The present disclosure relates to recommendation apparatuses and methods.
Many different multimedia streaming, or downloading services, or websites are available to consumers today. For example, services such as Netflix, Amazon, Hulu and MGO allow a user to watch different multimedia programs on different user devices. As is well known in the art, a multimedia program is a program which has content in more than one component or form, such as, for example, a movie or a television show which have both a video component and an audio component. Some of the movies and television shows also have another component, such as a text component comprising closed captioned text.
All of the content services mentioned above would allow a user to rate a program. The feedback ratings of the multimedia programs provided by the individual users are typically used by the content services to recommend other programs which may be of interest to the users of these content services. The content services may also recommend other multimedia programs to the users based on the viewing history of the users.
More generally, a great deal of research and commercial activity in the last decade has led to the wide-spread use of recommendation systems in a variety of online environments. Recommendation or recommender systems are a subclass of information filtering systems that seek to predict the rating or preference that a user would give to an item. Such systems offer users generic or personalized recommendations for many kinds of items, such as movies, TV shows, music, books, hotels, restaurants, search queries, social tags, products in general, financial services, life insurance, dating, and more.
Recommender systems typically produce a list of recommendations in one of two ways: through collaborative or content-based filtering. Collaborative filtering approaches build a model from a user's past behavior (e.g., items previously purchased or selected and/or numerical ratings given to those items) as well as similar decisions made by other users. This model is then used to predict items (or ratings for items) that the user may have an interest in. Content-based filtering approaches utilize a series of discrete characteristics of an item in order to recommend additional items with similar properties. These approaches are often combined in Hybrid Recommender Systems. A recommender may be, for example, a Video on Demand (VOD) service provider as mentioned above, a social network provider (e.g., Facebook or Twitter), an internet search engine provider (e.g., Google or Bing), an online sales company (e.g., Amazon or Overstock), a phone, cable television or internet service provider (e.g., Comcast or Verizon), etc. The ubiquitous use of recommendations, however, has created problems related with the privacy of the users that provide information to recommenders and/or receive recommendations.
In order to receive useful recommendations, users need to supply substantial personal information about their preferences (users' inputs), trusting that the recommender will manage this data appropriately. In addition, a large number of services are offered for free (e.g., social networks, email accounts, product discounts or coupons, memberships, etc.) with the idea that the user's personal information can be accessed by the service provider for the purpose of recommendation. Furthermore, recommenders are often motivated to resell data for a profit, and also to extract information beyond what is intentionally revealed by the user. For example, even records of user preferences typically not perceived as sensitive, such as movie ratings or a person's TV viewing history, may be used to infer a user's political affiliation, gender, etc. The private information about the users that may be inferred from the data in a recommendation system is constantly evolving as new data mining and inference methods are developed, for either malicious or benign purposes. In the extreme, records of user preferences may be used to even uniquely identify a user: A. Naranyan and V. Shmatikov strikingly demonstrated this by de-anonymizing the Netflix dataset in “Robust de-anonymization of large sparse datasets”, Proceedings of 2008 IEEE Symposium on Security and Privacy.
It is therefore of interest to provide efficient techniques for ensuring the privacy of users. The present disclosure is directed towards such a technique.
According to one aspect of the present disclosure, a method is provided, the method including receiving data from at least one sensor, determining a presence of at least one person other than a user of a user device based on the data, and providing a recommendation for the user based on the determined presence.
According to another aspect of the present disclosure, an apparatus is provided, the apparatus including a processor in communication with at least one input/output interface, at least one memory in communication with the processor, the processor being configured to receive data from at least one sensor, determine a presence of at least one person other than a user of a user device based on the data, and provide a recommendation for the user based on the determined presence.
Additional features and advantages of the present disclosure will be made apparent from the following detailed description of illustrative embodiments which proceeds with reference to the accompanying figures.
