United States Patent No. US 225, B2 Biswas et Date Patent...

29
IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII US009225688B2 &12~ United States Patent Biswas et al. (Io) Patent No. : US 9, 225, 688 B2 (45) Date of Patent: Dec. 29, 2015 (54) METHOD AND APPARATUS FOR PROVIDING PRIVACY ADAPTATION BASED ON RECEIVER CONTEXT (71) Applicant: Nokia Corporation, Espoo (FI) 2008/0155644 Al * 2008/0220760 Al * 2011/0177802 Al 2012/0102050 Al 2012/0254935 Al * 2013/0091205 Al * 2013/0185359 Al 6/2008 9/2008 7/2011 4/2012 10/2012 4/2013 7/2013 Baranov et al. .. Ullah ............... Gupta Button et al. Yato et al. ........ Kotler et al. Liu et al. ....... 726/I ... 455/420 ....... 726/I ... 709/204 (72) Inventors: Debmalya Biswas, Lausanne (CH); Matthew John Lawrenson, Bussigny-pres-de-lausanne (CH); Julian Nolan, Pully (CH) (73) Assignee: Nokia Technologies Oy, Espoo (FI) (21) Appl. No. : 14/095, 375 (22) Filed: Dec. 3, 2013 (65) Prior Publication Data US 2015/0156171 Al Jun. 4, 2015 (51) Int. Cl. H04L 29/06 (2006.01) (52) U. S. Cl. CPC ...................................... H04L 63/04 (2013. 01) (58) Field of ClassiTication Search CPC ................................ H04L 63/04; H04L29/06 USPC 726/I, 12 13, 26 See application file for complete search history. (56) References Cited U. S. PATENT DOCUMENTS ( * ) Notice: Subject to any disclaimer, the term of this patent is extended or adjusted under 35 U. S. C. 154(b) by 93 days. OTHER PUBLICATIONS Laura Zavala et al. , "Mobile, Collaborative, Context-Aware Sys- tems, " University of Maryland, Baltimore County, Baltimore, MD 21250 USA Papers from the 2011 AAAI Workshop iWS-I 1-041, pp. 79-84. * cited by examiner Primary Examiner Amir Mehrmanesh (74) Attorney, Agent, or Firm Ditthavong & Steiner, P.C. (57) ABSTRACT An approach is provided for determining a communication session established between at least one first device of at least one first user and at least one second device of at least one second user, wherein the at least one first device and the at least one second device are in a collaborative context detec- tion relationship. The privacy platform causes, at least in part, a detection of a presence of at least one third user within a proximity threshold of the at least one first device, the at least one second device, the at least one first user, the at least one second user, or a combination thereof, wherein the detection is performed via the collaborative context detection relation- ship. The privacy platform also determines one or more modi- fications to one or more privacy profiles for information exchanged over the communication session based, at least in part, on the detection of the presence of the at least one third user. 5, 544, 321 A 8/1996 Theimer et al. 2008/0147796 Al * 6/2008 Chmara et al. ... ... 709/204 1S Claims, 14 Drawing Sheets O SENSOR 105a O SENSOR 105b 100 O SENSOR 105c USER EQUIPMENl (UEI 101c USER EQUIPMENT (UE) 101a APPLICATION 103a USER EQUIPMENT (UE) 101b APPLICATION 1035 APPLICATION 103c SERVICES PLATFORIA 113 PRIVACY PLATFORM 109 COMMUNICATION NETWORK SERVICE 115a SERVICE 115n DATABASE 111 CONTENT PROVIDER 117a CONTENT PROVIDER 117n

Transcript of United States Patent No. US 225, B2 Biswas et Date Patent...

Page 1: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIUS009225688B2

&12~ United States PatentBiswas et al.

(Io) Patent No. : US 9,225,688 B2(45) Date of Patent: Dec. 29, 2015

(54) METHOD AND APPARATUS FORPROVIDING PRIVACY ADAPTATION BASEDON RECEIVER CONTEXT

(71) Applicant: Nokia Corporation, Espoo (FI)

2008/0155644 Al *2008/0220760 Al *2011/0177802 Al2012/0102050 Al2012/0254935 Al *2013/0091205 Al *2013/0185359 Al

6/20089/20087/20114/2012

10/20124/20137/2013

Baranov et al. ..

Ullah . ... ... ... ... ..

GuptaButton et al.Yato et al. ... ... ..Kotler et al.Liu et al.

. ... ... 726/I

. .. 455/420

. ... ... 726/I

. .. 709/204

(72) Inventors: Debmalya Biswas, Lausanne (CH);Matthew John Lawrenson,Bussigny-pres-de-lausanne (CH); JulianNolan, Pully (CH)

(73) Assignee: Nokia Technologies Oy, Espoo (FI)

(21) Appl. No. : 14/095, 375

(22) Filed: Dec. 3, 2013

(65) Prior Publication Data

US 2015/0156171 Al Jun. 4, 2015

(51) Int. Cl.H04L 29/06 (2006.01)

(52) U.S. Cl.CPC ...................................... H04L 63/04 (2013.01)

(58) Field of ClassiTication SearchCPC ................................ H04L 63/04; H04L29/06USPC 726/I, 12—13, 26See application file for complete search history.

(56) References Cited

U.S. PATENT DOCUMENTS

( * ) Notice: Subject to any disclaimer, the term of thispatent is extended or adjusted under 35U.S.C. 154(b) by 93 days.

OTHER PUBLICATIONS

Laura Zavala et al. , "Mobile, Collaborative, Context-Aware Sys-

tems, " University of Maryland, Baltimore County, Baltimore, MD

21250 USA Papers from the 2011 AAAI Workshop iWS-I 1-041, pp.79-84.

* cited by examiner

Primary Examiner Amir Mehrmanesh

(74) Attorney, Agent, or Firm Ditthavong & Steiner, P.C.

(57) ABSTRACT

An approach is provided for determining a communicationsession established between at least one first device of at leastone first user and at least one second device of at least onesecond user, wherein the at least one first device and the atleast one second device are in a collaborative context detec-tion relationship. The privacy platform causes, at least in part,a detection of a presence of at least one third user within aproximity threshold of the at least one first device, the at leastone second device, the at least one first user, the at least onesecond user, or a combination thereof, wherein the detectionis performed via the collaborative context detection relation-ship. The privacy platform also determines one or more modi-fications to one or more privacy profiles for informationexchanged over the communication session based, at least inpart, on the detection of the presence of the at least one thirduser.

5,544,321 A 8/1996 Theimer et al.2008/0147796 Al * 6/2008 Chmara et al. . .. . .. 709/204 1S Claims, 14 Drawing Sheets

OSENSOR

105a OSENSOR

105b100

OSENSOR105c

USER EQUIPMENl

(UEI 101c

USER EQUIPMENT

(UE) 101a

APPLICATION

103a

USER EQUIPMENT

(UE) 101b

APPLICATION

1035

APPLICATION

103cSERVICES PLATFORIA 113

PRIVACY

PLATFORM 109

COMMUNICATION

NETWORK

SERVICE 115a

SERVICE 115n

DATABASE

111

CONTENT PROVIDER

117a

CONTENT PROVIDER

117n

Page 2: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

U.S. Patent Dec. 29, 2015 Sheet 1 of 14 US 9,225,688 B2

CY0 wCQ LCDz c)CO

LLI

CL

C3 mLU

C3

LLICO ~LLI

0I—

P3

CL0

0&CI—

CLV3LU

LLICQ

lCD

LLIOCLLLIV3

CLLU

Q)0 cCL P

LUI—

0

I

C/3

I

I—LLI

CL

(3 mLU

C3

LLIC0 LLI

003

O P)0CL

I

I

I

I

I

I

I

I

J

0I—

LU

g Z00O

I—LLI

CL

(3 oC3

LLI(/3 LLI

0&CI—o

0CL

OO—&C

CL CL

Page 3: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

U.S. Patent Dec. 29, 2015 Sheet 2 of 14 US 9,225,688 B2

(3LLI

0 +

CIO

C)

CLO

C3

CL

I—0OOC3

oO

I—

OO

OCL

Page 4: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

U.S. Patent Dec. 29, 2015 Sheet 3 of 14 US 9,225,688 B2

LLIO LU CL& z LULU 0 (nz o0 I—cn ocn

cn K LU 0LU LL. —I O

I—LU

Z Z W cnOOoLUz~ cn ~ 0O & CL I——

LU LU Cnz a cn g+ z Cn I—0 ~ CL &O LU LL LL

LU I—Z LUzLUpo

CC3 )CI (n LLILLI &( O

I—~ LU OzCI ~ I

—poLL

(n 0 (nLU

CLLLIcl3

oCI

~ 0LU cnO LUz CL

cn I—

CL

u X0 0z~o~—&C

o ZLUI—I—LLIoLUcn

o

zZz00 0—(n0 I—cn

(nzOU oz0~+ZI:0O CL O I

LL 0~0o~5P0(n&~Z LU p oLU ~ 0 LU~ ~oo ~0 CL LLI +2 cL

I—0

0 o (L o~ LULU

z~o&O cL o CCI

LLILU LUZ ~ Q&oz

PcLO+oxo

CI

Page 5: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

U.S. Patent Dec. 29, 2015 Sheet 4 of 14 US 9,225,688 B2

I—CI

cn

0zuI:00Lu C cn LUZ & cn V

CL LLI

p Q cnI—~ Z Cn C3

cn ZO LULUZUJI CLCnpI

I—VLUO&CCLZ CLVQZ LLu ooz&p&ozz&zvopCC 0 LLI

LU cn &Z C/3 +

I—+I—LU CL LU ~~0 cn LU oLLI Zz 0 0 z UJ

CC «Z I—

ZgOLUo ~ v cn&x&

C33

V

UJ0- Z

I—LLIOcnV

0 W )V I O&)& o—Lu CL

C3

CL'

I—

0 I—8

op 0ZoI-C

LU cnZ I0 & UJ

I—Vp

Cf3CL cn0 & LLIu zenz p

I—Oa & L3'-

LLQ CL I—CL 0C3 LL

oUJcnz — C &) CC3

LU

V CL

u gLUOI—u O Z0 Lu o z pzzz&

QVz0 ~ V~0 ~~z cn cn I—CI0 CLU Co

CC Z0Z&I—uLULUcnz Vcn x & —~CL Q I—LL

~ cn ~ 0LU CL

cn V ~ ~I—&( cn cL zV cn 0 I—

Lu o z&z0

CL

V cn&C ZCL) 0u LU

Z I3Jpe&C zI—0z o

LLIcn

C33Cf) zV—I—

VLLI

CLLLI LIJI—cnUJo

CL

0Z I—Zp& 0VO&

UU z 0

LLzo u-0 V

UJ C3CLOI-VO CL c(

Qo I3-'Z:z CLO&LUI—Z' Z&QI—

0P+0z C3- z—0 &U

oUJ

Page 6: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

U.S. Patent Dec. 29, 2015 Sheet 5 of 14 US 9,225,688 B2

LU g ZUJLU0

LUI

I—«D

«CI LLIZ0 C:I I—Zg CL r

LU I—0 «DU- ~ 0 N

Zoo�&

0 —Z&C z'CC 0

Z LLILUOZ {D LLIOOa«D5 «D «DLU W CL

UJ

LUI

LLIZ%~0cc'. r I—

«DI—

0

0c( ZI—0 —z

CL«D

I CL 0UJ~+00& Up 0 L«

I—Z ZZ —& pLLI Z Z Z0 0 IJJCL I

—I—r

CL op zU

I—+QZCLZ~OLU LU Z

g 2r r IJyI—OpLU ~ ZCL

LLI 0-&proCLLU I

—CL pI—

UJ QC-I CL O

LUCL ZUJ Q

I—L«Dgo&ro

UJLUUJ~«D—IQ LU«DI—Z I

—Z LUC O (D

&- r UJ I—ZO r «D 0XI—&UJ UJ 0 LU I—CL

OOZI —OI——o~z(y ~+—LU

«D

Q ooZ QZ 0 Llj—z rLLI

ZI—OCLZLUZ «D LLIip&zoZZ+O&

LLI 0 W CL- LUI—

I0 —0

LU cc o r0 p I—CL

Page 7: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

U.S. Patent Dec. 29, 2015 Sheet 6 of 14 US 9,225,688 B2

—cn0(g cnZ UJ UJ 0cn x ~ Qcn I—I—LU CL &C LUD LU0 ) cn UJCY 0 ~ CL'

