1. Field of the Invention
The present invention relates to consumer electronics. More specifically the present invention relates to privacy control in an advanced Internet-connected television system.
2. Description of the Related Art
Internet-connected televisions are of increasing interest. However, prior art privacy protection schemes do not address the problems of these new internet television platforms. With the emergence of internet-connected TVs, users are able to perform activities beyond traditional and passive TV watching experience, such as accessing web-based application. In particular, they may use the new internet TV platform for consuming web-generated content/services and to interact with their social network. In addition, the explosive growth in the popularity of sensors and their widespread use in consumer electronic devices have also created new opportunities for learning about user viewing/browsing and interaction behavior. However, the lack of care in considering user privacy and preferences on how personal data is gathered, stored, shared, or utilized can undermine the popularity of many such services.
The present invention generally comprises an apparatus, system, method, and computer readable medium to provide user-selectable levels of privacy protection for different types of information in a media device. This may include Internet usage, TV usage, device interactivity usage, use of micro-applications, and use of individual web sites; although more generally other types of confidential information may also be protected. A user interface permits a user to select different levels of detail of confidential information and/or specific condition to make available confidential information to external web applications and/or to a service. Trend data may be generated based on privacy preserved usage/interest data. A privacy engine is associated with a media device. The privacy engine may reside on the media device or alternatively may reside remotely, such as in a cloud configuration. Because the privacy engine is directly associated with a media device, privacy protections may be enforced on behalf of the user. Additionally, the user may be provided with trend data or other benefits or information as incentives to encourage the user to select the most relaxed privacy settings that the user is comfortable with. Privacy protected information may also be used by external services for behavioral analysis, trend analysis, and targeting services to the user.
The present invention is generally related to improving privacy in a media system used to watch television content and which also is capable of executing full web applications and micro applications. An exemplary advanced television media system describing the use of full applications and micro-applications is described in U.S. patent application Ser. No. 13/080,100, “Context Aware Media Interaction,” which is incorporated by reference.
Referring to
The shared media device 100 also provides privacy filtering 100(b) based on user-defined privacy manifestos. The privacy filtering provides additional layers of control over the types and levels of detail of confidential information available to web applications. Because the privacy filtering occurs locally (i.e., at the shared media device or in a device residing on the same home network as the shared media device), privacy controls can be enforced in new ways. However, the privacy-defined information may also be received by a service 130 providing community services to different television viewers. The service 130 may, for example, receive tags, metadata, or other inputs regarding content actively submitted by different viewers within a community of viewers. More generally, service 130 may also receive other types of user information such as usage behavior, static user information, device information, and context information. The service 130 may, for example, perform datamining, trend analysis and ad services based on the privacy preserved data for both basic and advanced features of the shared media device 100.
Referring to
In one implementation, the micro-apps are designed to utilize context information in order to query one or more micro-app partners for result information. The context information can involve the media itself, the user, the device, or the general environment. Once this result information is received from the micro-app partner(s), it can be presented on the interaction devices. In this manner, the micro-apps provide the ability to automatically retrieve results relevant to the currently-playing media on the interactive television system and display them to viewers as the media is being played. For example, an Amazon™ micro app may query Amazon™ for content related to the media that is being displayed. Other examples of micro-apps include social media micro-apps (e.g. a Facebook™ microapp), an Ebay™ microapp, a video provider micro-app (e.g., a Netflix™ micro-app or a Blockbuster™ Micro-app). In these examples, the micro-app provides the ability to retrieve results relevant to what the user is doing with the television system.
Note that the media device has the potential to collect many different types of consumer data regarding the use of full applications, micro-applications, location of users (via sensors in interaction devices, wireless location, or other conventional location techniques), and information about the devices that are being used. Referring to
The privacy issues associated with media device 100 system are different from those experiences by individual websites. An individual website, such as Facebook™, has limited privacy settings for that single website alone. That is, an individual website has privacy settings offered at the individual application level, not at the platform level. Individual websites may also not provide any privacy protection for certain types of information. Thus, for example, even if an individual website has privacy settings, the user would have to separately set them for each and every application that they want to use and even then certain types of information might not be protected. Moreover, many websites have an all-or-nothing approach in which the user is limited to the privacy options of that particular website. In contrast, the privacy filtering of the present invention may be applied at a platform level to provide users with the ability to meaningfully make compromises regarding privacy. Moreover, the privacy filtering of the present invention may be extended to cover a broader range of information than is conventionally protected by individual websites.
