Automatically enhancing privacy in live video streaming

ABSTRACT

Technology for a device operable for secured user access is described. The technology can comprise one or more processors. The device can be configured to identify an intruder indicator, wherein the intruder indicator can indicate that an intruder has been detected in a proximity of either the local device or a remote device in communication with the local device. The device can be configured to activate one or more privacy filters at the local device. The device can be configured to encode data based on the one or more privacy filters.

BACKGROUND

Live video streaming applications such as video conferencing, onlinegame broadcasting, and video blogging can use data-level encryption toprotect video and audio data and provide privacy at the data level. Atthe network level, privacy can be attained by preventing attackers fromtapping into the video and audio streams. In a business office setting,privacy is important to maintain in order to protect the confidentialityof a company's information.

However, privacy at the data level and the network level might not beadequate to prevent unauthorized communication of confidentialinformation. For example, the in-person presence of an intruder in thephysical spaces of a user conducting a live video stream application candisclose confidential information to the intruder. Live video streamingis not equipped to handle these kinds of situations.

BRIEF DESCRIPTION OF THE DRAWINGS

Features and advantages of technology embodiments will be apparent fromthe detailed description which follows, taken in conjunction with theaccompanying drawings, which together illustrate, by way of example,various technology features; and, wherein:

FIG. 1a illustrates a system for live video streaming in accordance withan example embodiment;

FIG. 1b illustrates a system for live video streaming with secured useraccess in accordance with an example embodiment;

FIG. 2 illustrates a table depicting secured user access between a localuser and remote user in accordance with an example embodiment;

FIG. 3 illustrates a diagram for secured user access in accordance withan example embodiment;

FIG. 4 depicts functionality for secured user access in accordance withan example embodiment;

FIG. 5 depicts a device for secured user access in accordance with anexample embodiment;

FIG. 6 depicts a system for secured user access in accordance with anexample embodiment;

FIG. 7 illustrates a computing system that includes a data storagedevice in accordance with an example embodiment;

FIG. 8 illustrates a user device operable for secured user access inaccordance with an example embodiment; and

FIG. 9 illustrates a local device operable for secured user access incommunication with a remote device operable for secured user access inaccordance with an example embodiment.

Reference will now be made to the exemplary embodiments illustrated, andspecific language will be used herein to describe the same. It willnevertheless be understood that no limitation on technology scope isthereby intended.

DESCRIPTION OF EMBODIMENTS

Before the disclosed technology embodiments are described, it is to beunderstood that this disclosure is not limited to the particularstructures, process steps, or materials disclosed herein, but isextended to equivalents thereof as would be recognized by thoseordinarily skilled in the relevant arts. It should also be understoodthat terminology employed herein is used for the purpose of describingparticular examples or embodiments only and is not intended to belimiting. The same reference numerals in different drawings representthe same element. Numbers provided in flow charts and processes areprovided for clarity in illustrating steps and operations and do notnecessarily indicate a particular order or sequence.

Furthermore, the described features, structures, or characteristics canbe combined in any suitable manner in one or more embodiments. In thefollowing description, numerous specific details are provided, such asexamples of layouts, distances, network examples, etc., to provide athorough understanding of various invention embodiments. One skilled inthe relevant art will recognize, however, that such detailed embodimentsdo not limit the overall technological concepts articulated herein, butare merely representative thereof.

As used in this written description, the singular forms “a,” “an” and“the” include express support for plural referents unless the contextclearly dictates otherwise. Thus, for example, reference to “a sensor”includes a plurality of such sensors.

Reference throughout this specification to “an example” means that aparticular feature, structure, or characteristic described in connectionwith the example is included in at least one embodiment of the presentinvention. Thus, appearances of the phrases “in an example” or “anembodiment” in various places throughout this specification are notnecessarily all referring to the same embodiment.

As used herein, a plurality of items, structural elements, compositionalelements, and/or materials can be presented in a common list forconvenience. However, these lists should be construed as though eachmember of the list is individually identified as a separate and uniquemember. Thus, no individual member of such list should be construed as ade facto equivalent of any other member of the same list solely based ontheir presentation in a common group without indications to thecontrary. In addition, various embodiments and example of the presenttechnology can be referred to herein along with alternatives for thevarious components thereof. It is understood that such embodiments,examples, and alternatives are not to be construed as defactoequivalents of one another, but are to be considered as separate andautonomous representations under the present disclosure.