~ &c 0C LU O W

g 0 Cr&C

z I—0&cI—&DOZo x cn 0&C LLI Cn LLLL

0 cn0 —zCl &( cn~ cr ~ ~~cnoof

zcnLLZ~

oo ofo

0 I—I—U

cn 0C:I Z gooe~5ZI—CL

&- o & o~ ~ 0 cn& a cn

zz0 CL ~~~oz 0 o &(OI—Xocn ~ LLI ZcL UJ&c & 0

LU~ &C 0o & cL o&C LU0Z LLcnLU

&( LUo ~CI

Page 8: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

U.S. Patent Dec. 29, 2015 Sheet 7 of 14 US 9,225,688 B2

Q MX

«( I—

OC0 D c.U g 22 LU 0&Ml-

MI—LU

2D2M

M I—0I UJD

CIOC' & cnI-0 oM Cl.'UJOC

0

DI—MUJCL

,0 2

Q LD

I'(3 W,CI

, LU-J 0,Q 2

D

I—LU MDzooI—

'OL CO'CL

M

, LU

0

I—

K)K0IL0

I—

CIUJI—DI—LLICIDCL

M

C3

LU

C9

0CI

lZ«I,'c-+0

X IY

I—

X OI—QX

MLU= ~~2

UJ 0 UJX D

C3

LU

Page 9: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

U.S. Patent Dec. 29, 2015 Sheet 8 of 14 US 9,225,688 B2

cn z0 CI cn &z

CO I ~0p ~ Z

. cn0 CO LU "n ~CVI—+ 0 ~ 0UJ Z & UJ Q

cn~&R cn ~ o-CI CO cC C3 CO

n

CLLU

LU

cn

Z Z

0 Cncn

Z LCO+~~ pWUJcn +~Ocn

2 Z Z UJCn

I- I- Q LLI + Z ZZ —I- -I CO I- I—LU CCI tL -J UJ iL ~Z Q 0 CI Q LU

y X &- 0 0 z CLCI UJ Cn Cfl Z CO IXI

I-Kx00zI—NCIUJI—C3UJI-LUCIxlLLUCfl

xCL'

CfJ

Page 10: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

U.S. Patent Dec. 29, 2015 Sheet 9 of 14 US 9,225,688 B2

I&'i

$p~4

CO

0I—CL0CJ

CI(CL

Cl(L0I—C30CiCO

CIUJ

I—UJCl

OC

CLUJCO

0I—0

UJ0 CO0 «(CO CJCO

OIL

~ CUUJ I-Ci «(

CLI—0

C3

0I—Cl

Ci COCi 0z ~~UJUJ 0CU OCO

ZCO

CLI—

CJ0CI

Q:::.:::.:::.:::.::.::: 0

CL

CI

0I—CJ0CICO

CIUJUI—UJCi

I—UJI—

O mI—CO

COCO

O CO0 Ci

CO 0«( Oz~P

CO

0 OI—O0Ci

UJ

I—CIUJX X0—I—CO

X UJo 0~ 00 OI—CJ0CI

:O::::::::::::::::vp'&:::::::::::::::::::::::::::::::::::::::::::::::::::::IQ&;:„::,::„::;;:;,:,:,&."3',:,:;:;:,::;:;:;:;:;;;:,:;:;:;:;:;:;:;:;:;:;:;:;:;:;:;,:m

W.:;;,:.:,:;:&.'..',.'.

,;P;,:&:"';,:&@,:,:.:,'I &:„:;:I"i;;:„jgj

C'~:,:,:,,:,:,', ',:',',,:O': II,:&,:iA;;86;;~&;.;:::Igg:A„:3,::IQ

C3

UJ

Page 11: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

U.S. Patent Dec. 29, 2015 Sheet 10 of 14 US 9,225,688 B2

UJ

UJ

I—

I—CO

LUCO

CI

0

0CD COCL WLLI CO

LU

O ~CO

UJCI

I—

I—

UJCI

UJ

CO

UJCO

UJ

0COI—

UJ)I—CO

UJCO

UJCO & 0

UJ0 I- XZ ~+COCL

Z+O0 aoI

COO 2 ZLU

UJZ I- g0 UJ UJ0

M XLU D)0 O

LUUJ ~I—UJ

0 UJO U-

0 O

LU

I—

O

LUI

K

LUI—

;V

C?;:

LLI

UJ

UJ

I—)I—CO

UJCO

ZOIY0

0CO CO

LLI

0COO ~

LUCI

LLICI

CO

'g O~OCL'O

CO,CO CO

,

'0 ) CC.'Z Q, I—0 U

, OOUJU

UJ 0Z

'CL W CD

0

COUJ

'8gS

::5

I

'?:?

i?:?8'C)

LU

LU

I—

I—CO

UJCO

ClCL0

0CO CD

LU)~Z0COO ~

UJCI

I—

UJCI

CD

LU

Page 12: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

U.S. Patent Dec. 29, 2015 Sheet 11 of 14 US 9,225,688 B2

COI

CL

OI-CL

CL

0I-CO

UJ

0OLU

I-0COUJOLUCIC9

0

0I-0UJI-UJC3I-UJI-0OLLI

I-CL0G3

0O

?):y .

CHCWCW

0O

O~;UJ Z

Clcn 0)

UJ

U0CL

Cl

«C

UI—UJCI

0ZZCO ~

CO

I—UJC)cri

lU

COO CL

DZOUJ Q I-Z 0 E'

CL~OCL

COI

Wl-00 0

I—

)lUOUJCOUJ

O.CO

C9

Cl

C9LUCC.

'

COOCUJCO

IL'LU

I-0I—0

«C CgI-0 O-'

Z ~~0 O~ 0UJ

CO UJ

ZUJ

0 )O I-0 I-Z Z

UJ& aO COCO030&ZC9 gUJ

CO ILZ Q0I- O COO ) I—«(OJ Z(3 0 IL) O

CL

W CL CLCO 0 +

CL~ PnCL'

CL W LU) ZlU

O~O) g UJ

0 ZI—W u. 0?L + I—

I- I- OO Z) UJV I- g«C 0 Pu) IY CL

CL CLCL O CO

Cl z

Q+ 0COCLUJ) co0Z DO CC'

LU

Z II-2z 00~

COUJ

O 0Z «CCO0 CO

I—LU

UJCG

Cl

0 zill

0 CCI

O &-

~ I-0 OWCL'

0Z ZCL

I- 0WOZ

LLII-

CLLUI- ZUJ

Page 13: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

U.S. Patent Dec. 29, 2015 Sheet 12 of 14 US 9,225,688 B2

CO

CL CLcn LU 0o P COZ

O LLICO

CLcv LUo~ &o

CO

(3Z CO

o I 0ev W—oQCJ

CLCL O

UJCLCO

~ &C

CL

CI

LU(3) ~CL

o I—&LU 0

CLCL CLLLI

00

z

0CQ

o LU

PJCOo 0z

o CO

0

0

CLo 0oLU

0

oo0Cl&C

UJC3

UJCIoCL

LUC3

LU(g 0

Z

0CL

Page 14: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

U.S. Patent Dec. 29, 2015 Sheet 13 of 14 US 9,225,688 B2

CDCD

C3CO&C

CD

CLCfJCI

CLO

CDCD

CLOCO

CD

U ~0ELCL

Page 15: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

U.S. Patent Dec. 29, 2015 Sheet 14 of 14 US 9,225,688 B2

-+iCV

I

I

I

I

I

&O3

I

I

I

I

I

ImIXI

I

I

I ((3

{ Q!

g Q!

O 0OO

0(U

0EQ3C)

\Q!&CQ3

C!

O

Q!N(DQ3

C(3

(33(4CV

Q3){0O

0(U

0

I

I

I

I

I

I

CV

I

I

I

I

I

I

I

I

I

I

I

Q3

CU

C0CL1

Q!C!

(U

NC3CV

Q3NCU

LLI

p(U0Q3

CU

C{3

CI

OCU I

II

I

C(3

C3CV

C3

(U ({3

Q!(D

CU

C(3

dNV 1d&IDVH JISV

K

UJ C3UJ ~C(3O

I

I

I

I

I

I

I (33

LIJO0 &0LIJ& I—

P3I CN

I

OCIOCJ

I

I

I

I

I

~lCN I

I

I

O

Page 16: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

US 9,225,688 B21

METHOD AND APPARATUS FORPROVIDING PRIVACY ADAPTATION BASED

ON RECEIVER CONTEXT

BACKGROUND

As context-aware applications become more popular,device manufacturers and service providers seek to improvethe quality of services offered to context-aware applicationusers. Trends in context-aware application have primarilyfocused on personalization, wherein a user' s context is moni-tored in order to determine services for that user. However,such context-based services may vary depending on the con-text and proximity of other users in the vicinity, and whetherthe other users present security concerns. As a result, thecontext-aware applications needs to adapt the privacy policiesof the at least one user in an ongoing communication sessionbased on detection ofother users within the vicinity by meansof another user in the communication session. Thereby, deter-mining one or more interaction modes for at least one user ina communication session in the presence of third.

SOME EXAMPLE EMBODIMENTS

Therefore, there is a need for an approach for determiningmodification to the privacy profile for information exchangedover the communication session between one or more devicesin a collaborative context detection relationship based, at leastin part, on the detection of the presence of the at least oneother device within a proximity threshold.

According to one embodiment, a method comprises deter-

mining a communication session established between at leastone first device of at least one first user and at least one seconddevice ofat least one second user, wherein the at least one firstdevice and the at least one second device are in a collaborativecontext detection relationship. The method also comprisescausing, at least in part, a detection of a presence of at leastone third user within a proximity threshold of the at least onefirst device, the at least one second device, the at least one firstuser, the at least one second user, or a combination thereof,wherein the detection is performed via the collaborative con-text detection relationship. The method further comprisesdetermining one or more modifications to one or more privacyprofiles for information exchanged over the communicationsession based, at least in part, on the detection ofthe presenceof the at least one third user.

According to another embodiment, an apparatus comprisesat least one processor, and at least one memory includingcomputer program code for one or more computer programs,the at least one memory and the computer program codeconfigured to, with the at least one processor, cause, at least inpart, the apparatus to determine a communication sessionestablished between at least one first device ofat least one firstuser and at least one second device ofat least one second user,wherein the at least one first device and the at least one seconddevice are in a collaborative context detection relationship.The apparatus is also caused to cause, at least in part, adetection of a presence of at least one third user within aproximity threshold of the at least one first device, the at leastone second device, the at least one first user, the at least onesecond user, or a combination thereof, wherein the detectionis performed via the collaborative context detection relation-ship. The apparatus is further causedto determine one ormoremodifications to one or more privacy profiles for informationexchanged over the communication session based, at least inpart, on the detection of the presence of the at least one thirduser.

10

15

20

25

30

35

40

45

50

55

60

65

According to another embodiment, a computer-readablestorage medium carries one or more sequences ofone or moreinstructions which, when executed by one or more proces-sors, cause, at least in part, an apparatus to determine a com-munication session established between at least one firstdevice of at least one first user and at least one second deviceofat least one second user, wherein the at least one first deviceand the at least one second device are in a collaborativecontext detection relationship. The apparatus is also caused tocause, at least in part, a detection of a presence of at least onethird user within a proximity threshold of the at least one firstdevice, the at least one second device, the at least one firstuser, the at least one second user, or a combination thereof,wherein the detection is performed via the collaborative con-text detection relationship. The apparatus is further caused todetermine one or more modifications to one or more privacyprofiles for information exchanged over the communicationsession based, at least in part, on the detection of the presenceof the at least one third user.

According to another embodiment, an apparatus comprisesmeans for determining a communication session establishedbetween at least one first device ofat least one first user and atleast one second device of at least one second user, whereinthe at least one first device and the at least one second deviceare in a collaborative context detection relationship. Theapparatus also comprises means for causing, at least in part, adetection of a presence of at least one third user within aproximity threshold of the at least one first device, the at leastone second device, the at least one first user, the at least onesecond user, or a combination thereof, wherein the detectionis performed via the collaborative context detection relation-ship. The apparatus further comprises means for determiningone or more modifications to one or more privacy profiles forinformation exchanged over the communication sessionbased, at least in part, on the detection of the presence of theat least one third user.

In addition, for various example embodiments ofthe inven-

tion, the following is applicable: a method comprising facili-tating a processing of and/or processing (I) data and/or (2)information and/or (3) at least one signal, the (I) data and/or

(2) information and/or (3) at least one signal based, at least inpart, on (or derived at least in part from) any one or anycombination of methods (or processes) disclosed in thisapplication as relevant to any embodiment of the invention.