The present disclosure may be better understood in accordance with the following exemplary figures briefly described below:
The present disclosure recognizes that, as the data mining and inference methods become more and more refined, the more personalized recommendations become. A problem then appears associated with the viewing of personalized recommendations by a user in a public place, or even in a private place when in the presence of others (e.g., family, friends, co-workers, etc.). Therefore, the user may not wish for the personalized recommendations to be viewed by others but may still want to utilize his or her device in situations where recommendations may be provided (e.g., browsing the web, social networking, buying products online, etc.)
Another problem recognized by the present disclosure is, e.g., associated with when someone else other than the user borrows the user's device (with or without the user's consent) to perform activities like, for example, browsing the internet. Recommenders may not be able to recognize another person using the device and the user may not want another person or persons to receive personalized recommendations directed to the user when the other person or persons are using the device and/or are in the proximity of the user's device.
According to the present disclosure, it is therefore of interest to provide efficient techniques for ensuring the privacy of users while receiving recommendations in the presence of others, or when other people besides the user are receiving the recommendations while using the user's device. The present disclosure is directed towards such solutions to solve such recognized problems.
Therefore, the present disclosure provides recommendation methods and apparatuses which take into account whether at least another person besides the owner or the user of a user device is present when a recommendation is being provided to the user on the user device. According to an exemplary embodiment of the present disclosure, a sensor is provided to detect the presence of at least another person besides the user of a user device. A recommendation is made based on the determined presence of at least another person. If no other person besides the user is determined to be present, a personalized recommendation is displayed as usual. If however, at least another person besides the user is determined to be present, an alternative recommendation is displayed instead. The alternative recommendation may be, e.g., a generic recommendation or a recommendation that is obscured. In one exemplary embodiment, the alternative recommendation may be customized and/or pre-selected by the user. For example, the customization may include creating the user's own alternative recommendation. The pre-selection may include the choice of an alternative recommendation among several options.
As used herewith, a personalized recommendation is a recommendation which takes into consideration the personal preferences and/or information from the user. On the other hand, an alternative to the personalized recommendation is a generic recommendation or a recommendation which is obscured in some other way. A generic recommendation is a general recommendation, reflective of, e.g., a group of people, instead of just specific to an individual user. In the present disclosure, generic recommendations are used in order to de-personalize the personal recommendations when other people are also present.
An obscured recommendation may include a generic recommendation. In addition, in order to provide an alternative recommendation, the personalized recommendation may be obscured in some other way. For example, a user may be provided with an indication that the alternative recommendation is being provided instead of the usual personalized recommendation. In one exemplary embodiment, a user may receive a notification in the form of an image of a box for the alternative recommendation. The box may be in any color, but it would represent a known image to the user which would allow the user to recognize that an obscuring is taking place. In another non-limiting exemplary embodiment, the notification may be a known statement in text, or a Uniform Resource Locator (URL) link to a website where the personalized recommendation may be seen. In another exemplary embodiment, the obscuring notification may be in an audio format. For example, the audio indication may be a song excerpt or another type of audio signal.
In accordance with another exemplary embodiment of the present disclosure, a user may pre-select the form of the alternative recommendation to have a specific form or content, e.g., as one or more of the above described examples. This pre-selection may be a part of, e.g., a user profile of a user device. That is, e.g., a user may choose a certain type of recommendation such as a generic recommendation or an obscured recommendation to always be used as the alternative recommendation when other people are present. A user may also choose that no alternative recommendation is displayed, so that no information whatsoever is displayed in the presence of other people. In this case, an obscured recommendation means no recommendation sent to the user.
As mentioned above, and to be described further below, if the recommendation system 100 determines that there is at least one other person present besides the normal or the usual user (e.g., the owner) of a user device, then the recommendation system will provide an alternative recommendation instead of the usual personalized recommendation in accordance with the present disclosure.
