1. Field of Invention
The present application relates to administering a process whereby individuals may demand or request to opt out of facial recognition and other data collection. The process intervenes either at the time of collection to preclude collection of a facial image, through biometric information to identify a person as opted out after collection, through linkages made to other data after collection whereby a person is identified and linked to the opted out status, or by links to opted-out status which will preclude a third party from identifying a person in a picture or video (i.e., tagging on Facebook®).
2. Discussion of Related Art
The advent of relatively inexpensive imaging technologies paired with falling costs of processing, storage, and networking have made the exploitation of facial images widespread and increasingly ubiquitous. The privacy implications of such practices are numerous because personal data is collected unconsented and passively from people who have made no decision to use any particular technology. There is no technological solution to opting out of this intrusive data collection save for wearing complete head cover. As a person's face is the primary element of a person's external identity, such a practice would require a person to sacrifice his or her identity to preserve his or her privacy.
Facial recognition, until recently largely limited to government collection at border crossings and other high profile locations, is becoming widespread, allowing at least a crude geo-tracking of a person's movements. When combined with other data such as geo-tracking through other means such as from mobile device movements, credit card and affinity card usage, and license plate scanning, a person's identity can be established and movements and activities can be tracked nearly continuously. This is the infrastructure of a surveillance state. This is the infrastructure that allows commercial firms to intrusively target individuals with tightly tailored advertisements based on sometimes wrong assumptions. The privacy concern about this technology is not only the image which is taken, processed, stored, and disseminated but the linking of that image to a particular place and time and to those also in the image, be they companions or mere passersby.
While commercial use of facial recognition technologies is largely unregulated (expect perhaps for young children under the Children's Online Privacy Protection Act of 1998 (COPPA)),1 and government use is largely unrestricted in public areas, greater regulation seems likely in the future and many companies may wish to the accede to the preferences of individuals to opt out of such activities. 1 5 USC 6501-6506
This application discloses a number of related processes whereby individuals using mobile devices may enhance their privacy. Some processes entail enrollment in an opt-out registry requesting (or demanding when supported by legal rights) to be excluded from the collection, processing, storage, dissemination, sale, trade, or transfer of facial recognition data (or other undesired or unconsented collection activities). Other methods involve the use of beacons to alert collection devices that a person carrying a mobile device is opted out of certain collection activities or an area or location is similarly off limits. Still other methods involve the opting-out of geographical areas from certain collection (bars or restaurants from facial recognition; movie theaters from video recording). A combination of some of the above methods uses the values of detectable, identifying signatures of a mobile device as a beacon-like alert to collection sensors: certain values such as specific ranges would denote that the user of a device is opted-out of specific collection activities.
The first method involves mobile device users registering their device with an opt-out registry. Parents or guardians could similarly enroll their children or wards. The registry could include both personal identifying information, information about personal mobile devices, and biometric data to allow identification of opted-out individuals, although it could be built without the biometric data. Removing an individual from the network of facial recognition data collection and exchange is not as straight forward as removing an individual from other data collection. Consequently, several processes are described herein which block the collection, processing, storage, disseminate, sale, trade, or transfer of such information. This first process has a networked sensor paired with an imaging device. The sensor can detect identifying signatures any mobile device carried by the opted out user. If such a device is detected near the imaging system, the sensor queries the opt-out registry to determine if it belongs to an opted-out person. No imagery would be taken (or if taken, restricted in use) if a device belonging to an opted out person is nearby.
The second method is a more elaborate version of the first process whereby the networked sensor paired with the imagery device is sophisticated enough to determine when a person carrying a mobile device might be within the field of view of the imaging device. If so, the sensor queries the opt-out registry to determine whether the person is opted-out and if so, no imagery is taken (or if taken, restricted in its use).
The third method uses a mobile beacon which can be detected by a sensor paired with an imaging device (or other data collection system). The beacon signal denotes that the person carrying it is opted-out of certain types of collection. The sensor would be able to determine this without having to query an opt-out registry based on the parameters of the beacon signal. A beacon signal might be created by a mobile device or through a separate device entirely. This beacon method could be used either with a proximity rule (as in the first method) or a field of view rule (as in the second method).
The fourth method applies to networked devices with locational capabilities such as Google Glass® that collect images and or other data. The opt-out registry in this method includes not only people and the devices they carry but also geographical locations. The networked device would query the opt-out registry to determine if certain types of collection are disallowed in certain places. Imaging or other collection would only be allowed in areas not opted-out.
The fifth method also relates to mobile devices with imaging or other data collection capabilities. In this method a geographically fixed or stationary but moveable beacon alerts nearby mobile collection devices that certain types of collection are not allowed in the vicinity of the beacon.
The sixth method compares images or parametric data derived from images taken by fixed or mobile systems with images or parametric data derived from images within an opt-out registry. If the image or parametric data can be correlated to images or parametric data of a person in the registry, the imagery and co-collected data (and perhaps correlated data) is erased or otherwise treated differently.