For various example embodiments of the invention, thefollowing is also applicable: a method comprising facilitatingaccess to at least one interface

configured

t allow access to atleast one service, the at least one service configured to per-form any one or any combination of network or service pro-vider methods (or processes) disclosed in this application.

For various example embodiments of the invention, thefollowing is also applicable: a method comprising facilitatingcreating and/or facilitating modifying (I) at least one deviceuser interface element and/or (2) at least one device userinterface functionality, the (I) at least one device user inter-face element and/or (2) at least one device user interfacefunctionality based, at least in part, on data and/or informa-tion resulting from one or any combination of methods orprocesses disclosed in this application as relevant to anyembodiment ofthe invention, and/or at least one signal result-ing from one or any combination of methods (or processes)disclosed in this application as relevant to any embodiment ofthe invention.

For various example embodiments of the invention, thefollowing is also applicable: a method comprising creatingand/or modifying (I) at least one device user interface ele-ment and/or (2) at least one device user interface functional-

Page 17: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

US 9,225,688 B2

ity, the (I) at least one device user inter face element and/or (2)at least one device user interface functionality based at least in

part on data and/or information resulting from one or anycombination of methods (or processes) disclosed in thisapplication as relevant to any embodiment of the invention,and/or at least one signal resulting from one or any combina-tion ofmethods (or processes) disclosed in this application asrelevant to any embodiment of the invention.

In various example embodiments, the methods (or pro-cesses) can be accomplished on the service provider side oron the mobile device side or in any shared way betweenservice provider and mobile device with actions being per-formed on both sides.

For various example embodiments, the following is appli-cable: An apparatus comprising means for performing themethod of any of originally filed claims 1-10, 21-30, and46-4S.

Still other aspects, features, and advantages of the inven-tion are readily apparent from the following detailed descrip-tion, simply by illustrating a number of particular embodi-ments and implementations, including the best modecontemplated for carrying out the invention. The invention isalso capable of other and different embodiments, and itsseveral details can be modified in various obvious respects, allwithout departing from the spirit and scope of the invention.Accordingly, the drawings and description are to be regardedas illustrative in nature, and not as restrictive.

BRIEF DESCRIPTION OF THE DRAWINGS

The embodiments of the invention are illustrated by way ofexample, and not by way of limitation, in the figures of theaccompanying drawings:

FIG. 1 is a diagram of a system capable of determiningmodification to the privacy profile for information exchangedover the communication session between one or more devicesin a collaborative context detection relationship based, at leastin part, on the detection of the presence of the at least oneother device within a proximity threshold, according to oneembodiment;

FIG. 2 is a diagram of the components of the privacyplatform 109, according to one embodiment;

FIG. 3 is a flowchart of a process for adapting privacyprofiles between one or more users in an ongoing communi-cation session upon detecting a third user within the proxim-ity threshold, according to one embodiment;

FIG. 4 is a flowchart of a process for determining othermodifications and privacy preserving actions based, at least inpart, on the identification information, profile information,privacy policy information, relationship information, or acombination thereof, according to one embodiment;

FIG. 5 is a flowchart of a process for determining relation-ship information to cause a presentation ofother information,and further determining whether to relay a portion of theinformation exchanged over the communication sessionbetween the at least one third user and the one or more usersin the ongoing communication session, according to oneembodiment;

FIG. 6 is a flowchart of a process for causing a parsing ofone or more keywords and causing comparison of the key-words to determine their sensitivity level for the purpose ofrelaying information, according to one embodiment;

FIG. 7 is a user interface diagram that represents a scenarioof causing modifications to one or more privacy profiles forinformation exchanged over the communication session upondetection of the presence of the at least one third user, accord-ing to one example embodiment;

6

10

16

20

26

30

36

40

46

60

66

60

66

FIG. SA-C are user interface diagrams that represents ascenario of causing one or more privacy preserving actionsbased on the relationship information, the identification infor-mation, the profile information, the privacy policy informa-tion, or a combination thereof, of at least one third user,according to one example embodiment;

FIG. 9 is a user interface diagram representing a conversa-tion context adaptation based on third party users in the vicin-

ity, according to one example embodiment;FIG. 10 is a diagram of hardware that can be used to

implement an embodiment of the invention;FIG. 11 is a diagram of a chip set that can be used to

implement an embodiment of the invention; andFIG. 12 is a diagram of a mobile terminal (e.g. , handset)

that can be used to implement an embodiment of the inven-

tion.

DESCRIPTION OF SOME EMBODIMENTS

Examples of a method, apparatus, and computer programfor determining modification to the privacy profile for infor-mation exchanged over the communication session betweenone or more devices in a collaborative context detection rela-tionship based, at least in part, on the detection ofthe presenceof the at least one other device within a proximity thresholdare disclosed. Inthe following description, for the purposes ofexplanation, numerous specific details are set forth in order toprovide a thorough understanding of the embodiments of theinvention. It is apparent, however, to one skilled in the art thatthe embodiments of the invention may be practiced withoutthese specific details or with an equivalent arrangement. Inother instances, well-known structures and devices are shownin block diagram form in order to avoid unnecessarily obscur-ing the embodiments of the invention.

At present, context-aware applications are becomingincreasingly mainstream. Such services are able to infer theuser' s context in real-time based on the many sensors embed-ded in the user's device, user's home, user's office, and evenin public places. The gathered information is then used by theapplication to personalize their services for the user, to bettersuit the user's needs and preferences. Needless to mention,the context aware services has primarily focused on person-alization of services by monitoring only the user's context,thereby not acknowledging the context information of otherusers in the vicinity. As a result, a specific challenge occurswhen the context adaptation is based on the criteria ofnearbyusers. In one scenario, the relationship between user A anduser Bmay be static based on their pre-defined criteria or maybe established dynamically whenever user A is interactingwith user B via their respective UE 101. Such interactionbetween user A and user Bmay be affected by the presence ofa third user C in B's vicinity. The presence of user C mighthave privacy implications with respect to the interactionbetween user A and user B if the information exchangedduring the interaction is confidential in nature. On the otherhand, user C being a malicious user may overhear the confi-dential conversation between user A and user B.As a result,users are left vulnerable to privacy threats.

To address this problem, the system 100 of FIG. 1 intro-duces the capability to determine modification to the privacyprofile for information exchanged over the communicationsession between one or more devices in a collaborative con-text detection relationship based, at least in part, on the detec-tion of the presence of the at least one other device within aproximity threshold. In one embodiment, the variable factorsthat system 100 may take into consideration during contextadaptation includes:

Page 18: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

US 9,225,688 B2

(a) Whether the interaction between the one or more usersin an on-going communication session is sensitive?

(b) Whether the at least one detected third user within theproximity threshold of the one or more users in an on-

going communication session is trustworthy?

(c) Whether the at least one detected third user within theproximity threshold of the one or more users in an on-

going communication session adds value to the on-go-ing conversation?

In one embodiment, the system 100 may determine thetrustworthiness of the at least one detected third user withinthe proximity threshold of the one or more users in an on-

going communication session by determining the identityinformation and/or reputation information of the at least onedetected third user. In another embodiment, the system 100may further determine any pre-existing relationship betweenthe one or more users in the communication session and the atleast one detected third user. In a further scenario, the system100 may determine the proximity knowledge of the at leastone third user, whereby the at least one user in the commu-nication session may use the proximity information to deter-mine whether to relay limited information to the at least onethird user detected within the predetermined proximity. Inone scenario, the privacy platform 109 may determine theabove factors and assess them in an automated fashion duringcontext adaptation, wherein the unreliability ofcontext detec-tion based on the one or more available sensors is also takeninto account.

In one embodiment, the system 100 takes into consider-ation the privacy protection from the perspective ofthe at leastone detected third user within the proximity threshold. Inanother embodiment, the system 100may not reveal the pres-ence ofthe at least one detected third user and/or his device toone or more users in an on-going communication session. Ina further embodiment, the location information detected bythe at least one user in an on-going communication sessionabout the at least one third party within the proximity thresh-old may not be revealed to the other party(ies) in the commu-nication session because such revelation might be harmful tothe privacy of the at least one third user.

By way of example, the UE 101 is any type of mobileterminal, fixed terminal, or portable terminal including amobile handset, station, unit, device, multimedia computer,multimedia tablet, Internet node, communicator, desktopcomputer, laptop computer, notebook computer, netbookcomputer, tablet computer, personal communication system(PCS) device, personal navigation device, personal digitalassistants (PDAs), audio/video player, digital camera/cam-corder, positioning device, television receiver, radio broad-cast receiver, electronic book device, game device, or anycombination thereof, including the accessories and peripher-als of these devices, or any combination thereof. It is alsocontemplated that the UE 101 can support any type of inter-face to the user (such as "wearable" circuitry, etc.). In oneexample embodiment, user A and user B are engaged in anon-going communication session via their respective UE101a and UE 101b, wherein the sensors 105a of UE 101adetects the presence ofuser C and/or UE 101c.Subsequently,the privacy platform 109 causes a modification in the privacyprofile for the information exchanged during the conversationsession between user A and user B based, at least in part, onthe presence of user C in the vicinity.

In one embodiment, the applications 103 may be any typeofapplication that is executable at the UE 101,such as, mediaapplications (e.g. , music and/or video streaming, photoexchange, etc.), social networking applications, content pro-visioning services, location-based services (e.g. , providing

6

10

16

20

26

30

36

40

46

60

66

60

66

proximity information), an internet browser, and the like. Inanother embodiment, the applications 103 may serve as themeans by which the UE 101 and the privacy platform 109interact. For example, the applications 103may activate uponuser request or upon prompting from the privacy platform 109that at least one third user within a proximity threshold isdetected. For example, the applications 103 may act as theintermediary through which the privacy platform 109receives sensor information from a UE 101 and convey pri-vacy policy modifications to the UE 101 back from the pri-vacy platform 109.

By way of example, the sensors 105 may be any type ofsensors. In certain embodiments, the sensors 105 mayinclude, for example, a global positioning sensor for gather-ing location data, a network detection sensor for detectingwireless signals or network data, a camera/imaging sensor forgathering image data, and the like. In one embodiment, thesensors 105 may further include light sensors, tilt sensors,pressure sensors, audio sensors (e.g. , microphone), or receiv-ers for different short-range communications (e.g. , Blue-tooth, WiFi, etc.). In another embodiment, the sensors 105may determine the current device context and may correlatethe contextual information for verification of the sensitivitylevel for the information exchanged over the communicationsession.

The communication network 107 of system 100 includesone or more networks such as a data network, a wirelessnetwork, a telephony network, or any combination thereof. Itis contemplated that the data network may be any local areanetwork (LAN), metropolitan area network (MAN), widearea network (WAN), a public data network (e.g. , the Inter-

net), short range wireless network, or any other suitablepacket-switched network, such as a commercially owned,proprietary packet-switched network, e.g. , a proprietarycable or fiber-optic network, and the like, or any combinationthereof. In addition, the wireless network may be, forexample, a cellular network and may employ various tech-nologies including enhanced data rates for global evolution

(EDGE), general packet radio service (GPRS), global systemfor mobile communications (GSM), Internet protocol multi-media subsystem (IMS), universal mobile telecommunica-tions system (UMTS), etc. , as well as any other suitablewireless medium, e.g. , worldwide interoperability for micro-wave access (WIMAX), Long Term Evolution (LTE) net-works, code division multiple access (CDMA), widebandcode division multiple access (WCDMA), wireless fidelity(WIFi), wireless LAN (WLAN), Bluetooth, Internet Proto-col (IP) data casting, satellite, mobile ad-hoc network (MA-NET), and the like, or any combination thereof.

In one embodiment, the privacy platform 109 may be aplatform with multiple interconnected components. The pri-vacy platform 109 may include multiple servers, intelligentnetworking devices, computing devices, components andcorresponding software for determining modification to theprivacy profile for information exchanged over the commu-nication session between one or more devices in a collabora-tive context detection relationship based, at least in part, onthe detection of the presence of the at least one other devicewithin a proximity threshold.

In one embodiment, the privacy platform 109 determines acommunication session established between at least one firstdevice of at least one first user and at least one second deviceofat least one second user, wherein the at least one first deviceand the at least one second device are in a collaborativecontext detection relationship. In one example embodiment,the privacy platform 109 may cause an arrangement of col-laborative context detection among the devices of the partici-

Page 19: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

US 9,225,688 B2

pants in a communication session. Then, the privacy platform109 may detect the presence of at least one other user in thevicinity, and may identify and profile the detected user. Sub-sequently, the privacy platform 109 may determine thedetected user's relationship to the ongoing conversation andits participants. The privacy platform 109 may notify theusers of the ongoing conversation regarding the presence ofthe detected user in the vicinity. Consequently, the privacyplatform 109 may take privacy preserving actions or mayinclude the detected user in the conversation, either directly,or indirectly by relaying messages from the users in the com-munication session.

