An image of users of an application may be received from a computing device on a home network. The image may comprise representations of a group of users. Recognition techniques may be applied to the image. Unclaimed profiles may be created for users who are not recognized. The unclaimed profiles may be utilized by applications prior to being claimed by a user or group. Access to the unclaimed profiles may be controlled based on the identity of the network gateway used in the transmission of the image used as the basis for forming the profile.