Various exemplary user devices 260-1 to 260-n in
User devices 260-1 to 260-n shown in
An exemplary user device 260-1 in
Device 260-1 may also comprise a display 291 which is driven by a display driver/bus component 287 under the control of processor 265 via a display bus 288, as shown in
In addition, exemplary device 260-1 in
Exemplary device 260-1 also comprises a memory 285 which may represent at least one of a transitory memory such as Random Access Memory (RAM), and a non-transitory memory such as a Read-Only Memory (ROM), a hard drive, a Compact Disk (CD) drive, a Blu-ray drive, and/or a flash memory, for processing and storing different files and information as necessary, including computer program products and software (e.g., as represented by a flow chart diagram of
According to the present disclosure, an exemplary device 260-1 in
As shown in
In accordance with the present disclosure, different types of sensors for people detection may be used. For example, the detection sensors may be visual sensors such as cameras, or audio sensors such as microphones, as mentioned above. As illustrated in
In another exemplary embodiment, voice recognition instead of, or in addition to, facial recognition may be employed to determine the presence of persons within the detection area of an audio sensor such as a microphone. Similarly, well-known voice recognition techniques or algorithms may be employed by processor 265 to process audio or voice data detected and picked up by an exemplary audio sensor (e.g., 281 or 282 of
In accordance with the present disclosure, other exemplary sensors may also be deployed to detect the presence of people other than the user in the proximity of a user device. An example of such sensors may be, e.g., a Radio Frequency Identification (RFID) tag (or tracking tags, or wearables) of a person other than the user which may come within a vicinity of the user device and may be used to identify that person. As is well known in the art, RFID uses radio waves to automatically identify people or objects. There are several methods of identification, but the most common is to store a serial number that identifies a person or object, and perhaps other information, on a microchip that is attached to a radio frequency antenna (i.e., the microchip and the antenna together are called an RFID transponder or an RFID tag). The antenna enables the microchip to transmit the identification information to a RFID reader. The RFID reader converts the radio waves reflected back from the RFID tag into digital information that can then be passed on to, e.g., a processor 265 of the user device 260-1 shown in
In addition, other sensors may be used to monitor a respective electronic connection or activity of a person or a person's device in a room or on a network. Such an exemplary person identity sensor may be, e.g., a Wi-Fi router which keeps track of different devices or logins on the network served by the Wi-Fi router, or a server which keeps track of logins to emails or online accounts being serviced by the server. In addition, other exemplary sensors may be location based sensors such as GPS and/or Wi-Fi location tracking sensors in conjunction with applications commonly found on mobile devices and apps such as Google Maps app on an Android mobile device that identifies the respective locations of the users. Furthermore, other exemplary sensors may be motion sensors (e.g., Passive Infrared, PIR, sensors, ultrasound sensors, thermal imaging sensors, systems like Microsoft Kinectic, break beams, etc.), wearable microphones, wearable cameras, etc.
In another non-limiting exemplary embodiment in accordance with the present disclosure, as shown in
In addition, a server administrator may interact with and configure server 205 to run different applications using different user input/output (I/O) devices 215 as well known in the art. The user I/O or interface devices 215 of the exemplary server 205 may represent e.g., a mouse, touch screen capabilities of a display, a touch and/or a physical keyboard for inputting user data. The user interface devices 215 of the exemplary server 205 may also comprise a speaker or speakers, and/or other user indicator devices, for outputting visual and/or audio sound, user data and feedback.
Furthermore, server 205 may be connected to network 250 through a communication interface 220 for communicating with other servers or web sites (not shown) and one or more user devices 260-1 to 260-n, as shown in
In one non-limiting exemplary embodiment of the present disclosure, the sensor or sensors 281, 282, 286 may also be connected to the server or service provider 205 by wired (e.g., Ethernet cable) or wireless (e.g., 802.11 standards or Bluetooth) means (e.g., LAN or WAN network) and processor 210 may remotely perform the operation of detecting the presence of a person other than the user.
In some embodiments of the present disclosure, the determination of the presence of at least one other person in step 330, may be a function of one of more of the following factors/features listed below:
According to one embodiment of the present disclosure, a personalized recommendation is provided if no presence is determined at step 330, and an alternative recommendation is provided when there is a determined presence at step 330. Again, an alternative recommendation may be, e.g., a generic and/or an obscured recommendation as described above.