In one embodiment, the privacy platform 109 causes, atleast in part, a detection ofa presence ofat least one third userwithin a proximity threshold ofthe at least one first device, theat least one second device, the at least one first user, the at leastone second user, or a combination thereof, wherein the detec-tion is performed via the collaborative context detection rela-tionship. In one scenario, the privacy platform 109 considersthe dynamics of the at least one third user entering the con-versation, and the interplay of the potential participant's con-text with either the originator or receiver's context. The pri-vacy platform 109uses the context of the at least one detectedthird user to adapt the ongoing conversation, while preservingthe conversation privacy and those of the involved parties. Inone scenario, the conversation among one or more users canbe adapted based on the knowledge of the other users in thevicinity, wherein the privacy platform 109 may implementboth a privacy perspective where confidential conversationcan be better protected, as well as, a utility perspective wherethe potential new users in the vicinity that can contribute tothe conversation are identified and included in the conversa-tion.

In one embodiment, the privacy platform 109 determinesone or more modifications to one or more privacy profiles forinformation exchanged over the communication sessionbased, at least in part, on the detection of the presence of theat least one third user. In one scenario, the privacy platform109 adapts user A's services, including his interaction withanother user B, based on detection of a third user C in B'svicinity. Such adaptation allows achieving a privacy/utilitytrade-off with respect to user C' s profile, and its impact on theon-going conversation between user A and user B. In oneembodiment, the privacy platform 109 may take into consid-eration the following factors while performing the adapta-tion:

(a) The privacy implications with respect to revealing C'spresence to A, and vice versa;

(b) The pre-existing relationships (if any) between theinvolved parties: A, B and C;

(c) The conversation context and its confidentiality/sensi-tivity with respect to the involved parties; and

(d) The unreliability of sensing/context detection.In one embodiment, the technical steps involved in the

remote context adaptation ofuser A's services/conversationsbased on user B's context are as follows:

(a) Pre-existing (statically defined) relationship betweenuserA and user B:This relationship can be in the form ofa common application installed on both the participants '

UE 101, to monitor their context and relay the informa-tion to the other party.

(b) Dynamic relationship establishment: This relationshipoccurs when there is a negotiation between the contextmonitoring application installed on the UE 101 of theone or more participants to the on-going communicationsession. The negotiation between the monitoring appli-cation results in the following scenarios:

5

10

15

20

25

30

35

40

45

50

55

60

65

(I) User A's application is given access to (remotely)control certain sensors on B's device, or

(ii) User B's application agrees to monitor and relayoutput of a set of sensors on B's device to A's app. Inone scenario, the sensors and the type of accessallowed to the user data is selected based on the pri-vacy policies of the one or more users. In an extendedpre-existing relationship scenario, the set of appli-cable sensors can also include those available in theuser's environment, for instance, home, office etc.

(c) Adapt conversation based on context: In one scenario,user A adapts or controls the information he/she shareswith user B in the on-going conversation, based on theknowledge of user B's context, and vice versa. Inanother scenario, user B's context includes current loca-tion information, emotional state information, physicalactivity information, and any other related informationassociated with user B to determine the best time to sharesensitive information.

In one embodiment, the privacy plat form 109may adapt anongoing conversation or interaction between two or moreusers based on the detection of at least one third party user inthe vicinity. In one scenario, the solution can be generalized toa multi-party conversation, where the arrival of a new user inthe vicinity can be detected by any of the participants in theconversation. As discussed, the new arrival can impact theongoing conversation by either contributing positively to theconversation, or affecting its privacy. In one embodiment, theprivacy platform 109 upon detection of the at least one thirduser C in the vicinity may adapt the ongoing conversationbetween user A and user B in a following manner:

(a) Detection: The presence of one or more third party C isdetected by:(I) Sensors in B's device, for example, camera, micro-

phone.(ii) Door handle sensors or cameras in the room where

user B is located.(b) Privacy: In one scenario, user B's UE 101 may notify

user A regarding the presence ofuser C in the vicinity. Inanother scenario, the privacy plat form 109may considerthe one or more privacy restrictions, wherein the privacyplatform 109may apply the following logic to determinewhether user C's presence should be declared to user A:(I) Determine if there exists a pre-defined trust relation-

ship between user A and user C. If the privacy plat-form 109 is of determination that there exists a pre-defined trust relationship user A is notified regardingthe presence of user C in user B's vicinity.

(ii) In one scenario if the privacy platform 109 is ofdetermination that there does not exists a pre-definedtrust relationship between user A and user C, theprivacy platform 109may read the privacy policies ofuser C, wherein the privacy platform 109 evaluateuser C's privacy policies with respect to sharing hislocation with one or more users matching user A' s

profile. Ifallowed, the privacy platform 109may relayproximity information of user C to user B, to user A.

In one embodiment, if the privacy platform 109 is of deter-mination that the privacy policies are not supported, the alter-native is to get an explicit opt-in from user C. In one scenario,user B's UE 101may interact with user C's UE 101,to get hisexplicit approval, before disclosing his presence to user A. Inone scenario, where none of the above mentioned sharingoptions are available because of the restrictive privacy poli-cies of user C, the privacy platform 109 may still declare theproximity of user C to user A while obscuring user C's iden-

tity, for example, "Unknown user(s) in the vicinity ofB".In a

Page 20: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

US 9,225,688 B210

multi-party scenario ofnusers, if the presence ofU +I' useris detected by user U„ then the above process will need to beperformed with all the remaining n —I users.

In one embodiment, the privacy platform 109may counter-balance the privacy concerns by determining the contributionthat user C can make to the ongoing conversation betweenuser A and user B.This requires the privacy platform 109 todetermine the conversation context between user A and user

B, and then infer user C' s relationship to the conversation. Inanother embodiment, the privacy platform 109 may deter-mine the conversation context and the tone based, at least in

part, on the keywords used in the conversation. Further, userC' s relationship to the conversation can determined based onhis/her profile relationship to the identified keywords. Inaddition, user C's relationship with the other conversationparticipants can also be used as a basis to determine user C'srelationship to the conversation.

In one embodiment, the privacy platform 109 may deter-

mine unreliability with regards to information of one or moreuser detected within the vicinity depending on the accuracy ofthe sensing mechanism implemented. In one scenario, anuncertainty can be with respect to:

(a) Identity: 'User C' is in the room versus 'someone' is inthe vicinity.

(b) Trust: Trust level that exists between A and B, B and C,A and C.

(c)Data sensitivity: The confidentiality level ofdata sharedin the conversation, and how it relates to user C.

In one embodiment, the privacy platform 109 may accom-modate the unreliability in sensing by taking privacy preserv-ing actions, for example, obscuring certain parts of the con-versation, stopping the conversation altogether upondetecting a third user in the vicinity whose identity or rela-tionship to the conversation cannot be ascertained etc. Asdiscussed earlier, the presence of such a user can still benotified to the other conversation participants, for example,"Unknown user(s) in vicinity of B".

In one embodiment, the privacy platform 109 may includeor have access to the database 111to access or store any kindof data associated with one or more UE 101. In anotherembodiment, the privacy platform 109 may determine sensi-tivity level for one or more information exchanged over thecommunication session, the relationship information, theidentification information, the profile information, the pri-vacy policy information, or a combination thereof for at leastone UE 101by comparing the one or more data with the oneor more data stored in the database 111.The data stored in thedatabase 111may, for instance, be provided by the UE 101,the services platform 113, one or more services 115a-115n(herein after services 115),or one or more content providers117a-117n (herein after content providers 117).

The services platform 113may include any type of service.By way of example, the services platform 113 may includesocial networking services, content (e.g. , audio, video,images, etc.) provisioning services, application services, stor-

age services, contextual information determination services,location based services, information (e.g. , weather, news,etc.) based services, etc. In one embodiment, the servicesplatform 113may interact with the UE 101, the privacy plat-form 109 and the content providers 117to supplement or aidin the processing of the content information. In anotherembodiment, the services platform 113may provide the pri-vacy platform 109 with user preference information, contex-tual information etc. , to assist the privacy platform 109 indetermining one or more privacy protecting actions for infor-mation exchanged over the communication session.

6

10

16

20

26

30

36

40

46

60

66

60

66

By way of example, services 115may be an online servicethat reflects interests and/or activities of users. In one sce-nario, the services 115 provide representations of each user(e.g. , a profile), his/her social links, and a variety of additionalinformation. The services 115 allow users to share activitiesinformation, contextual information, and interests withintheir individual networks, and provides for data portability.The services 115 may additionally assist in providing theprivacy platform 109 in determining sensitivity levels for oneor more information exchanged over the communication ses-sion. In one embodiment, the services 115may further assistthe privacy platform 109 in profile mapping to protect theprivacy interest of the one or more users in a communicationsession. In another embodiment, the accessibility of the infor-mation exchanged over the communication session by one ormore services may be determined based, at least in part, ontheir reliability and trustworthiness. Further, user privacy pro-files may be specific to each service, for example, services115may deduce privacy profile settings based on user settingswith similar or analogous services using the same data.

The content providers 117may provide content to the UE101, the privacy platform 109, and the services 115 of theservices platform 113.The content provided may be any typeof content, such as textual content, audio content, video con-tent, image content, etc. In one embodiment, the contentproviders 117may provide content that may supplement con-tent of the applications 103, the sensors 105, or a combinationthereof. By way of example, the content providers 117mayprovide content that may aid the privacy platform 109 indetermining suitable privacy preserving actions for informa-tion exchanged over the communication session based, atleast in part, on their sensitivity level. In one embodiment, thecontent providers 117may also store content associated withthe UE 101,the privacy platform 109, and the services 115ofthe services platform 113.In another embodiment, the con-tent providers 117may manage access to a central repositoryof data, and offer a consistent, standard interface to user'sdata.

By way of example, the UE 101,the privacy platform 109,the services platform 113, and the content providers 117communicate with each other and other components of thecommunication network 107 using well known, new or stilldeveloping protocols. In this context, a protocol includes a setof rules defining how the network nodes within the commu-nication network 107 interact with each other based on infor-mation sent over the communication links. The protocols areeffective at different layers of operation within each node,from generating and receiving physical signals of varioustypes, to selecting a link for transferring those signals, to theformat of information indicated by those signals, to identi fy-ing which software application executing on a computer sys-tem sends or receives the information. The conceptually dif-ferent layers of protocols for exchanging information over anetwork are described in the Open Systems Interconnection(OSI) Reference Model.

Communications between the network nodes are typicallyeffected by exchanging discrete packets of data. Each packettypically comprises (I) header information associated with aparticular protocol, and (2) payload information that followsthe header information and contains information that may beprocessed independently of that particular protocol. In someprotocols, the packet includes (3) trailer information follow-ing the payload and indicating the end of the payload infor-mation. The header includes information such as the source ofthe packet, its destination, the length of the payload, and otherproperties used by the protocol. Often, the data in the payloadfor the particular protocol includes a header and payload for

Page 21: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

US 9,225,688 B212

a different protocol associated with a different, higher layer ofthe OSI Reference Model. The header for a particular proto-col typically indicates a type for the next protocol containedin its payload. The higher layer protocol is said to be encap-sulated in the lower layer protocol. The headers included in apacket traversing multiple heterogeneous networks, such asthe Internet, typically include a physical (layer I) header, adata-link (layer 2) header, an internetwork (layer 3) headerand a transport (layer 4) header, and various application (layer5, layer 6 and layer 7) headers as defined by the OSI Refer-ence Model.

FIG. 2 is a diagram of the components of the privacyplatform 109, according to one embodiment. By way ofexample, the privacy platform 109 includes one or more com-ponents for determining modification to the privacy profilefor information exchanged over the communication sessionbetween one or more devices in a collaborative context detec-tion relationship based, at least in part, on the detection of thepresence of the at least one other device within a proximitythreshold. It is contemplated that the functions of these com-ponents may be combined in one or more components orperformed by other components of equivalent functionality.In this embodiment, the privacy platform 109 includes a loca-tion module 201, a monitoring module 203, a context module205, an evaluation module 207 and a policy module 209.

