now to FIG. 7, illustrated is an example methodology 700 thatcan be employed to change settings of an electronic portable device whena user is not touching the device in accordance with an aspect of thedisclosed subject matter. The portable electronic device can be most anymobile device that is typically powered by a battery within the device.At 702, it can be sensed that a user's skin is no longer in contact withthe portable electronic device. As an example, one or more sensors canbe employed to continuously monitor a user's touch. At 704, the userthat stopped utilizing the device can be identified based in part ondata collected by sensors when the user was touching the phone.According to one aspect, when the user is not touching the device, thedevice can switch to an inactive state. Thus, at 706, a time-out can bestarted such that, a display screen on the portable electronic devicecan be either dimmed or switched off to conserve battery power based onpreferences set by the identified user. Additionally, most any powersaving features can be activated depending on the user's preferences. At708, one or more settings of the portable device can be changed as perthe preferences of the identified user. As an example, a setting suchas, but not limited to, a speaker volume and/or a ringer volume can beincreased.

Referring to FIG. 8, illustrated is an example methodology 800 that canbe employed to change settings on an electronic portable device when auser is touching the device, according to an aspect of the disclosedsubject specification. The portable electronic device can be a cellularphone, media player, media recorder, etc. At 802, it can be sensed thata user's skin is in contact with the portable electronic device. As anexample, one or more sensors located on the portable device can beemployed to continuously monitor a user's touch. At 804, the identity ofthe user can be determined and/or verified. At 806, a time-out can bestopped and a display screen on the portable device can be switched onor restored to its original brightness based in part on the identifieduser's preferences. At 808, most any setting on the portable device canbe changed or reset to an original value as predefined by the identifieduser in view of the fact that the user is currently using the device.The setting can be a power management feature, or most any feature ofthe device, such as but not limited to a speaker volume or ringervolume. Additionally or alternately, the changes to the settings can beautomatically determined by employing artificial intelligencetechniques.

FIG. 9 illustrates an example methodology 900 to initiate a screentime-out when a user is not using a portable electronic device,according to an aspect of the subject disclosure. At 902, data can bereceived from one or more sensors that are located on the portableelectronic device. The data is associated with a user's touch, which canbe passively monitored and/or detected by the sensors. The sensors canbe located anywhere on the portable device in a manner that istransparent to the user and/or at a dedicated area that is visible tothe user. As an example, data can be received from multiple skinconductivity sensors on the portable device. At 904, it can bedetermined that the user has stopped using (actively and passively) theportable device based in part on the received data. At 906, the identityof the user can be determined. At 908, a display screen on the portableelectronic device can be dimmed or timed-out to preserve battery powerbased on the identified user's predefined settings. Thus, the displayscreen time-out can be optimized based on device usage by a particularuser, which is determined by the user's touch. Additionally, time-outcan be customized for each user.

Referring now to FIG. 10, there illustrated an example methodology 1000to restore a display screen to its active state when a user is using aportable electronic device in accordance with an aspect of the subjectspecification. At 1002, data can be received from one or more sensorsthat are located on the portable electronic device. The sensors can belocated anywhere on the portable device and can collect data isassociated with a user's touch, for example, via skin conduction. At1004, it can be determined that the user is currently using the portabledevice based in part on the received data. The user can employ theportable device actively or passively. At 1006, an identity of the usercan be determined and/or verified. According to an aspect, varioustechniques can be employed to identify and/or verify a user's identity,such as, but not limited to measuring Body Mass Index (BMI), bodytemperature, salt level, electrical characteristic and/or a combinationthereof. At 1008, a determination is made whether the identified user isauthorized to employ the portable device or not. If determined that theidentified user is an authorized user, a display screen on the portableelectronic device can be activated or restored to its originalbrightness as per the user's preferences, as shown at 1010. However, ifdetermined that the identified user is not an authorized user, access tothe portable device can be denied as shown at 1012. In one aspect,unauthorized users can be granted access to minimal features of thedevice. Accordingly, the methodology 1000 can facilitate customizingdisplay screen time-out based on device usage for a user, which can bedetermined data obtained from skin conductivity sensors.

FIG. 11 is an illustration of an example mobile device 1100 that canoptimize a change in device setting based on data obtained from touchsensitive sensors, in accordance with an aspect of the system. It can beappreciated that components of FIG. 11 (1102-1114) can be optionaland/or can be combined into a single component providing aggregatefunctionality. Further, it can be appreciated that the sensing component102 and configuring component 104 can each include their respectivefunctionality, as more fully described herein, for example, with regardto systems 100, 200, 300, 400 and 600.