According to some embodiments of the present disclosure, a user of a user device may have other personal restrictions or desire for customizing the recommendation. For example, a user may not mind that a family member sees his or her recommendations but would mind if a co-worker or a stranger sees the recommendations. Alternatively, for example, a user may not mind that a total stranger in a public place (e.g., an airport or a restaurant) may see the user's screen, but would mind if a co-worker or even a family member sees the personalized recommendation. Therefore, according to the present disclosure, a type of recommendation customization may be performed as further described below.
For example, in one embodiment, determining whether another person is known by the user or permitted to see a personalized recommendation may be based on, e.g., different forms of social network activities on different social networks of the Internet (e.g., Facebook, Twitter, LinkedIn, etc.) as already noted above. In another exemplary embodiment, the user may accept synchronizing his or her social networks with the recommendation provider or recommender, or the recommender may be itself a social network provider.
In another embodiment, determining whether another person is known by the user or is permitted to see a personalized recommendation may be based on information provided by the user. For example, the user may provide a blacklist of people which are prohibited to see the personalized recommendation of the user. Once the blacklist is created, the method 300 (or exemplary user device 260-1, or user 205, of
Also, as already described above, according to one embodiment, the determination of the presence of at least one other person may be performed by a user device (e.g., exemplary user device 260-1 of
In another embodiment, a user device (e.g., user device 260-1) may be co-located with another second device (e.g., user device 260-2 as shown in
According to one non-limiting embodiment of the present disclosure, a user may select the various sensory or presence determination options described above during a sign-up process with the recommendation provider or recommender (e.g., server 205). For example, a user may be asked if the user wants to activate, e.g., an “anonymous recommendation with other people present” feature. Once the user approves and selects the desired feature and configuration, the service provider may acquire control of at least one sensor inside or connected to the user device, as described above.
In another non-limiting embodiment according to the present disclosure, the de-personalization or obscuring of the recommendation may be disabled by the user, either by a setting, or by not downloading a downloadable software program to perform the determination of a presence, or by disabling the software and/or hardware that performs the determination of a presence, or by refusing to give control of sensors to a second device. The user may also be prompted to maintain personalized recommendation or obscure it. Several of the features may be provided in settings of the system or by asking the user during the interaction with the recommender of a service provider.
In yet another non-limiting embodiment according to the present disclosure, a personalized recommendation may still be kept private to a user of a user device (e.g., user device 260-1 of
In the present disclosure, the step of receiving associated with flowchart 300 can imply receiving, accessing or retrieving. The step of providing associated with flowchart 300 can imply outputting, transmitting or storing in memory for later access or retrieval.
It is to be understood that any of the methods of the present disclosure can be implemented in various forms of hardware, software, firmware, special purpose processors, or a combination thereof. The present disclosure can be implemented as a combination of hardware and software. Moreover, the software can be implemented as an application program tangibly embodied on a program storage device. The application program can be uploaded to, and executed by, a machine comprising any suitable architecture. The machine can implemented on a computer platform having hardware such as one or more central processing units (CPU), a random access memory (RAM), and input/output (I/O) interface(s). The computer platform also includes an operating system and microinstruction code. The various processes and functions described herein can either be part of the microinstruction code or part of the application program (or a combination thereof), which is executed via the operating system. In addition, various other peripheral devices can be connected to the computer platform such as an additional data storage device and a printing device.
Furthermore, aspects of the present disclosure can take the form of a computer-readable storage medium. Any combination of one or more computer-readable storage medium(s) can be utilized. A computer-readable storage medium can take the form of a computer-readable program product embodied in one or more computer-readable medium(s) and having computer-readable program code embodied thereon that is executable by a computer. A computer-readable storage medium as used herein is considered a non-transitory storage medium given the inherent capability to store the information therein as well as the inherent capability to provide retrieval of the information therefrom. A computer-readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing.