In one embodiment, the location module 201 determinesthelocationofUEs101a-101c. Thelocationmodule201maydetermine the location in real-time and refresh the locationinformation as the users carrying the UEs 101a-101care onthe move. The real-time location information enables thelocation module 201 to keep track of the travel path for eachUE 101. Furthermore, the location module 201 may belocated on the UE 101, to collect location information asso-ciated with each UE 101,and transmit the collected informa-tion to the privacy platform 109. In one scenario, the privacyplatform 109may detect the presence of at least one other UE101within a proximity threshold based, at least in part, on theinformation provided by the location module 201.

In one embodiment, the monitoring module 203 monitorsthe proximity information, the relationship information, theidentification information, the profile information, the pri-vacy policy information, or a combination thereof associatedwith UE 101a-101cin a collaborative context detection rela-tionship. The monitoring module 203 may monitor suchinformation in real-time, periodically, based on a pre-deter-mined schedule, based on demands from one or more UEs101a-101c,based on demands from the policy module 209, ora combination thereof. The policy module 209 uses the col-lected information via the monitoring module 203 for deter-mining the privacy policies.

In one embodiment, the context module 205 determines thecontext of an ongoing communication session and its sensi-tivity with respect to the involved parties. In one embodiment,the context module 205 may be in the form of a commonapplication installed on the respective UE 101's of the par-ticipants in a communication session, wherein the contextmodule 205 may monitor the context and may relay the infor-mation to the other party in the communication session. Inanother scenario, such collaborative context detection rela-tionship enables access of one or more sensors associatedwith the at least one second device by the at least one firstdevice in the communication session for detecting the pres-ence of the at least one third user

In one embodiment, the evaluation module 207 may evalu-

ate the sensitivity level of at least one communication sessionbetween one or more parties. In another embodiment, theevaluation module 207 may determine the trustworthiness of

6

10

16

20

26

30

36

40

46

60

66

60

66

the at least one third user within a proximity threshold, forexample, the evaluation module 207 may retrieve the reputa-tion information of the at least one third user, for example, todetermine whether the at least one third user is a malicioususer. In a further embodiment, the evaluation module 207may determine if the at least one third user has a pre-existingrelationship with the users in the ongoing communicationsession to further determine whether the third user can addadditional value in the ongoing conversation.

In one embodiment, the policy module 209 may processthe context of the third user within a proximity threshold toadapt an ongoing communication session establishedbetween at least one first device ofat least one first user and atleast one second device of at least one second user whilepreserving the privacy of the communication session. In oneembodiment, the at least one privacy preserving action mayinclude obscuring of data transmitted over the communica-tion session, for example, encrypting the data using variouscryptography methods in order to prevent unauthorizedaccess to the data. In another embodiment, the policy module209 may implement various privacy preserving actions, forexample, hiding of the presence of the at least one third userand/or hiding of the identification information of the at leastone third user and/or hiding of other identification informa-tion of the at least one first user and the at least one seconduser etc.

The above presented modules and components of the pri-vacy platform 109 can be implemented in hardware, firm-

ware, software, or a combination thereof. Though depicted asa separate entity in FIG. 1, it is contemplated that the privacyplatform 109 may be implemented for direct operation byrespective UE 101.As such, the privacy platform 109 maygenerate direct signal inputs by way of the operating systemof the UE 101 for interacting with the applications 103. Inanother embodiment, one or more of the modules 201-209may be implemented for operation by respective UEs, as aprivacy platform 109, or combination thereof. Still further,the privacy platform 109 may be integrated for direct opera-tion with services 115, such as in the form of a widget orapplet, in accordance with an information and/or subscribersharing arrangement. The various executions presentedherein contemplate any and all arrangements and models.

FIG. 3 is a flowchart of a process for adapting privacyprofiles between one or more users in an ongoing communi-cation session upon detecting a third user within the proxim-ity threshold, according to one embodiment. In one embodi-ment, the privacy platform 109 performs the process 300 andis implemented in, for instance, a chip set including a proces-sor and a memory as shown in FIG. 11.

In step 301, the privacy platform 109 determines a com-munication session established between at least one firstdevice of at least one first user and at least one second deviceofat least one second user, wherein the at least one first deviceand the at least one second device are in a collaborativecontext detection relationship. In one embodiment, the col-laborative context detection relationship enables the at leastone first device to access one or more sensors associated withthe at least one second device for detecting the presence oftheat least one third user. In another embodiment, the one ormore sensors include, at least in part, one or more internalsensors of at least one second device, one or more externalsensors accessible by the at least one second device, or acombination thereo f.

In step 303, the privacy platform 109causes, at least in part,a detection of a presence of at least one third user within aproximity threshold of the at least one first device, the at leastone second device, the at least one first user, the at least one

Page 22: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

13US 9,225,688 B2

14second user, or a combination thereof, wherein the detectionis performed via the collaborative context detection relation-ship. In one scenario, the privacy platform 109 causes col-laborative context detection among the UE 101s of the con-versation participants to detect the presence of one or moreother users in the vicinity. In another scenario, such collabo-rative context detection mechanism assists in determining theidentity information, profile information, relationship infor-mation, privacy profile information, or a combination thereofbetween the at least one first user and the at least one seconduser engaged in an on-going communication session, and theat least one detected third user.

In step 305, the privacy platform 109 determines one ormore modifications to one or more privacy profiles for infor-mation exchanged over the communication session based, atleast in part, on the detection of the presence of the at least onethird user. In one embodiment, the privacy platform 109causes one or more privacy preserving actions, for example,the privacy platform 109 may obscure the informationexchanged between user A and user B during a communica-tion session upon detection of the presence of user C in thevicinity. The obscuring of the information is done to preventuser C from spying on the information. In one scenario, theprivacy platform 109 may completely prevent user C fromaccessing the information exchanged between user A anduser B, or may allow partial access to the information. Theprivacy platform 109may make such determination based, atleast in part, on a trusted relationship created with user C. Inanother scenario, the privacy platform 109 may create atrusted relationship with user C upon processing of the iden-

tity information, profile information, relationship informa-tion, privacy policy information, or a combination thereofassociated with user C. In a further scenario, the privacyplatform 109 may hide the identity of user C while declaringhis/her presence to user A and user B, thereby causing anymodification to the privacy profile as required.

FIG. 4 is a flowchart of a process for determining othermodifications and privacy preserving actions based, at least inpart, on the identification information, profile information,privacy policy information, relationship information, or acombination thereof, according to one embodiment. In oneembodiment, the privacy platform 109 performs the process400 and is implemented in, for instance, a chip set includinga processor and a memory as shown in FIG. 11.

In step 401, the privacy platform 109 determines one ormore other modifications to the communication session, theinformation exchanged over the communication session, or acombination thereof based, at least in part, on the detection ofthe presence ofthe at least one third user. In one scenario, userA and user B are in a communication session, wherein user Ahas access to user B's context information in terms of user B'slocation and nearby users. In a further scenario, assuminguser C is approaching user B, then user A may access theoutput of user B's sensors to detect user C, and may requestuser C's privacy profile while in conversation with user B.Further, user A may control user B's sensors to detect thepossible appearance of user C nearby and identify user Cthrough the detection under the control ofuser B.In addition,user A may determine user C's privacy profile as if user C'sprofile is in user A's address book, or that user A is able tosend a query to user C to obtain user C's privacy profile. Then,the privacy plat form 109may adapt the privacy profile ofuserA and user B to cause a modification in the communicationsession and/or the information exchanged over the commu-nication session.

In step 403, the privacy platform 109 determines identifi-cation information, profile information, privacy policy infor-

6

10

16

20

26

30

36

40

46

60

66

60

66

mation, or a combination thereof associated with the at leastone third user, at least one third device associated with the atleast one third user, or a combination thereof. In one scenario,the privacy platform 109 may detect at least one third personwithin a proximity threshold, whereby the privacy platform109 may take several actions based on the reliability of thecontext detection, for example, the privacy platform 109mayprocess the identification information and/or the profile infor-mation of the detected third person. Then, the privacy plat-form 109 may identify the at least one third person as user Cwho has a pre-existing relationship with user A. In anotherscenario, the privacy platform 109may determine the privacypolicies associated with the one or more user in the commu-nication session and the at least one third user within theproximity threshold to determine the sharing of informationexchanged during the communication session.

In step 405, the privacy platform 109causes, at least in part,a presentation of one or more notification messages at the atleast one first device, the at least one second device, or acombination thereof based, at least in part, on the profileinformation, privacy policy information, or a combinationthereof, wherein the one or more notification messages relate,at least in part, to the presence of the at least one third user. Inone scenario, user B is engaged in an on-going communica-tion session with user A, wherein user B detects the presenceof the at least one other user within a close proximity to userB.Then, the privacy platform 109 identifies and profiles thedetected other user, for example, the privacy platform 109may determine the detected other user to be user C. Subse-quently, the privacy platform 109 determines the relationshipofuser C to the ongoing conversation and its participants userA and B.Consequently, the privacy platform 109 may notifyuser A and user B about the presence ofuser C in the vicinitybased, at least in part, on the determined information.

In step 407, the privacy platform 109 determines whetherto cause, at least in part, an initiation of one or more privacypreserving actions based, at least in part, on the relationshipinformation, the identification information, the profile infor-mation, the privacy policy information, or a combinationthereof. In one embodiment, the one or more privacy preserv-ing actions include, at least in part, (a) obscuring of datatransmitted over the communication session; (b) hiding ofthepresence of the at least one third user; (c) hiding of theidentification information of the at least one third user; (d)hiding of other identification information of the at least onefirst user, the at least one second user, or a combinationthereof; or (e) a combination thereof.

FIG. 5 is a flowchart of a process for determining relation-ship information to cause a presentation of other information,and further determining whether to relay a portion of theinformation exchanged over the communication sessionbetween the at least one third user and the one or more usersin the ongoing communication session, according to oneembodiment. In one embodiment, the privacy platform 109performs the process 500 and is implemented in, for instance,a chip set including a processor and a memory as shown inFIG. 11.

In step 501, the privacy platform 109 determines relation-ship information between (a) the at least one third user and (b)the at least one first user, the at least one second user, or acombination thereof. In one scenario, the privacy platform109 may determine relationship of the at least one third userto the on-going communication session and its participant,wherein the relationship may be pre-existing or dynamic. Inanother scenario, the privacy platform 109 may determine apre-defined trust relationship between the at least one thirduser, and the at least one first user and/or the at least one

Page 23: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

15US 9,225,688 B2

16second user. In a further scenario, the privacy platform 109may determine the conversation context of the at least onefirst user and the at least one second user, and may determinethe relationship of the at least one detected third user to theconversation by inferring his/her relationship to the conver-sation, if any.

In step 503, the privacy platform 109 determines whetherto present at least a portion of the identification information,the profile information, privacy policy information, or a com-bination thereof in the one or more notification messagesbased, at least in part, on the relationship information. In onescenario, the privacy platform 109 may identify at least onethird user and may determine his/her relationship with theongoing conversation and the participants to the conversa-tion. Then, the privacy platform 109 may notify the at leastone first user and the at least one second user in the commu-nication session about the presence of the at least one thirduser in the vicinity. In another scenario, if the privacy plat-form 109 is unable ascertain the identity of the detected thirduser or his/her relationship to the on-going conversation ses-sion, the privacy platform 109 may notify the presence ofsuch user as "Unknown user in vicinity of B".

In step 505, the privacy platform 109 determines whetherto relay at least a portion of the information exchanged overthe communication session to the at least one third user, the atleast one third device, or a combination thereof in the com-munication session based, at least in part, on the relationshipinformation, the identification information, the profile infor-mation, the privacy policy information, or a combinationthereof. In one scenario, the privacy platform 109may evalu-

ate the privacy policies of the one or more users in the com-munication session to determine whether to relay the infor-mation exchanged to the at least one third user. In anotherscenario, for the purpose of relaying information, the privacyplatform 109may process relationship information and/or theprofile information of the at least one third user to determinewhether the at least one third user may add value to theon-going conversation. In addition, the privacy platform 109may process the relationship information and/or the profileinformation of the at least one third user to determine his/hertrustworthiness.

FIG. 6 is a flowchart of a process for causing a parsing ofone or more keywords and causing comparison of the key-words to determine their sensitivity level for the purpose ofrelaying information, according to one embodiment. In oneembodiment, the privacy platform 109 performs the process600 and is implemented in, for instance, a chip set includinga processor and a memory as shown in FIG. 11.

In step 601, the privacy platform 109 processes and/orfacilitates a processing of information exchanged over thecommunication session to cause, at least in part, a parsing ofone or more keywords. In one scenario, the privacy platform109 may determine the confidentiality of the informationexchanged during the communication session based, at leastin part, on the presence of one or more keywords in theconversation that denotes secrecy, for example, the privacyplatform 109 may determine the sensitivity level of a com-munication based on the medical keywords in the conversa-tion.