In a media device 100 there is a wider variety of information that could be collected by a third party. Moreover, an individual media device 100 may be used with a variety of full applications and micro-apps. If all of the confidential information was tracked by a third party it could be used to provide users the most relevant information and advertisements related to what they are doing on the interactive television. However, if less aggregate consumer interaction data is tracked then consumer privacy is increased but the consumer may not receive the benefit of receiving relevant information and advertisements. For example, referring back to
One aspect of the present invention is to put users in control when it comes to privacy and confidentiality and allow them to express their privacy preferences. Referring to
The consumer may, for example, be provided with user interfaces 310, 315, and 320 to select privacy settings for different features, services, and types of consumer information. In one implementation, there are three main categories of privacy interfaces. A generic device account privacy op-in interface 310 is provided. The user is also provided with an interface 315 to opt-in and set their own privacy levels for all services (e.g., all full apps). Additionally, an interface 320 to opt-in and set privacy levels for micro-apps is provided. The cumulative set of privacy settings is a manifesto. For example, in this example, a consumer may want to protect the privacy of device connectivity (e.g., whether mobile devices are being used and the location of the mobile devices). By setting the privacy engine within an internet television system then the consumer's privacy is protected from all third parties in communication with the internet television system. Thus, service vendors, advertisers, and trend data mining services receive only that private and confidential information that the consumer wants to share with other parties. The consumer thus controls how much confidential information they are willing to expose in exchange for the potential to receive more relevant information and advertisements.
In the example of
To make the privacy policy flexible and dynamic, well defined setting categories are provided to aid a user program a manifesto of privacy settings. In one embodiment, the privacy policy is a function of multi dimensional context, such as within a certain location, certain time, for how long, to whom, on what device and etc. However, as will be described later, the privacy policy may also have categories based on the level of detail that a user is willing to provide. Privacy preferences can also be tied to user (share this much when Mary is logged in), time (share this much before 10 pm), and device (don't share my iPad™ behavior).
It is desirable to provide a motivation for users to relax their privacy setting and permit a greater degree of confidential information to be shared. In one embodiment the system provides a description of benefits a user will receive if they relax their privacy settings, such as a prediction of how much money the user can save if they share the data. Alternatively, models such as glassdoor can be used where people get a chance to “learn more” about something “after” sharing their own information which is then anonymized In one embodiment, users can explicitly state their preferences using TV, PC or HHP. However, the TV can incrementally construct the manifesto based on user feedback on the content shown and its delivery details (e.g., from whom, what time, content type, etc.). That is, the user can initially set strict privacy policy and they adjust the settings iteratively.
In one embodiment users are provided with options to specify their privacy tolerance and preference anywhere from strict control to relaxed control. The shared media device 100 gathers usage behavior data and maps them to an existing privacy-aware interest vector. This may be done on an opt-in or opt-out basis. However, more generally different levels of control may be provided, where each level may specify a level of detail of information that the user is comfortable sharing.
Thus for a particular internet usage scenario, the mapping performed by privacy engine 330 reports different levels of detail of Internet usage. For example, with full Internet privacy no information on Internet usage is shared. A level L5 may correspond to no privacy, similar to cookies from a single advertiser or multiple advertisers. Intermediate levels of Internet privacy may specify that only usage of certain websites may be provided and/or limit the amount of additional information for usages of those Internet sites. As one example level L2 may report internet usage of shopping and media cites in a generic manners (e.g., Shopping (3), Media (5)). A level L3 may report usage of specific websites such as Amazon™ (2), You Tube™ (8), Netflix™ (6). A level L4 may report Amazon™ retails (3), Amazon™ books (2), Amazon™ apparel. In this example, the numbers in parenthesis represent a weighted parameter such as frequency of access, interest level, or the recency of access.