Mobile device 1100 can comprise a receiver 1102 that receives a signalfrom, for instance, a receive antenna (not shown), and performs typicalactions thereon (e.g., filters, amplifies, downconverts, etc.) thereceived signal and digitizes the conditioned signal to obtain samples.Receiver 1102 can be, for example, an MMSE receiver, and can comprise ademodulator 1104 that can demodulate received symbols and provide themto a processor 1106 for channel estimation. Processor 1106 can be aprocessor dedicated to analyzing information received by receiver 1102and/or generating information for transmission by a transmitter 1116, aprocessor that controls one or more components of mobile device 1100,and/or a processor that both analyzes information received by receiver1102, generates information for transmission by transmitter 1114, andcontrols one or more components of mobile device 1100.

Mobile device 1100 can additionally comprise memory 1108 that isoperatively coupled to processor 1106 and that may store data to betransmitted, received data, information related to available channels,data associated with analyzed signal and/or interference strength,information related to an assigned channel, power, rate, or the like,and any other suitable information for estimating a channel andcommunicating via the channel Memory 1108 can additionally storeprotocols and/or algorithms associated with estimating and/or utilizinga channel (e.g., performance based, capacity based, etc.). Further,memory 1108 can also store user preferences and/or predefined usersettings.

It will be appreciated that the data store (e.g., memory 1108) describedherein can be either volatile memory or nonvolatile memory, or caninclude both volatile and nonvolatile memory. By way of illustration,and not limitation, nonvolatile memory can include read only memory(ROM), programmable ROM (PROM), electrically programmable ROM (EPROM),electrically erasable PROM (EEPROM), or flash memory. Volatile memorycan include random access memory (RAM), which acts as external cachememory. By way of illustration and not limitation, RAM is available inmany forms such as synchronous RAM (SRAM), dynamic RAM (DRAM),synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhancedSDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and direct Rambus RAM (DRRAM).The memory 1108 of the subject systems and methods is intended tocomprise, without being limited to, these and any other suitable typesof memory.

Mobile device 1100 still further comprises a modulator 1112 and atransmitter 1114 that transmits a signal to, for instance, a basestation, another mobile device, etc. The modulator 1112 can be employedto multiplex the signal to be transmitted in the frequency and/or timedomain. A battery 1110 can be employed to power the mobile device 1100.Power management techniques can be employed to save battery power, suchthat the battery can last longer between recharge cycles. The sensingcomponent 102 and the configuring component 104 can optimize and/orcustomize power management features, for example, screen time-out toconserve battery power for a user employing the device. In particular,the sensing component 102 can passively sense when a user is using themobile device 1100 (actively or passively) and identify the user, andthe configuring component 104 can configure the device 1100 in an activestate during that time period based on the identified user'spreferences. According to an aspect, a screen time-out can be startedand stopped based on device usage, without an active indication from auser.

In order to provide a context for the various aspects of the disclosedsubject matter, FIG. 12 as well as the following discussion are intendedto provide a brief, general description of a suitable environment inwhich the various aspects of the disclosed subject matter may beimplemented. While the subject matter has been described above in thegeneral context of computer-executable instructions of a computerprogram that runs on a computer and/or computers, those skilled in theart will recognize that the subject disclosure also may be implementedin combination with other program modules. Generally, program modulesinclude routines, programs, components, data structures, etc. thatperform particular tasks and/or implement particular abstract datatypes. Moreover, those skilled in the art will appreciate that theinventive methods may be practiced with other computer systemconfigurations, including single-processor or multiprocessor computersystems, mini-computing devices, mainframe computers, as well aspersonal computers, hand-held computing devices (e.g., PDA, phone,watch), microprocessor-based or programmable consumer or industrialelectronics, and the like. The illustrated aspects may also be practicedin distributed computing environments where tasks are performed byremote processing devices that are linked through a communicationsnetwork. However, some, if not all aspects of the disclosedspecification can be practiced on stand-alone computers. In adistributed computing environment, program modules may be located inboth local and remote memory storage devices.