In step 603, the privacy platform 109causes, at least in part,a comparison of the one or more keywords against the rela-tionship information, the identification information, the pro-file information, the privacy policy information, or a combi-nation thereof to determine whether to relay at least a portionof the information exchanged over the communication ses-sion to the at least one third user, the at least one third device,or a combination thereof. In one scenario, the privacy plat-

6

10

16

20

26

30

36

40

46

60

66

60

66

form 109may determine the relationship between the at leastone third user within the proximity threshold and the com-munication session based on his/her profile relationship to theidentified keyword. In another scenario, the privacy platform109 may determine whether the at least one detected thirduser is trustworthy by determining his/her identity. The pri-vacy platform 109 may further retrieve the reputation infor-mation of the at least one detected third user, and determine ifthe at least one third user shares a pre-existing relationshipwith the one or more parties in the ongoing communicationsession.

FIG. 7 is a user interface diagram that represents a scenarioof causing modifications to one or more privacy profiles forinformation exchanged over the communication session upondetection of the presence of the at least one third user, accord-ing to one example embodiment. In one scenario, user A [701]is chatting with user B [703]via his UE 101 [705].User A hasaccess to user B's context information in terms of user B'slocation and nearby users, for example, user B's colleagueuser C is nearby user B [707]. In another scenario, theaccessed contextual information may be used by user A toeither restrict the sharing of the sensitive information sharedwith user Bduring the conversation with user C [709]or allowthe sharing of the information with user C [711].In a furtherscenario, user A may use the proximity knowledge to ask userB to relay some information to user C [713]or not [715].Insuch a manner the conversation or the interaction amongstmultiple users can be adapted based on the knowledge of theother users in the vicinity. The conversation benefits are bothfrom a privacy perspective where confidential conversationcan be better protected, as well as from a utility perspectivewhere potential new users in the vicinity that can contribute tothe conversation are identified and included in the conversa-tion.

FIG. SA-C are user interface diagrams that represents ascenario of causing one or more privacy preserving actionsbased on the relationship information, the identification infor-mation, the profile information, the privacy policy informa-tion, or a combination thereof, of at least one third user,according to one example embodiment. In one scenario, userA [S01]and user B [S03] are doctors engaged in discussionregarding user C's medical condition [S05].As soon as aperson X enters the room [S07],the privacy platform 109maytake several actions based on the reliability of the contextdetection [S09]. In one example embodiment, the privacyplatform 109may identify person X as another doctor D whois also involved in user C's treatment, whereby user D is alsoincluded in the conversation [S11]. In another exampleembodiment, the privacy platform 109may identify person Xas doctor D, who is not associated with the case of user C,despite this the privacy platform 109 may allow user A anduser B to continue their conversation in the presence ofdoctorD because the privacy platform 109 is in a trusted relationshipwith doctor D [S13].In a further example embodiment, upondetecting the presence of at least one person X who is not apart of the ongoing conversation, the privacy platform 109may determine the sensitivity level of the exchanged infor-mation between user A and user B, for example, based on thepresence of the medical keywords in the conversation theprivacy platform 109 may determine that the information inthe conversation session is confidential [S15].Subsequently,the privacy platform 109 may impose the privacy protectivemeasures upon identification of the one or more keywords[S17], for example, certain parts of the conversation that issensitive for user C may be obscured [S19]from other userstrying to access the conversation, or not [S21]. Further, ifsensitive parts ofthe conversation cannot be determined accu-

Page 24: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

17US 9,225,688 B2

18rately [S23], the privacy platform 109 may terminate theconversation [S25]or continue over a different medium [S27].

FIG. 9 is a user interface diagram representing a conversa-tion context adaptation based on third party users in the vicin-ity, according to one example embodiment. In one embodi-ment, the privacy platform 109causes a setup ofcollaborativecontext detection among the devices of the conversation par-ticipants [901].In one scenario, user A [903, 905], user B[907, 909], user C [911, 913] and user D [915, 917] areengaged in an ongoing communication session. The privacyplatform 109detects the presence ofthe at least one other userin the vicinity [919, 921] and identifies and profiles thedetected other user [919,921].Then, the privacy platform 109determines the relationship of the detected other user [919,921] to the ongoing conversation and its participants [923].Subsequently, the privacy platform 109may notify the one ormore users engaged in the ongoing communication session[903, 905, 907, 909, 911,913, 915, and 917] about the pres-ence of the other user [919, 921] in the vicinity [925]. Inanother scenario, the privacy plat form 109may determine thesensitiveness level of the exchanged information and maytake privacy preserving action [925],for example, by obscur-ing of the information in a conversation to protect the datafrom being eavesdropped by other users not in the communi-cation session, or by hiding of the identity of the other userwithin the vicinity while declaring his/her presence to theother participants [925].As discussed, the potential new user[919,921] in the vicinity that can contribute to the conversa-tion are identified and included in the conversation eitherdirectly or indirectly by relaying of messages from the usersin the ongoing communication session to the at least one otheruser within the proximity threshold [925].

The processes described herein for determining modifica-tion to the privacy profile for information exchanged over thecommunication session between one or more devices in acollaborative context detection relationship based, at least inpart, on the detection of the presence of the at least one otherdevice within a proximity threshold may be advantageouslyimplemented via software, hardware, firmware or a combi-nation of software and/or firmware and/or hardware. Forexample, the processes described herein, may be advanta-geously implemented via processor(s), Digital Signal Pro-cessing (DSP) chip, an Application Specific Integrated Cir-cuit (ASIC), Field Programmable Gate Arrays (FPGAs), etc.Such exemplary hardware for performing the described func-tions is detailed below.

FIG. 10 illustrates a computer system 1000 upon which anembodiment of the invention may be implemented. Althoughcomputer system 1000 is depicted with respect to a particulardevice or equipment, it is contemplated that other devices orequipment (e.g. , network elements, servers, etc.) within FIG.10 can deploy the illustrated hardware and components ofsystem 1000. Computer system 1000 is programmed (e.g. ,via computer program code or instructions) to determinemodification to the privacy profile for information exchangedover the communication session between one or more devicesin a collaborative context detection relationship based, at leastin part, on the detection of the presence of the at least oneother device within a proximity threshold as described hereinand includes a communication mechanism such as a bus 1010for passing information between other internal and externalcomponents of the computer system 1000. Information (alsocalled data) is represented as a physical expression of a mea-surable phenomenon, typically electric voltages, but includ-

ing, in other embodiments, such phenomena as magnetic,electromagnetic, pressure, chemical, biological, molecular,atomic, sub-atomic and quantum interactions. For example,

6

10

16

20

26

30

36

40

46

60

66

60

66

north and south magnetic fields, or a zero and non-zero elec-tric voltage, represent two states (0, I) of a binary digit (bit).Other phenomena can represent digits of a higher base. Asuperposition of multiple simultaneous quantum statesbefore measurement represents a quantum bit (qubit). Asequence of one or more digits constitutes digital data that isused to represent a number or code for a character. In someembodiments, information called analog data is representedby a near continuum ofmeasurable values within a particularrange. Computer system 1000, or a portion thereof, consti-tutes a means for performing one or more steps of determin-ing modification to the privacy profile for informationexchanged over the communication session between one ormore devices in a collaborative context detection relationshipbased, at least in part, on the detection of the presence of theat least one other device within a proximity threshold.

A bus 1010 includes one or more parallel conductors ofinformation so that information is transferred quickly amongdevices coupled to the bus 1010. One or more processors1002 for processing information are coupled with the bus1010.

A processor (or multiple processors) 1002performs a set ofoperations on information as specified by computer programcode related to determine modification to the privacy profilefor information exchanged over the communication sessionbetween one or more devices in a collaborative context detec-tion relationship based, at least in part, on the detection of thepresence of the at least one other device within a proximitythreshold. The computer program code is a set of instructionsor statements providing instructions for the operation of theprocessor and/or the computer system to perform specifiedfunctions. The code, for example, may be written in a com-puter programming language that is compiled into a nativeinstruction set of the processor. The code may also be writtendirectly using the native instruction set (e.g. , machine lan-

guage). The set ofoperations include bringing information infrom the bus 1010 and placing information on the bus 1010.The set of operations also typically include comparing two ormore units of information, shifting positions ofunits of infor-mation, and combining two or more units of information,such as by addition or multiplication or logical operations likeOR, exclusive OR (XOR), and AND. Each operation of theset of operations that can be performed by the processor isrepresented to the processor by information called instruc-tions, such as an operation code of one or more digits. Asequence of operations to be executed by the processor 1002,such as a sequence of operation codes, constitute processorinstructions, also called computer system instructions or,simply, computer instructions. Processors may be imple-mented as mechanical, electrical, magnetic, optical, chemi-cal, or quantum components, among others, alone or in com-bination.

Computer system 1000 also includes a memory 1004coupled to bus 1010.The memory 1004, such as a randomaccess memory (RAM) or any other dynamic storage device,stores information including processor instructions for deter-mining modification to the privacy profile for informationexchanged over the communication session between one ormore devices in a collaborative context detection relationshipbased, at least in part, on the detection of the presence of theat least one other device within a proximity threshold.Dynamic memory allows information stored therein to bechanged by the computer system 1000.RAM allows a unit ofinformation stored at a location called a memory address to bestored and retrieved independently of information at neigh-boring addresses. The memory 1004 is also used by the pro-cessor 1002 to store temporary values during execution of

Page 25: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

19US 9,225,688 B2

20processor instructions. The computer system 1000 alsoincludes a read only memory (ROM) 1006 or any other staticstorage device coupled to the bus 1010 for storing staticinformation, including instructions, that is not changed by thecomputer system 1000. Some memory is composed of vola-tile storage that loses the information stored thereon whenpower is lost. Also coupled to bus 1010 is a non-volatile(persistent) storage device 100S, such as a magnetic disk,optical disk or flash card, for storing information, includinginstructions, that persists even when the computer system1000 is turned off or otherwise loses power.

Information, including instructions for determining modi-fication to the privacy profile for information exchanged overthe communication session between one or more devices in acollaborative context detection relationship based, at least inpart, on the detection of the presence of the at least one otherdevice within a proximity threshold, is provided to the bus1010 for use by the processor from an external input device1012, such as a keyboard containing alphanumeric keys oper-ated by a human user, a microphone, an Infrared (IR) remotecontrol, a joystick, a game pad, a stylus pen, a touch screen, ora sensor. A sensor detects conditions in its vicinity and trans-forms those detections into physical expression compatiblewith the measurable phenomenon used to represent informa-tion in computer system 1000.Other external devices coupledto bus 1010, used primarily for interacting with humans,include a display device 1014, such as a cathode ray tube(CRT), a liquid crystal display (LCD), a light emitting diode(LED) display, an organic LED (OLED) display, a plasmascreen, or a printer for presenting text or images, and a point-ing device 1016, such as a mouse, a trackball, cursor directionkeys, or a motion sensor, for controlling a position of a smallcursor image presented on the display 1014and issuing com-mands associated with graphical elements presented on thedisplay 1014, and one or more camera sensors 1094 for cap-turing, recording and causing to store one or more still and/or

moving images (e.g. , videos, movies, etc.) which also maycomprise audio recordings. In some embodiments, forexample, in embodiments in which the computer system 1000performs all functions automatically without human input,one or more of external input device 1012, display device1014 and pointing device 1016may be omitted.

In the illustrated embodiment, special purpose hardware,such as an application specific integrated circuit (ASIC)1020, is coupled to bus 1010.The special purpose hardware isconfigured to perform operations not performed by processor1002 quickly enough for special purposes. Examples ofASICs include graphics accelerator cards for generatingimages for display 1014,cryptographic boards for encryptingand decrypting messages sent over a network, speech recog-nition, and interfaces to special external devices, such asrobotic arms and medical scanning equipment that repeatedlyperform some complex sequence of operations that are moreefficiently implemented in hardware.