The privacy settings for television usage may also have multiple levels. For example, full privacy may be one setting, a level L1 specifying generic television usage, such as no TV usage, medium TV usage, heavy TV usage; a level L2 providing a greater level of detail in terms of subject matter such as: 50% reality TV, 20% finance, etc; and a level L3 providing more detailed viewing behavior, such as 2-4 PM Tuesday Jersey Shore, 5-7 PM weekends The Apprentice, volume loud. However, more generally the definition for what each privacy level represents may be varied and the total number of levels also varied.
The interactivity settings (describe use of interaction device and the shared media device) may also have multiple levels. One setting may be full privacy. A level L1 may correspond to no interactivity, low interactivity, medium, or high. A level L2 may specify usage percentage of different devices used with the interactive television system, such as personal computers and mobile devices. A level L3 may provide information on usage of specific devices, such as the type of content viewed on the television and a mobile device.
Settings may also be provided on login information and other credential information. For example, full privacy may be provided, in which no login information is available. At a first level L1, the number of people logged in (e.g., two people), and at level two the specific people logged in identified (e.g., Jane and Mary logged in): Full privacy: No login info available; L1: two people logged in; L2: Jane and Mary logged in.
In additional to level settings, other types of privacy controls may also be provided. Other example of privacy settings include user privacy preferences for controlling applications gathering user input according to their: content provider (who); content type e.g., voting, feedback, comment, tweet, etc.; (what); time of day, day of week, etc. (when); location (where), and method of gathering information.
Note that generic conventional device privacy opt-ins per service is also an option 420. That is, the present invention may be used as an option to conventional privacy protection and/or in conjunction with conventional privacy protection. For example, a user may selectively opt-out of enhanced privacy protection for selected applications. As illustrated by block 430, one or more external services or servers may receive the privacy preserved data for use in data mining, trend analysis ad generation, or other services.
The present invention thus takes personal user, device, and usage data and transfers that data with privacy filtering based on the user manifesto. This allows the resulting privacy aware information to be used for advertising or trend purposes. Location cloaking, data suppression, data generalization, and data averaging are examples of some of the ways privacy aware information may be used for advertising or trend purposes.
In one embodiment, the shared media device 100 includes an application manager that ensures any application executed on the shared media device conforms to user privacy preferences stated in the privacy manifesto. The application manager monitor each application's usage of sensitive information to prevent any attempts (either unintentionally or maliciously) of violating the users' privacy preferences. In one embodiment, the application manger requires each application to conform to the user's privacy manifesto before executing.
The present invention may protect users against sensitive data that may be gathered by third party entities from the “aggregation” and “compilation” of their activities across different web-enabled and TV watching applications on TV. Users may choose from varying degrees of privacy/confidentiality: TV interactivity (how when who and how many people interact with the TV); profile information (age, sex, region, etc); Internet activity (which widgets they use and how they use it); device connectivity (what devices belonging to which users are paired to TV for what usage); and context consumption (what users watch).
The user-settable preferences alleviate user concerns when sharing their information/activity and to encourage consumers to share the above with the community. This enables the same users to benefit from various trends presented to them mainly because they have chosen to opt-in to a privacy-aware user behavioral analysis and mining system. In one embodiment as users opt-in to their privacy settings, new trends will also become available based on the level of privacy opt-ins.
In one embodiment, the more a user relaxes their privacy settings, the more relevant trend information they will receive. As several examples: people “like you” are also exploring item i from widget w; a scene favored by the community is coming up! (other people “liked” this scene); this show is a “local favorite; there are 20K other “couples” watching the show now!; two of your friends purchased item i from widget w; everyone's now tuned to channel c for breaking news; you are the “mayor” of the show c (badges); share/compare your activity diary with others and find similar diaries (e.g., I've watched 20 hours of Netflix™, 5 hours of Grey's Anatomy, spent 20 hours on Youtube, etc.).