A computer typically includes a variety of computer-readable media.Computer-readable media can be any available media that can be accessedby the computer and includes both volatile and nonvolatile media,removable and non-removable media. By way of example, and notlimitation, computer-readable media can comprise computer storage mediaand communication media. Computer storage media includes volatile andnonvolatile, removable and non-removable media implemented in any methodor technology for storage of information such as computer-readableinstructions, data structures, program modules or other data. Computerstorage media includes, but is not limited to, RAM, ROM, EEPROM, flashmemory or other memory technology, CD-ROM, digital versatile disk (DVD)or other optical disk storage, magnetic cassettes, magnetic tape,magnetic disk storage or other magnetic storage devices, or any othermedium which can be used to store the desired information and which canbe accessed by the computer.

Communication media typically embodies computer-readable instructions,data structures, program modules or other data in a modulated datasignal such as a carrier wave or other transport mechanism, and includesany information delivery media. The term “modulated data signal” means asignal that has one or more of its characteristics set or changed insuch a manner as to encode information in the signal. By way of example,and not limitation, communication media includes wired media such as awired network or direct-wired connection, and wireless media such asacoustic, RF, infrared and other wireless media. Combinations of the anyof the above should also be included within the scope ofcomputer-readable media.

With reference again to FIG. 12, the example environment 1200 forimplementing various aspects of the specification includes a computer1202, the computer 1202 including a processing unit 1204, a systemmemory 1206 and a system bus 1208. The system bus 1208 couples systemcomponents including, but not limited to, the system memory 1206 to theprocessing unit 1204. The processing unit 1204 can be any of variouscommercially available processors. Dual microprocessors and othermulti-processor architectures may also be employed as the processingunit 1204.

The system bus 1208 can be any of several types of bus structure thatmay further interconnect to a memory bus (with or without a memorycontroller), a peripheral bus, and a local bus using any of a variety ofcommercially available bus architectures. The system memory 1206includes read-only memory (ROM) 1210 and random access memory (RAM)1212. A basic input/output system (BIOS) is stored in a non-volatilememory 1210 such as ROM, EPROM, EEPROM, which BIOS contains the basicroutines that help to transfer information between elements within thecomputer 1202, such as during start-up. The RAM 1212 can also include ahigh-speed RAM such as static RAM for caching data.

The computer 1202 further includes an internal hard disk drive (HDD)1214 (e.g., EIDE, SATA), which internal hard disk drive 1214 may also beconfigured for external use in a suitable chassis (not shown), amagnetic floppy disk drive (FDD) 1216, (e.g., to read from or write to aremovable diskette 1218) and an optical disk drive 1220, (e.g., readinga CD-ROM disk 1222 or, to read from or write to other high capacityoptical media such as the DVD). The hard disk drive 1214, magnetic diskdrive 1216 and optical disk drive 1220 can be connected to the systembus 1208 by a hard disk drive interface 1224, a magnetic disk driveinterface 1226 and an optical drive interface 1228, respectively. Theinterface 1224 for external drive implementations includes at least oneor both of Universal Serial Bus (USB) and IEEE 1394 interfacetechnologies. Other external drive connection technologies are withincontemplation of the subject specification.

The drives and their associated computer-readable media providenonvolatile storage of data, data structures, computer-executableinstructions, and so forth. For the computer 1202, the drives and mediaaccommodate the storage of any data in a suitable digital format.Although the description of computer-readable media above refers to aHDD, a removable magnetic diskette, and a removable optical media suchas a CD or DVD, it should be appreciated by those skilled in the artthat other types of media which are readable by a computer, such as zipdrives, magnetic cassettes, flash memory cards, cartridges, and thelike, may also be used in the example operating environment, andfurther, that any such media may contain computer-executableinstructions for performing the methods of the specification.

A number of program modules can be stored in the drives and RAM 1212,including an operating system 1230, one or more application programs1232, other program modules 1234 and program data 1236. All or portionsof the operating system, applications, modules, and/or data can also becached in the RAM 1212. It is appreciated that the specification can beimplemented with various commercially available operating systems orcombinations of operating systems.

A user can enter commands and information into the computer 1202 throughone or more wired/wireless input devices, e.g., a keyboard 1238 and apointing device, such as a mouse 1240. Other input devices (not shown)may include a microphone, an IR remote control, a joystick, a game pad,a stylus pen, touch screen, or the like. These and other input devicesare often connected to the processing unit 1204 through an input deviceinterface 1242 that is coupled to the system bus 1208, but can beconnected by other interfaces, such as a parallel port, an IEEE 1394serial port, a game port, a USB port, an IR interface, etc.

A monitor 1244 or other type of display device is also connected to thesystem bus 1208 via an interface, such as a video adapter 1246. Inaddition to the monitor 1244, a computer typically includes otherperipheral output devices (not shown), such as speakers, printers, etc.