Computer system 1000 also includes one or more instancesof a communications interface 1070 coupled to bus 1010.Communication interface 1070 provides a one-way or two-way communication coupling to a variety of external devicesthat operate with their own processors, such as printers, scan-ners and external disks. In general the coupling is with anetwork link 107Sthat is connected to a local network 10S0towhich a variety of external devices with their own processorsare connected. For example, communication interface 1070may be a parallel port or a serial port or a universal serial bus

(USB) port on a personal computer. In some embodiments,communications interface 1070 is an integrated services digi-tal network (ISDN) card or a digital subscriber line (DSL)

5

10

15

20

25

30

35

40

45

50

55

60

65

card or a telephone modem that provides an informationcommunication connection to a corresponding type of tele-phone line. In some embodiments, a communication interface1070 is a cable modem that converts signals on bus 1010 intosignals for a communication connection over a coaxial cableor into optical signals for a communication connection over afiber optic cable. As another example, communications inter-face 1070 may be a local area network (LAN) card to providea data communication connection to a compatible LAN, suchas Ethernet. Wireless links may also be implemented. Forwireless links, the communications interface 1070 sends orreceives or both sends and receives electrical, acoustic orelectromagnetic signals, including infrared and optical sig-nals, that carry information streams, such as digital data. Forexample, in wireless handheld devices, such as mobile tele-phones like cell phones, the communications interface 1070includes a radio band electromagnetic transmitter andreceiver called a radio transceiver. In certain embodiments,the communications interface 1070 enables connection to thecommunication network 107 for determining modification tothe privacy profile for information exchanged over the com-munication session between one or more devices in a collabo-rative context detection relationship based, at least in part, onthe detection of the presence of the at least one other devicewithin a proximity threshold to the UE 101.

The term "computer-readable medium" as used hereinrefers to any medium that participates in providing informa-tion to processor 1002, including instructions for execution.Such a medium may take many forms, including, but notlimited to computer-readable storage medium (e.g. , non-volatile media, volatile media), and transmission media. Non-transitory media, such as non-volatile media, include, forexample, optical or magnetic disks, such as storage device100S.Volatile media include, for example, dynamic memory1004. Transmission media include, for example, twisted paircables, coaxial cables, copper wire, fiber optic cables, andcarrier waves that travel through space without wires orcables, such as acoustic waves and electromagnetic waves,including radio, optical and infrared waves. Signals includeman-made transient variations in amplitude, frequency,phase, polarization or other physical properties transmittedthrough the transmission media. Common forms of com-puter-readable media include, for example, a floppy disk, aflexible disk, hard disk, magnetic tape, any other magneticmedium, a CD-ROM, CDRW, DVD, any other opticalmedium, punch cards, paper tape, optical mark sheets, anyother physical medium with patterns of holes or other opti-cally recognizable indicia, a RAM, a PROM, an EPROM, aFLASH-EPROM, an EEPROM, a flash memory, any othermemory chip or cartridge, a carrier wave, or any othermedium from which a computer can read. The term com-puter-readable storage medium is used herein to refer to anycomputer-readable medium except transmission media.

Logic encoded in one or more tangible media includes oneor both of processor instructions on a computer-readablestorage media and special purpose hardware, such as ASIC1020.

Network link 107S typically provides information commu-nication using transmission media through one or more net-works to other devices that use or process the information. Forexample, network link 107S may provide a connectionthrough local network 10SO to a host computer 10S2 or toequipment 10S4 operated by an Internet Service Provider(ISP). ISP equipment 10S4 in turn provides data communi-cation services through the public, world-wide packet-switching communication network of networks now com-monly referred to as the Internet 1090.

Page 26: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

21US 9,225,688 B2

22A computer called a server host 1092 connected to the

Internet hosts a process that provides a service in response toinformation received over the Internet. For example, serverhost 1092 hosts a process that provides information repre-senting video data for presentation at display 1014. It iscontemplated that the components of system 1000 can bedeployed in various configurations within other computersystems, e.g. , host 10S2 and server 1092.

At least some embodiments of the invention are related tothe use of computer system 1000 for implementing some orall of the techniques described herein. According to oneembodiment of the invention, those techniques are performed

by computer system 1000 in response to processor 1002executing one or more sequences of one or more processorinstructions contained in memory 1004. Such instructions,also called computer instructions, software and programcode, may be read into memory 1004 from another computer-readable medium such as storage device 100Sor network link107S.Execution of the sequences of instructions contained inmemory 1004 causes processor 1002 to perform one or moreof the method steps described herein. In alternative embodi-ments, hardware, such as ASIC 1020, may be used in place ofor in combination with software to implement the invention.Thus, embodiments of the invention are not limited to anyspecific combination ofhardware and software, unless other-wise explicitly stated herein.

The signals transmitted over network link 107S and othernetworks through communications interface 1070, carryinformation to and from computer system 1000. Computersystem 1000 can send and receive information, includingprogram code, through the networks 10SO, 1090 among oth-

ers, through network link 1078and communications interface1070. In an example using the Internet 1090, a server host1092 transmits program code for a particular application,requested by a message sent from computer 1000, throughInternet 1090, ISP equipment 10S4, local network 10SO andcommunications interface 1070. The received code may beexecuted by processor 1002 as it is received, or may be storedin memory 1004 or in storage device 100S or any othernon-volatile storage for later execution, or both. In this man-ner, computer system 1000 may obtain application programcode in the form of signals on a carrier wave.

Various forms of computer readable media may beinvolved in carrying one or more sequence of instructions ordata or both to processor 1002 for execution. For example,instructions and data may initially be carried on a magneticdisk of a remote computer such as host 10S2. The remotecomputer loads the instructions and data into its dynamicmemory and sends the instructions and data over a telephoneline using a modem. A modem local to the computer system1000 receives the instructions and data on a telephone lineand uses an infra-red transmitter to convert the instructionsand data to a signal on an infra-red carrier wave serving as thenetwork link 107S.An infrared detector serving as commu-nications interface 1070 receives the instructions and datacarried in the infrared signal and places information repre-senting the instructions and data onto bus 1010. Bus 1010carries the information to memory 1004 from which proces-sor 1002 retrieves and executes the instructions using some ofthe data sent with the instructions. The instructions and datareceived in memory 1004 may optionally be stored on storagedevice 100S, either before or after execution by the processor1002.

FIG. 11 illustrates a chip set or chip 1100 upon which anembodiment of the invention may be implemented. Chip set1100 is programmed to determine modification to the privacyprofile for information exchanged over the communication

6

10

16

20

26

30

36

40

46

60

66

60

66

session between one or more devices in a collaborative con-text detection relationship based, at least in part, on the detec-tion of the presence of the at least one other device within aproximity threshold as described herein and includes, forinstance, the processor and memory components describedwith respect to FIG. 10 incorporated in one or more physicalpackages (e.g. , chips). By way of example, a physical pack-age includes an arrangement of one or more materials, com-ponents, and/or wires on a structural assembly (e.g. , a base-board) to provide one or more characteristics such as physical

strength, conservation of size, and/or limitation of electricalinteraction. It is contemplated that in certain embodiments thechip set 1100can be implemented in a single chip. It is furthercontemplated that in certain embodiments the chip set or chip1100can be implemented as a single "system on a chip."It isfurther contemplated that in certain embodiments a separateASIC would not be used, for example, and that all relevantfunctions as disclosed herein would be performed by a pro-cessor or processors. Chip set or chip 1100, or a portionthereof, constitutes a means for performing one or more stepsofproviding user interface navigation information associatedwith the availability of functions. Chip set or chip 1100, or aportion thereof, constitutes a means for performing one ormore steps of determining modification to the privacy profilefor information exchanged over the communication sessionbetween one or more devices in a collaborative context detec-tion relationship based, at least in part, on the detection of thepresence of the at least one other device within a proximitythreshold.

In one embodiment, the chip set or chip 1100 includes acommunication mechanism such as a bus 1101 for passinginformation among the components of the chip set 1100.Aprocessor 1103 has connectivity to the bus 1101 to executeinstructions and process information stored in, for example, amemory 1105.The processor 1103may include one or moreprocessing cores with each core configured to perform inde-pendently. A multi-core processor enables multiprocessingwithin a single physical package. Examples of a multi-coreprocessor include two, four, eight, or greater numbers ofprocessing cores. Alternatively or in addition, the processor1103may include one or more microprocessors configured intandem via the bus 1101to enable independent execution ofinstructions, pipelining, and multithreading. The processor1103may also be accompanied with one or more specializedcomponents to perform certain processing functions andtasks such as one or more digital signal processors (DSP)1107, or one or more application-specific integrated circuits(ASIC) 1109.A DSP 1107typically is configured to processreal-world signals (e.g. , sound) in real time independently ofthe processor 1103.Similarly, an ASIC 1109 can be config-ured to performed specialized functions not easily performedby a more general purpose processor. Other specialized com-ponents to aid in performing the inventive functions describedherein may include one or more field programmable gatearrays (FPGA), one or more controllers, or one or more otherspecial-purpose computer chips.

In one embodiment, the chip set or chip 1100 includesmerely one or more processors and some software and/orfirmware supporting and/or relating to and/or for the one ormore processors.

The processor 1103 and accompanying components haveconnectivity to the memory 1105 via the bus 1101. Thememory 1105 includes both dynamic memory (e.g. , RAM,magnetic disk, writable optical disk, etc.) and static memory(e.g. , ROM, CD-ROM, etc.) for storing executable instruc-tions that when executed perform the inventive stepsdescribed herein to determine modification to the privacy

Page 27: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

23US 9,225,688 B2

24profile for information exchanged over the communicationsession between one or more devices in a collaborative con-text detection relationship based, at least in part, on the detec-tion of the presence of the at least one other device within aproximity threshold. The memory 1105 also stores the dataassociated with or generated by the execution of the inventivesteps.

FIG. 12 is a diagram of exemplary components of a mobileterminal (e.g. , handset) for communications, which is capableofoperating in the system ofFIG. 1,according to one embodi-ment. In some embodiments, mobile terminal 1201, or aportion thereof, constitutes a means for performing one ormore steps of determining modification to the privacy profilefor information exchanged over the communication sessionbetween one or more devices in a collaborative context detec-tion relationship based, at least in part, on the detection of thepresence of the at least one other device within a proximitythreshold. Generally, a radio receiver is often defined in termsof front-end and back-end characteristics. The front-end ofthe receiver encompasses all of the Radio Frequency (RF)circuitry whereas the back-end encompasses all of the base-band processing circuitry. As used in this application, the term"circuitry" refers to both: (I)hardware-only implementations(such as implementations in only analog and/or digital cir-cuitry), and (2) to combinations of circuitry and software(and/or firmware) (such as, if applicable to the particularcontext, to a combination of processor(s), including digitalsignal processor(s), software, and memory(ies) that worktogether to cause an apparatus, such as a mobile phone orserver, to perform various functions). This definition of "cir-cuitry" applies to all uses of this term in this application,including in any claims. As a further example, as used in thisapplication and if applicable to the particular context, theterm "circuitry" would also cover an implementation ofmerely a processor (or multiple processors) and its (or their)accompanying software/or firmware. The term "circuitry"would also cover if applicable to the particular context, forexample, a baseband integrated circuit or applications pro-cessor integrated circuit in a mobile phone or a similar inte-grated circuit in a cellular network device or other networkdevices.

Pertinent internal components of the telephone include aMain Control Unit (MCU) 1203, a Digital Signal Processor(DSP) 1205, and a receiver/transmitter unit including amicrophone gain control unit and a speaker gain control unit.A main display unit 1207 provides a display to the user insupport ofvarious applications and mobile terminal functionsthat perform or support the steps ofdetermining modificationto the privacy profile for information exchanged over thecommunication session between one or more devices in acollaborative context detection relationship based, at least inpart, on the detection of the presence of the at least one otherdevice within a proximity threshold. The display 1207includes display circuitry configured to display at least aportion ofa user interface ofthe mobile terminal (e.g. , mobiletelephone). Additionally, the display 1207 and display cir-cuitry are configured to facilitate user control ofat least somefunctions of the mobile terminal. An audio function circuitry1209 includes a microphone 1211and microphone amplifierthat amplifies the speech signal output from the microphone1211.The amplified speech signal output from the micro-phone 1211 is fed to a coder/decoder (CODEC) 1213.

A radio section 1215 amplifies power and converts fre-quency in order to communicate with a base station, which isincluded in a mobile communication system, via antenna1217. The power amplifier (PA) 1219 and the transmitter/modulation circuitry are operationally responsive to the MCU

6

10

16

20

26

30

36

40

46

60

66

60

66

1203, with an output from the PA 1219 coupled to theduplexer 1221or circulator or antenna switch, as known in theart. The PA 1219also couples to a battery interface and powercontrol unit 1220.