In one embodiment, the data structure for trend analysis and user activity takes into consideration context in addition to privacy settings. The collection of user activity data for trend analysis specifies user operation/selection. The framework provides a mechanism to capture/describe the overall context. Also, since multiple users in different settings/regions/preferences “gather around” the same context, the context can be used as a “glue” to generalize user preferences and behaviors for targeting purposes. The same data can be easily anonymized for trend analysis. A module can be provided (e.g., in the shared media device) to ensure that data is anonymized for trend analysis; alternately an anonymizer module in an external service) could be used. The anonymizer module may be configured to anonymize either a set of users or all users. For example, some individuals may want to expose their identity while other users may want to hide it. As one example, some highly influential users in a community may want to expose their identities. Thus, in one implementation the anonymizer module is configured to permit users to opt-in/opt-out of having their data anonymized A targeting engine that can be local or non-local receives “anonymized” user actions. The targeting engine may, for example, be used to target advertising to the user and also remind user that the more they expose confidential information the more benefits they receive in terms of suggestions, trend-analysis and receiving discounts and other benefits. Users thus benefit by balancing their privacy with the quality of service they desire to receive.
Targeting of discounts, bargains, and other useful information is a benefit that may be provided to consumers for relaxing their privacy settings. This may include advertisers providing various targeted deals and discounts based on the information that the consumer is willing to provide. As examples: complete a purchase from widget W while watching content C to receive 30% discount; now that your iPad™ is connected, download the ringtone/soundtrack for this show; given that you're interested in xfinity™, purchase the movie trailer you're watching on You Tube™ with 20% discount; download the “grey's anatomy” app for “your iPad™” (30% off) “You might also be interested” in widget w′ from the app store.
Unlike conventional privacy and trend techniques, the present invention permits privacy preserved usage/interest data. By way of comparison, addresses an important privacy concern that is of a particular concern for advanced internet television systems. TVs are communal devices. Conventional TVs mostly skip authentication due to non-user friendly interface and contrary to PCs. Moreover, conventional TVs do not typically allow multi-tasking. Therefore, the content being consumed can be clearly identified by potentially untrusted third parties. Basic TV remote interface and the continuous stream of content allows for very specific and explicit user targeting
With the ever increasing privacy concerns over internet applications and social networking platforms, bringing these services to TVs will soon create similar (or more pressing) concerns (due to exceptional characteristics of TV watching that distinguishes it from interacting with more personal devices such as HHP and PCs). This invention gives benefits to various parties.
The various aspects, features, embodiments or implementations of the invention described above can be used alone or in various combinations. The many features and advantages of the present invention are apparent from the written description and, thus, it is intended by the appended claims to cover all such features and advantages of the invention. Further, since numerous modifications and changes will readily occur to those skilled in the art, the invention should not be limited to the exact construction and operation as illustrated and described. Hence, all suitable modifications and equivalents may be resorted to as falling within the scope of the invention.
While the invention is described in conjunction with these specific embodiments, it will be understood that it is not intended to limit the invention to the described embodiments. On the contrary, it is intended to cover alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims. In the description, specific details are set forth in order to provide a thorough understanding of the present invention. The present invention may be practiced without some or all of these specific details. In addition, well known features may not have been described in detail to avoid unnecessarily obscuring the invention.
The term “computer readable medium” is used generally to refer to media such as main memory, secondary memory, removable storage, hard disks, flash memory, disk drive memory, CD-ROM and other forms of persistent memory. It should be noted that program storage devices, as may be used to describe storage devices containing executable computer code for operating various methods of the present invention, shall not be construed to cover transitory subject matter, such as carrier waves or signals. Program storage devices and computer readable medium are terms used generally to refer to media such as main memory, secondary memory, removable storage disks, hard disk drives, and other tangible storage devices or components.
In accordance with the present invention, the components, process steps, and/or data structures may be implemented using various types of operating systems, programming languages, computing platforms, computer programs, and/or general purpose machines. In addition, those of ordinary skill in the art will recognize that devices of a less general purpose nature, such as hardwired devices, field programmable gate arrays (FPGAs), application specific integrated circuits (ASICs), or the like, may also be used without departing from the scope and spirit of the inventive concepts disclosed herein. The present invention may also be tangibly embodied as a set of computer instructions stored on a computer readable medium, such as a memory device.
This application claims the benefit of priority under 35 U.S.C. 119(e) to U.S. Provisional Patent Application No. 61/481,153, filed Apr. 30, 2011, which is incorporated herein by reference for all purposes.
Number | Date | Country | |
---|---|---|---|
61481153 | Apr 2011 | US |