The computer 1202 may operate in a networked environment using logicalconnections via wired and/or wireless communications to one or moreremote computers, such as a remote computer(s) 1248. The remotecomputer(s) 1248 can be a workstation, a server computer, a router, apersonal computer, portable computer, microprocessor-based entertainmentappliance, a peer device or other common network node, and typicallyincludes many or all of the elements described relative to the computer1202, although, for purposes of brevity, only a memory/storage device1250 is illustrated. The logical connections depicted includewired/wireless connectivity to a local area network (LAN) 1252 and/orlarger networks, e.g., a wide area network (WAN) 1254. Such LAN and WANnetworking environments are commonplace in offices and companies, andfacilitate enterprise-wide computer networks, such as intranets, all ofwhich may connect to a global communications network, e.g., theInternet.

When used in a LAN networking environment, the computer 1202 isconnected to the local network 1252 through a wired and/or wirelesscommunication network interface or adapter 1256. The adapter 1256 mayfacilitate wired or wireless communication to the LAN 1252, which mayalso include a wireless access point disposed thereon for communicatingwith the wireless adapter 1256.

When used in a WAN networking environment, the computer 1202 can includea modem 1258, or is connected to a communications server on the WAN1254, or has other means for establishing communications over the WAN1254, such as by way of the Internet. The modem 1258, which can beinternal or external and a wired or wireless device, is connected to thesystem bus 1208 via the serial port interface 1242. In a networkedenvironment, program modules depicted relative to the computer 1202, orportions thereof, can be stored in the remote memory/storage device1250. It will be appreciated that the network connections shown areexample and other means of establishing a communications link betweenthe computers can be used.

The computer 1202 is operable to communicate with any wireless devicesor entities operatively disposed in wireless communication, e.g., aprinter, scanner, desktop and/or portable computer, portable dataassistant, communications satellite, any piece of equipment or locationassociated with a wirelessly detectable tag (e.g., a kiosk, news stand,restroom), and telephone. This includes at least Wi-Fi and Bluetooth™wireless technologies. Thus, the communication can be a predefinedstructure as with a conventional network or simply an ad hoccommunication between at least two devices.

Wi-Fi, or Wireless Fidelity, allows connection to the Internet from acouch at home, a bed in a hotel room, or a conference room at work,without wires. Wi-Fi is a wireless technology similar to that used in acell phone that enables such devices, e.g., computers, to send andreceive data indoors and out; anywhere within the range of a basestation. Wi-Fi networks use radio technologies called IEEE 802.11 (a, b,g, etc.) to provide secure, reliable, fast wireless connectivity. AWi-Fi network can be used to connect computers to each other, to theInternet, and to wired networks (which use IEEE 802.3 or Ethernet).Wi-Fi networks operate in the unlicensed 2.4 and 5 GHz radio bands, atan 11 Mbps (802.11a) or 54 Mbps (802.11b) data rate, for example, orwith products that contain both bands (dual band), so the networks canprovide real-world performance similar to the basic 10BaseT wiredEthernet networks used in many offices.

What has been described above includes examples of the presentspecification. It is, of course, not possible to describe everyconceivable combination of components or methodologies for purposes ofdescribing the present specification, but one of ordinary skill in theart may recognize that many further combinations and permutations of thepresent specification are possible. Accordingly, the presentspecification is intended to embrace all such alterations, modificationsand variations that fall within the spirit and scope of the appendedclaims. Furthermore, to the extent that the term “includes” is used ineither the detailed description or the claims, such term is intended tobe inclusive in a manner similar to the term “comprising” as“comprising” is interpreted when employed as a transitional word in aclaim.