Furthermore, the described features, structures, or characteristics canbe combined in any suitable manner in one or more embodiments. In thefollowing description, numerous specific details are provided, such asexamples of layouts, distances, network examples, etc., to provide athorough understanding of invention embodiments. One skilled in therelevant art will recognize, however, that the technology can bepracticed without one or more of the specific details, or with othermethods, components, layouts, etc. In other instances, well-knownstructures, materials, or operations may not be shown or described indetail to avoid obscuring aspects of the disclosure.

In this disclosure, “comprises,” “comprising,” “containing” and “having”and the like can have the meaning ascribed to them in U.S. Patent lawand can mean “includes,” “including,” and the like, and are generallyinterpreted to be open ended terms. The terms “consisting of” or“consists of” are closed terms, and include only the components,structures, steps, or the like specifically listed in conjunction withsuch terms, as well as that which is in accordance with U.S. Patent law.“Consisting essentially of” or “consists essentially of” have themeaning generally ascribed to them by U.S. Patent law. In particular,such terms are generally closed terms, with the exception of allowinginclusion of additional items, materials, components, steps, orelements, that do not materially affect the basic and novelcharacteristics or function of the item(s) used in connection therewith.For example, trace elements present in a composition, but not affectingthe compositions nature or characteristics would be permissible ifpresent under the “consisting essentially of” language, even though notexpressly recited in a list of items following such terminology. Whenusing an open ended term in this written description, like “comprising”or “including,” it is understood that direct support should be affordedalso to “consisting essentially of” language as well as “consisting of”language as if stated explicitly and vice versa.

The terms “first,” “second,” “third,” “fourth,” and the like in thedescription and in the claims, if any, are used for distinguishingbetween similar elements and not necessarily for describing a particularsequential or chronological order. It is to be understood that any termsso used are interchangeable under appropriate circumstances such thatthe embodiments described herein are, for example, capable of operationin sequences other than those illustrated or otherwise described herein.Similarly, if a method is described herein as comprising a series ofsteps, the order of such steps as presented herein is not necessarilythe only order in which such steps may be performed, and certain of thestated steps may possibly be omitted and/or certain other steps notdescribed herein may possibly be added to the method.

As used herein, comparative terms such as “increased,” “decreased,”“better,” “worse,” “higher,” “lower,” “enhanced,” “maximized,”“minimized,” and the like refer to a property of a device, component, oractivity that is measurably different from other devices, components, oractivities in a surrounding or adjacent area, in a single device or inmultiple comparable devices, in a group or class, in multiple groups orclasses, or as compared to the known state of the art. For example, asensor with “increased” sensitivity can refer to a sensor in a sensorarray which has a lower level or threshold of detection than one or moreother sensors in the array. A number of factors can cause such increasedsensitivity, including materials, configurations, architecture,connections, etc.

As used herein, the term “substantially” refers to the complete ornearly complete extent or degree of an action, characteristic, property,state, structure, item, or result. For example, an object that is“substantially” enclosed would mean that the object is either completelyenclosed or nearly completely enclosed. The exact allowable degree ofdeviation from absolute completeness may in some cases depend on thespecific context. However, generally speaking the nearness of completionwill be so as to have the same overall result as if absolute and totalcompletion were obtained. The use of “substantially” is equallyapplicable when used in a negative connotation to refer to the completeor near complete lack of an action, characteristic, property, state,structure, item, or result. For example, a composition that is“substantially free of” particles would either completely lackparticles, or so nearly completely lack particles that the effect wouldbe the same as if it completely lacked particles. In other words, acomposition that is “substantially free of” an ingredient or element maystill actually contain such item as long as there is no measurableeffect thereof.

As used herein, the term “about” is used to provide flexibility to anumerical range endpoint by providing that a given value may be “alittle above” or “a little below” the endpoint. However, it is to beunderstood that even when the term “about” is used in the presentspecification in connection with a specific numerical value, thatsupport for the exact numerical value recited apart from the “about”terminology is also provided.

Numerical amounts and data may be expressed or presented herein in arange format. It is to be understood that such a range format is usedmerely for convenience and brevity and thus should be interpretedflexibly to include not only the numerical values explicitly recited asthe limits of the range, but also to include all the individualnumerical values or sub-ranges encompassed within that range as if eachnumerical value and sub-range is explicitly recited. As an illustration,a numerical range of “about 1 to about 5” should be interpreted toinclude not only the explicitly recited values of about 1 to about 5,but also include individual values and sub-ranges within the indicatedrange. Thus, included in this numerical range are individual values suchas 2, 3, and 4 and sub-ranges such as from 1-3, from 2-4, and from 3-5,etc., as well as 1, 1.5, 2, 2.3, 3, 3.8, 4, 4.6, 5, and 5.1individually.