The seventh method compares personally identifiable data either co-collected with an image or subsequently correlated to an image to personally identifiable data in an opt-out registry. As with the previous method, if a match is found, the image and co-collected data (and perhaps the subsequently correlated data) is erased or otherwise treated differently.
The eighth method is similar to the seventh method but it is applied to previously collected or archived images and data. If matches are found with images or data in the opt-out registry, the images and co-collected data (and perhaps correlated data) is erased or otherwise flagged for different treatment.
The ninth method is a specific case of the third method wherein the individual, detectable signatures of a mobile device themselves are coded to indicate opt-out status for facial recognition. Unlike the simple beacon case in method three, the “beacon signal” in this case would contain personally identifiable information.
Developing opt-out processes for facial recognition is more complex than for other data collection in that some processing of an image or correlation of an image to other data is often needed before it can be determined whether or not the imaged individual is in an opted out status. The first process through which an opt-registry might function is through an individual registering a device with a personally identifiable phenomenon (or multiple phenomena) which a sensor attached to a still or video camera detects. The camera does not take images if the phenomenon (or multiple phenomena) is detected within a certain range. One example of an implementation of this method is a sensor which detects the MAC (Media Access Control) address of a cell phone or other mobile device.2
The second process is a refinement of the first process. A sensor attached to an imaging system can determine not only the proximity of a device but also the direction of the device allowing the sensor to determine through calculations whether the device (and an individual carrying it) is within the imaging system field of view. This can be done directly in systems with a fixed field of view or can be dynamically calculated when the field of view is variable (due to zoom in or out status of the imaging system or the direction in which an imaging system is pointing when it takes an image).
The third process uses an opt-out beacon. A device emits a signature which need not but might include personally identifiable information. The signature could be created by a specially designed device or could be created by another common device such as a smart phone. If an imaging system is near such a beacon, no images would be taken unless the imaging system can determine that the beacon (and an individual carrying it) is not within its field of view.
The first three processes (proximity to a device, device within field of view, and proximity (or within field of view) of an opt-out beacon) also can be used for networked mobile imaging devices (of which Google Glass® or the car Google uses to create street level imagery are examples).
The fourth process relates to networked mobile imaging systems with locational capabilities (of which Google Glass® or the car Google uses to create street level imagery are examples). The mobile imaging system would query the opt-out database to determine if the imaging system is in or near a geographical area which is within the opt-out registry. If the device cannot ensure that its field of view does not extend into an opted-out area, no imagery would be allowed.
The fifth process relates to mobile imaging systems (of which Google Glass® or the car Google uses to create street level imagery are examples). A geographically fixed (or moveable)3 opt-out beacon is detected by the imaging system. The signal may or may not be the same signal from a personal opt-out beacon. The opt-out beacon may be a simple signal or more complex (for example, it might include information on what distance from the beacon is included in the opted-out area. This process could also be used for beyond facial recognition. For example, a movie theater could set up a beacon which would signal Google Glass® or other mobile imaging systems that video recording is not permitted while the beacon is on.
The sixth process related both to fixed and mobile imaging systems. An image has already been taken by such a system and co-collected data may be attached to the image (date, time, location, companions, etc.). That image is either compared to images within the opt-out registry or parametric information derived from image is compared to parametric data derived from images in the opt-out registry. If there is a match for the image, that image and co-collected data is treated differently. The alternative handling could be deletion, a halt to further processing or correlation to other information, or retention only for very circumscribed uses.4
The seventh process also relates to images taken by fixed and mobile systems. Subsequent processing may correlate other data to an image. For example, the image may be correlated to a particular cell phone number. While the image may not be matched to an image in the opt-out registry, the correlated, personally identifiable data may be matched to corresponding data in the opt-out registry. If so, the image, co-collected data, and perhaps other correlated data would be treated differently. See
The eighth process is a variation of the seventh process. Existing databases of images, co-collected data, and correlated, personally identifiable data could be compared to corresponding data in an opt-out registry. If any match is found, the image, co-collected data, and perhaps other correlated data would be treated differently.
The ninth process is a variation of the first three processes. Signature emissions from a mobile device are organized so that certain ranges for these devices indicate the device user is opted-out of certain data collection and other practices including but not limited to facial recognition, geo-tracking, and behavioral advertising. In this case, the signature serves like a beacon. In the case of a beacon, no personally identifiable information need be included while the signature, in this process, includes the opt-out status and personally identifiable information.
The present application relates to and claims priority of U.S. provisional patent application (“Copending Provisional Application”), Ser. No. 61/948,678, entitled “PROCESSES TO ENABLE INDIVIDUALS TO OPT OUT (OR BE OPTED OUT) OF VARIOUS FACIAL RECOGNITION AND OTHER SCHEMES AND ENABLE BUSINESSES AND OTHER ENTITIES TO COMPLY WITH SUCH DECISIONS AND A PROCESS FOR PROTECTING PRIVACY THROUGH MOBILE DEVICE SIGNATURE-HOPPING,” filed on Feb. 21, 2014. The disclosure of the Copending Provisional Application is hereby incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
61942678 | Feb 2014 | US |