In use, a user of mobile terminal 1201 speaks into themicrophone 1211and his or her voice along with any detectedbackground noise is converted into an analog voltage. Theanalog voltage is then converted into a digital signal throughthe Analog to Digital Converter (ADC) 1223.The control unit1203 routes the digital signal into the DSP 1205 for process-ing therein, such as speech encoding, channel encoding,encrypting, and interleaving. In one embodiment, the pro-cessed voice signals are encoded, by units not separatelyshown, using a cellular transmission protocol such asenhanced data rates for global evolution (EDGE), generalpacket radio service (GPRS), global system for mobile com-munications (GSM), Internet protocol multimedia subsystem

(IMS), universal mobile telecommunications system(UMTS), etc. , as well as any other suitable wireless medium,e.g. , microwave access (WIMAX), Long Term Evolution(LTE) networks, code division multiple access (CDMA),wideband code division multiple access (WCDMA), wirelessfidelity (WIFi), satellite, and the like, or any combinationthereof.

The encoded signals are then routed to an equalizer 1225for compensation of any frequency-dependent impairmentsthat occur during transmission though the air such as phaseand amplitude distortion. After equalizing the bit stream, themodulator 1227 combines the signal with a RF signal gener-ated in the RF interface 1229. The modulator 1227 generatesa sine wave by way of frequency or phase modulation. Inorder to prepare the signal for transmission, an up-converter1231combines the sine wave output from the modulator 1227with another sine wave generated by a synthesizer 1233 toachieve the desired frequency of transmission. The signal isthen sent through a PA 1219 to increase the signal to an

appropriate power level. In practical systems, the PA 1219acts as a variable gain amplifier whose gain is controlled bythe DSP 1205 from information received from a network basestation. The signal is then filtered within the duplexer 1221and optionally sent to an antenna coupler 1235 to matchimpedances to provide maximum power transfer. Finally, thesignal is transmitted via antenna 1217 to a local base station.An automatic gain control (AGC) can be supplied to controlthe gain of the final stages of the receiver. The signals may beforwarded from there to a remote telephone which may beanother cellular telephone, any other mobile phone or a land-line connected to a Public Switched Telephone Network(PSTN), or other telephony networks.

Voice signals transmitted to the mobile terminal 1201 arereceived via antenna 1217 and immediately amplified by alow noise amplifier (LNA) 1237. A down-converter 1239lowers the carrier frequency while the demodulator 1241strips away the RF leaving only a digital bit stream. The signalthen goes through the equalizer 1225 and is processed by theDSP 1205. A Digital to Analog Converter (DAC) 1243 con-verts the signal and the resulting output is transmitted to theuser through the speaker 1245, all under control of a MainControl Unit (MCU) 1203 which can be implemented as aCentral Processing Unit (CPU).

The MCU 1203 receives various signals including inputsignals from the keyboard 1247. The keyboard 1247 and/orthe MCU 1203 in combination with other user input compo-nents (e.g. , the microphone 1211)comprise a user interfacecircuitry for managing user input. The MCU 1203 runs a userinterface software to facilitate user control of at least somefunctions of the mobile terminal 1201 to determine modifi-

Page 28: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

25US 9,225,688 B2

26cation to the privacy profile for information exchanged overthe communication session between one or more devices in acollaborative context detection relationship based, at least in

part, on the detection of the presence of the at least one otherdevice within a proximity threshold. The MCU 1203 alsodelivers a display command and a switch command to the

display 1207 and to the speech output switching controller,respectively. Further, the MCU 1203 exchanges informationwith the DSP 1205 and can access an optionally incorporatedSIM card 1249 and a memory 1251. In addition, the MCU1203 executes various control functions required of the ter-minal. The DSP 1205 may, depending upon the implementa-

tion, perform any of a variety of conventional digital process-ing functions on the voice signals. Additionally, DSP 1205determines the background noise level of the local environ-

ment from the signals detected by microphone 1211and setsthe gain of microphone 1211to a level selected to compensatefor the natural tendency of the user of the mobile terminal1201.

The CODEC 1213 includes the ADC 1223 and DAC 1243.The memory 1251 stores various data including call incomingtone data and is capable of storing other data including musicdata received via, e.g. , the global Internet. The software mod-ule could reside in RAM memory, flash memory, registers, orany other form of writable storage medium known in the art.The memory device 1251 may be, but not limited to, a singlememory, CD, DVD, ROM, RAM, EEPROM, optical storage,magnetic disk storage, flash memory storage, or any othernon-volatile storage medium capable of storing digital data.

An optionally incorporated SIM card 1249 carries, forinstance, important information, such as the cellular phonenumber, the carrier supplying service, subscription details,and security information. The SIM card 1249 serves prima-rily to identify the mobile terminal 1201 on a radio network.The card 1249 also contains a memory for storing a personaltelephone number registry, text messages, and user specificmobile terminal settings.

Further, one or more camera sensors 1253 may be incor-porated onto the mobile station 1201wherein the one or morecamera sensors may be placed at one or more locations on themobile station. Generally, the camera sensors may be utilizedto capture, record, and cause to store one or more still and/ormoving images (e.g. , videos, movies, etc.) which also maycomprise audio recordings.

While the invention has been described in connection witha number of embodiments and implementations, the inven-

tion is not so limited but covers various obvious modificationsand equivalent arrangements, which fall within the purviewofthe appended claims. Although features ofthe invention areexpressed in certain combinations among the claims, it iscontemplated that these features can be arranged in any com-bination and order.

What is claimed is:1.A method comprising facilitating a processing of data

and/or at least one signal, the data and/or at least one signalare based, at least in part, on the following:

at least one determination of a communication sessionestablished between at least one first device of at leastone first user and at least one second device of at leastone second user, wherein the at least one first device andthe at least one second device are in a collaborativecontext detection relationship;

a detection of a presence of at least one third user within aproximity threshold of the at least one first device, the atleast one second device, the at least one first user, the at

6

10

16

20

26

30

36

40

46

60

66

60

66

least one second user, or a combination thereof, whereinthe detection is performed via the collaborative contextdetection relationship;

at least one determination of one or more modifications toone or more privacy profiles for information exchangedover the communication session based, at least in part,on the detection of the presence of the at least one thirduser;

at least one determination of identification information,profile information, privacy policy information, or acombination thereof associated with the at least onethird user, at least one third device associated with the atleast one third user, or a combination thereof; and

a presentation of one or more notification messages at theat least one first device, the at least one second device, ora combination thereof based, at least in part, on theprofile information, privacy policy information, or acombination thereo f,

wherein the one or more notification messages relate, atleast in part, to the presence of the at least one third user.

2.A method ofclaim 1,wherein the data and/or at least onesignal are further based, at least in part, on the following:

at least one determination of one or more other modifica-tions to the communication session, the informationexchanged over the communication session, or a com-bination thereo fbased, at least in part, on the detection ofthe presence of the at least one third user.

3.A method of claim 1, wherein the collaborative contextdetection relationship enables the at least one first device toaccess one or more sensors associated with the at least onesecond device for detecting the presence of the at least onethird user.

4. A method of claim 3, wherein the one or more sensorsinclude, at least in part, one or more internal sensors ofat leastone second device, one or more external sensors accessible bythe at least one second device, or a combination thereof.

5.A method ofclaim 1,wherein the data and/or at least onesignal are further based, at least in part, on the following:

at least one determination of relationship informationbetween (a) the at least one third user and (b) the at leastone first user, the at least one second user, or a combi-nation thereof; and

at least one determination of whether to present at least aportion of the identification information, the profileinformation, privacy policy information, or a combina-tion thereof in the one or more notification messagesbased, at least in part, on the relationship information.

6.A method ofclaim 5, wherein the data and/or at least onesignal are further based, at least in part, on the following:

at least one determination of whether to relay at least aportion of the information exchanged over the commu-nication session to the at least one third user, the at leastone third device, or a combination thereof in the com-munication session based, at least in part, on the rela-tionship information, the identification information, theprofile information, the privacy policy information, or acombination thereo f.

7.A method ofclaim 6, wherein the data and/or at least onesignal are further based, at least in part, on the following:

processing and/or facilitating a processing of informationexchanged over the communication session to cause, atleast in part, a parsing of one or more keywords; and

causing, at least in part, a comparison of the one or morekeywords against the relationship information, the iden-tification information, the profile information, the pri-vacy policy information, or a combination thereof todetermine whether to relay at least a portion of the infor-

Page 29: United States Patent No. US 225, B2 Biswas et Date Patent ...pdfstore.patentorder.com/pdf/us/688/us9225688.pdfu.s.patent dec. 29, 2015 sheet 1 of 14 us 9,225,688 b2 cy0 w cqz lcdc)

27US 9,225,688 B2

28mation exchanged over the communication session tothe at least one third user, the at least one third device, ora combination thereo f.

S.A method ofclaim 1,wherein the data and/or at least onesignal are further based, at least in part, on the following:

at least one determination of whether to cause, at least inpart, an initiation of one or more privacy preservingactions based, at least in part, on the relationship infor-mation, the identification information, the profile infor-mation, the privacy policy information, or a combinationthereof.

9. A method of claim S, wherein the one or more privacypreserving actions include, at least in part, (a) obscuring ofdata transmitted over the communication session; (b) hidingof the presence of the at least one third user; (c) hiding of theidentification information of the at least one third user; (d)hiding of other identification information of the at least onefirst user, the at least one second user, or a combinationthereof; or (e) a combination thereof.

10.An apparatus comprising:at least one processor; andat least one memory including computer program code for

one or more programs,the at least one memory and the computer program code

configured to, with the at least one processor, cause theapparatus to perform at least the following,

determine a communication session established between atleast one first device of at least one first user and at leastone second device of at least one second user, whereinthe at least one first device and the at least one seconddevice are in a collaborative context detection relation-

ship;cause, at least in part, a detection of a presence of at least

one third user within a proximity threshold of the at leastone first device, the at least one second device, the atleast one first user, the at least one second user, or acombination thereof, wherein the detection is performedvia the collaborative context detection relationship;

determine one or more modifications to one or more pri-vacy profiles for information exchanged over the com-munication session based, at least in part, on the detec-tion of the presence of the at least one third user;

determine identification information, profile information,privacy policy information, or a combination thereofassociated with the at least one third user, at least onethird device associated with the at least one third user, ora combination thereof; and

cause, at least in part, a presentation of one or more noti-fication messages at the at least one first device, the atleast one second device, or a combination thereof based,at least in part, on the profile information, privacy policyinformation, or a combination thereof,

wherein the one or more notification messages relate, atleast in part, to the presence of the at least one third user.

11.An apparatus of claim 10, wherein the apparatus isfurther caused to:

determine one or more other modifications to the commu-nication session, the information exchanged over thecommunication session, or a combination thereo fbased,at least in part, on the detection of the presence of the atleast one third user.

6

10

16

20

26

30

36

40

46

60

66

60

12. An apparatus of claim 10, wherein the collaborativecontext detection relationship enables the at least one firstdevice to access one or more sensors associated with the atleast one second device for detecting the presence of the atleast one third user.

13. An apparatus of claim 12, wherein the one or moresensors include, at least in part, one or more internal sensorsof at least one second device, one or more external sensorsaccessible by the at least one second device, or a combinationthereof.

14. An apparatus of claim 10, wherein the apparatus isfurther caused to:

determine relationship information between (a) the at leastone third user and (b) the at least one first user, the at leastone second user, or a combination thereof; and

determine whether to present at least a portion of the iden-tification information, the profile information, privacypolicy information, or a combination thereof in the oneor more notification messages based, at least in part, onthe relationship information.

15. An apparatus of claim 14, wherein the apparatus isfurther caused to:

determine whether to relay at least a portion of the infor-

mation exchanged over the communication session tothe at least one third user, the at least one third device, ora combination thereof in the communication sessionbased, at least in part, on the relationship information,the identification information, the profile information,the privacy policy information, or a combinationthereof.

16. An apparatus of claim 15, wherein the apparatus isfurther caused to:

process and/or facilitate a processing of informationexchanged over the communication session to cause, atleast in part, a parsing of one or more keywords; and

cause, at least in part, a comparison of the one or morekeywords against the relationship information, the iden-tification information, the profile information, the pri-vacy policy information, or a combination thereof todetermine whether to relay at least a portion of the infor-mation exchanged over the communication session tothe at least one third user, the at least one third device, ora combination thereo f.

17. An apparatus of claim 10, wherein the apparatus isfurther caused to:

determine whether to cause, at least in part, an initiation ofone or more privacy preserving actions based, at least inpart, on the relationship information, the identificationinformation, the profile information, the privacy policyinformation, or a combination thereof.

1S. An apparatus of claim 17, wherein the one or moreprivacy preserving actions include, at least in part, (a) obscur-ing of data transmitted over the communication session; (b)hiding of the presence of the at least one third user; (c) hidingof the identification information of the at least one third user;(d) hiding of other identification information of the at leastone first user, the at least one second user, or a combinationthereof; or (e) a combination thereof.