This same principle applies to ranges reciting only one numerical valueas a minimum or a maximum. Furthermore, such an interpretation shouldapply regardless of the breadth of the range or the characteristicsbeing described.

An initial overview of technology embodiments is provided below and thenspecific technology embodiments are described in further detail later.This initial summary is intended to aid readers in understanding thetechnology more quickly, but is not intended to identify key oressential technological features nor is it intended to limit the scopeof the claimed subject matter. Unless defined otherwise, all technicaland scientific terms used herein have the same meaning as commonlyunderstood by one of ordinary skill in the art to which this disclosurebelongs.

In a business office setting, privacy is important to maintain in orderto protect the confidentiality of a company's information. However,privacy at the data level and the network level might not be adequate toprevent unauthorized communication of confidential information. Forexample, the in-person presence of an intruder in the physical spaces ofa user conducting a live video stream application can discloseconfidential information to the intruder.

In one example, during two-party or multi-party video conferencing, thein-person presence of an intruder in the physical spaces of a userparticipating in the video conference can disclose valuable informationto the intruder. In order to prevent the disclosure of the valuableinformation and preserve privacy, the user might attempt to manuallyturn off the camera, mute the microphone and speaker, or minimize theapplication window when the user has detected that an intruder hasentered the vicinity of the user.

This potential solution to the in-person presence of an intruderpresents a few problems. First, the user may not be able to detect thein-person presence of the intruder until disclosure of valuableinformation has already occurred. Second, the user might find itdifficult to manually turn off the camera, mute the microphone andspeaker, and minimize the application window every time that the userdetects the in-person presence of an intruder.

In one example, a device (i.e. a device used by a user, such as adesktop computer or work station, or a mobile device, such as a laptopcomputer, a tablet computer, or a smart phone, or other audio and/orvideo device) can be operable for secured user access. The device (e.g.a local device) can comprise one or more processors. The one or moreprocessors can be configured to identify an intruder indicator, whereinthe intruder indicator indicates that an intruder has been detected in aproximity of either the local device or a remote device in communicationwith the local device. The one or more processors can be furtherconfigured to activate one or more privacy filters at the local device.The one or more processors can be further configured to encode databased on the one or more privacy filters. In this example, the devicecan detect the in-person presence of the intruder before the disclosureof valuable information has occurred. In addition, automatic activationof the privacy filters at the local device can ameliorate the difficultyof manually turning off the camera, muting the microphone and speaker,and minimizing the application window every time that the user detectsthe in-person presence of an intruder.

In one example, as illustrated in FIG. 1 a, live video conferencing canoccur between Person A and Person B. Person A can view the display 104 aand Person B can view the display 102 a. During live video conferencingbetween Person A and Person B, an Intruder, can enter the physicalproximity of Person B. When Person B detects the Intruder, Person B canattempt to manually turn off the camera, mute the microphone, mute thespeakers, and minimize any open application windows. By manually turningoff the camera, Person B can attempt to prevent Person A from receivinginformation about the Intruder. By manually muting the microphone,Person B can attempt to prevent Person A from hearing any conversationbetween Person B and the Intruder. By muting the speakers, Person B canattempt to prevent the Intruder from hearing the conversation betweenPerson B and Person A. By minimizing any open application windows,Person B can attempt to prevent the Intruder from receiving informationabout Person A and the shared content between Person B and Person A.

However, as previously discussed, Person B may not be able to manuallyturn off the camera, mute the microphone, mute the speakers, andminimize any open application windows before valuable information hasspread to Person A or to the Intruder if Person B is not be able todetect the presence of the Intruder in a timely manner. Also, manuallyturning off the camera, muting the microphone, muting the speakers, andminimizing any open application windows can be burdensome on Person B,especially in the case of frequent intrusions. In addition, Person Bmight not be able to detect the presence of the Intruder unless Person Bcan see or hear the Intruder.

In one example, as illustrated in FIG. 1 b, live video conferencing canoccur between Person A and Person B. Person A can view the display 104 band Person B can view the display 102 b. During live video conferencingbetween Person A and Person B, an Intruder, can enter the physicalproximity of Person B. In this example, the device used by Person B forlive video conferencing with Person A (i.e. Person B's device) can beconfigured to detect the Intruder in the proximity of Person B's device.Person B's device can be configured to identify an intruder indicator,wherein the intruder indicator indicates that an intruder has beendetected in a proximity of Person B's device. Person B's device can beconfigured to activate one or more privacy filters at Person B's device.Person B's device can be configured to encode data based on the one ormore privacy filters.