It is to be appreciated that the following list, while providing more specific examples of computer-readable storage mediums to which the present disclosure can be applied, is merely an illustrative and not exhaustive listing as is readily appreciated by one of ordinary skill in the art. The list of examples includes a portable computer diskette, a hard disk, a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
According to one aspect of the present disclosure, a method of providing a recommendation is provided including receiving data from at least one sensor, determining a presence of at least one person other than a user of a user device based on the data, and providing a recommendation for the user based on the determined presence.
According to one embodiment of the method, the at least one sensor is at least one of a camera and a microphone.
According to one embodiment of the method, the at least one sensor is configured to detect a network activity of the at least one person other than the user.
According to one embodiment of the method, the at least one sensor is located in the user device.
According to one embodiment of the method, the at least one sensor is connected to the user device.
According to one embodiment of the method, the determining a presence includes determining whether the at least one other person is within a distance from the user device.
According to one embodiment of the method, the determining a presence is based on a size of a screen of the user device.
According to one embodiment of the method, the determining a presence is based on a type of recommendation.
According to one embodiment of the method, the determining a presence is based on whether the at least one person is facing a screen of the user device.
According to one embodiment of the method, the determining a presence is based on whether the at least one person is known by the user.
According to one embodiment of the method, whether a person is known by the user is identified by at least one social network connection on the internet.
According to one embodiment of the method, whether a person is known by the user is identified by being previously detected in a vicinity of the user device.
According to one embodiment of the method, the determining a presence is based on a movement of the person in a vicinity of the user device.
According to one embodiment of the method, the providing further includes providing a first recommendation if no person other than the user is determined to be present.
According to one embodiment of the method, the first recommendation is a personalized recommendation.
According to one embodiment of the method, the providing further includes providing a second recommendation if at least one person other than the user is determined to be present.
According to one embodiment of the method, the second recommendation is one of a generic or obscured recommendation.
According to one embodiment of the method, the second recommendation is one of customized or pre-selected by the user.
According to one embodiment of the method, the providing further includes generating a flag based on the determined presence; and receiving the recommendation based on the flag.
According to one embodiment of the method, the method further includes generating the recommendation based on the determined presence.
According to one embodiment of the method, the recommendation is at least one of text, video and audio.
According to one embodiment of the method, the method further includes transferring the recommendation to another device prior to providing the recommendation.
According to one embodiment of the method, the method further includes changing a type of recommendation prior to the transferring.
According to one aspect of the present disclosure, an apparatus for providing a recommendation is provided including a processor in communication with at least one input/output interface, and at least one memory in communication with the processor, the processor being configured to perform any of the embodiments of the method of zooming video content.
According to one aspect of the present disclosure, an apparatus for providing a recommendation is provided including a processor in communication with at least one input/output interface for executing a set of instructions, and at least one memory in communication with the processor, said memory storing the set of instructions that when executed cause the processor to perform any of the embodiments of the method of zooming video content.
According to one aspect of the present disclosure, a computer-readable storage medium carrying a software program is provided including program code instructions for performing any of the embodiments of the method of providing a recommendation.
According to one aspect of the present disclosure, a computer program product stored in a non-transitory computer-readable storage medium is provided including computer-executable instructions for performing any of the embodiments of the method of providing a recommendation when the program is executed by a computer.
As noted before, the functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing software in association with appropriate software. Also, when provided by a processor, the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which may be shared.
It is to be further understood that, because some of the constituent system components and methods depicted in the accompanying drawings are preferably implemented in software, the actual connections between the system components or the process function blocks may differ depending upon the manner in which the present disclosure is programmed. Given the teachings herein, one of ordinary skill in the pertinent art will be able to contemplate these and similar implementations or configurations of the present disclosure.
Although the illustrative embodiments have been described herein with reference to the accompanying drawings, it is to be understood that the present disclosure is not limited to those precise embodiments, and that various changes and modifications may be effected therein by one of ordinary skill in the pertinent art without departing from the scope of the present disclosure. In addition, individual embodiments can be combined, without departing from the scope of the present disclosure. All such changes and modifications are intended to be included within the scope of the present disclosure as set forth in the appended claims.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2015/067352 | 12/22/2015 | WO | 00 |