What is claimed is:
 1. A system, comprising: a processor; and a memorythat stores executable instructions that, when executed by theprocessor, facilitate performance of operations, comprising: obtainingtouch data from a sensor of a user equipment relating to a touching ofthe user equipment, wherein the touch data comprises body mass indexdata representative of a body mass index of a first user identity; basedon the body mass index data, determining that the user equipment is notbeing utilized in association with the first user identity, and reducinga volume associated with a ringer of the user equipment from a firstvolume to a second volume lower than the first volume; and in responseto the reducing the volume, assigning a guest user identity to anunauthorized second user identity based on the body mass index data. 2.The system of claim 1, wherein the touch data is first touch data, andwherein the operations further comprise: based on second touch dataobtained from the sensor of the user equipment, determining that theuser equipment is being utilized in association with the unauthorizedsecond user identity.
 3. The system of claim 2, wherein the operationsfurther comprise: in response to the determining that the user equipmentis being utilized in association with the unauthorized second useridentity, adjusting a setting of the user equipment.
 4. The system ofclaim 3, wherein the operations further comprise: in response to theadjusting the setting of the user equipment, granting a limited accessto a feature of the user equipment.
 5. The system of claim 4, whereinthe granting the limited access comprises initiating a display time-outprotocol pursuant to which a display of the user equipment is modified.6. The system of claim 5, wherein the initiating the display time-outprotocol comprises modifying a brightness of the display of the userequipment.
 7. The system of claim 6, wherein the modifying thebrightness comprises reducing the brightness to dim the display, andwherein the display time-out protocol is based on preference datareceived during a setup procedure associated with the user equipmentwhen previously used in association with the first user identity.
 8. Theuser equipment of claim 1, wherein the operations further comprise: inresponse to the reducing the volume associated with the ringer,modifying a vibration parameter of the user equipment to increase avibration capability of user equipment.
 9. A method, comprising:verifying, by a mobile device comprising a processor, that the mobiledevice is not being utilized in connection with a first user identityassociated with a first user; based on body mass index data receivedfrom a sensor of the mobile device, determining, by the mobile device,that the mobile device is being utilized in connection with a seconduser identity associated with a second user; in response to thedetermining that the mobile device is being utilized in connection withthe second user identity, determining, by the mobile device, that thesecond user identity is not an authorized user identity; and based onthe determining that the second user identity is not the authorized useridentity: adjusting, by the mobile device, a ringer volume associatedwith the mobile device from a first volume to a second volume, and basedon the body mass index data, assigning, by the mobile device, a guestuser identity to the second user identity.
 10. The method of claim 9,wherein the verifying comprises verifying based on a result of comparinga first conductivity of skin relating to a currently touched area of themobile device to a second conductivity of skin previously determined tocorrespond to the first user identity.
 11. The method of claim 9,wherein the sensor of the mobile device receives thermal data scomprising data associated with a change in temperature relating to acurrently touched area of the mobile device.
 12. The method of claim 9,further comprising: in response to determining that the second useridentity is not the authorized user identity, restricting, by the mobiledevice, access to a feature of the mobile device.
 13. The method ofclaim 12, wherein the restricting the access to the feature is based ona preference of the first user identity related to a security featureassociated with the ringer volume of the mobile device.
 14. The methodof claim 13, wherein the security feature comprises dimming a displayscreen of the mobile device prior to further disabling the displayscreen after expiration of a time period starting with the dimming. 15.A non-transitory machine-readable storage medium, comprising executableinstructions that, when executed by a processor, facilitate performanceof operations, comprising: based on first measurement data received froma sensor of a communication device, wherein the first measurement datacomprises first body mass index data representative of a first body massindex, verifying that the communication device is not being utilized inassociation with a first user identity of the communication device;based on second measurement data received from the sensor of thecommunication device, wherein the second measurement data comprisessecond body mass index data representative of a second body mass index,determining that the second measurement data is associated with a seconduser identity of the communication device, wherein the second useridentity is determined to be an unauthorized user identity; in responseto the determining, adjusting a ringer volume associated with a ringerof the communication device; and in response to the adjusting the ringervolume, assigning a guest user identity to the second user identity. 16.The non-transitory machine-readable storage medium of claim 15, whereinthe adjusting the ringer volume comprises adjusting the ringer volume toa silent setting where the ringer is not hearable.
 17. Thenon-transitory machine-readable storage medium of claim 15, wherein theringer volume is a first ringer volume level, and wherein the adjustingthe ringer volume comprises reducing the ringer volume to a secondringer volume level lower than the first ringer volume level.
 18. Thenon-transitory machine-readable storage medium of claim 15, wherein theringer volume is a first ringer volume level, and wherein the adjustingthe ringer volume comprises increasing the ringer volume to a secondringer volume level higher than the first ringer volume level.
 19. Thenon-transitory machine-readable storage medium of claim 15, wherein theoperations further comprise: restricting access of the unauthorized useridentity to a feature associated with the ringer volume of thecommunication device.
 20. The non-transitory machine-readable storagemedium of claim 15, wherein the operations further comprise: in responseto the determining that the second measurement data is associated withthe second user identity, restricting use of the communication device byadjusting the ringer volume to be silent.