The example illustrated in FIG. 1b is not intended to be limiting. Otherapplications can include: live video conferencing among more than twopeople, live or recorded video blogging, online gaming, or any otherapplication in which audio information or video information is receivedby one or more people or transmitted by one or more people to anotherperson or people.

In one example, a device (e.g. a local device) can receive a recordedvideo or audio. In an example, the local device can receive a recordededucational lecture online in which the lecture can include audio orvideo content. In this example, the local device can be configured toidentify an intruder indicator, wherein the intruder indicator indicatesthat an intruder has been detected in a proximity of the local device.The local device can be further configured to activate one or moreprivacy filters at the local device. The local device can be furtherconfigured to encode data based on the one or more privacy filters. Thelocal device can receive the recorded educational lecture from awebsite, a personal area network, a local area network, or any otherwireless or wired connection.

In one example, the device (e.g. a local device) can be configured incases in which a local user is viewing sensitive or confidentialdocuments to restrict intruders from viewing the sensitive orconfidential documents. In this example, the local device can beconfigured to identify an intruder indicator, wherein the intruderindicator indicates that an intruder has been detected in proximity ofthe local device; activate one or more privacy filters at the localdevice; and encode data based on the one or more privacy filters.

In one example, a remote device (i.e. Person A's device) can beconfigured to receive video or audio information from a local device(i.e. Person B's device). In this example, the remote device can beconfigured to identify an intruder indicator, wherein the intruderindicator indicates that an intruder has been detected in proximity ofthe local device; activate one or more privacy filters at the remotedevice; and encode data based on the one or more privacy filters. Theremote device can receive an intruder indicator from the local device orthe remote device can be configured to detect an intruder at the localdevice based on the video or audio information received from the localdevice.

In one example, Person B's device can be configured to identify a numberof authorized users in a proximity of either Person B's device or PersonA's device. In an example, if Person B is the only authorized user, thenthe number of authorized users would be equal to 1. If Person B and twoother people were authorized users, then the number of authorized userswould be equal to 3. In one example, Person's B's device can beconfigured to identify a number of users in a proximity of Person B'sdevice. In an example, the number of users can be equal to 2 if Person Bis using Person B's device and an intruder is also present in theproximity of Person B's device.

In one example, Person B's device can be configured to activate theintruder indicator when the number of users in the proximity of eitherPerson B's device or Person A's device is greater than the number ofauthorized users in the proximity of either Person B's device or PersonA's device, e.g. when only Person B is an authorized user and anotherperson, an intruder, is in the proximity of Person B's device. Theintruder indicator can be activated by setting the value of the intruderindicator to “true.”

In one example, Person B's device can be configured to deactivate theintruder indicator when the number of users in the proximity of eitherPerson B's device or Person A's device is less than or equal to thenumber of authorized users in the proximity of either Person B's deviceor Person A's device, e.g. when only Person B is an authorized user andno other person is in the proximity of Person B's device. The intruderindicator can be deactivated by setting the value of the intruderindicator to “false.”

In one example, a list of authorized users can be modified by adding auser to the list of authorized users or deleting a user from the list ofauthorized users. In an example, the list of authorized users caninclude only Person B. The list of authorized users can be modified byadding Person C and Person D so that the list of authorized usersincludes Person B, Person C, and Person D. The list of authorized userscan be further modified by deleting Person C so that the list ofauthorized users includes Person B and Person D.

In one example, Person B's device can be configured to activate theintruder indicator when a user is recognized in the proximity of thelocal device (i.e. Person B's device) who is not an authorized user. Inan example, when the list of authorized users includes only Person B andPerson D, and Person C is in the proximity of Person B's device, theintruder indicator can be activated. A user can be recognized using oneor more of facial recognition, body recognition, gait recognition, voicerecognition, or proximity recognition, etc.

In one example, if Person C is not an authorized user on the list ofauthorized users for Person B's device, and Person C subsequently leavesthe proximity of Person B's device, then Person B's device can beconfigured to deactivate the intruder indicator when each user in theproximity of the local device is recognized as an authorized user. In anexample, when Person B and Person C are the only people in the proximityof Person B's device, and Person C, an unauthorized user, leaves theproximity of Person B's device, then the intruder indicator can bedeactivated.

In one example, the device (e.g. a local device) can be configured toidentify a status of a timer. The status of the timer can indicate thatthe timer is expired or not expired. When the status of the timer is notexpired, the local device can decrement a timer value of the timer. Thetimer value can be a real number. When the timer value is at a maximumvalue, wherein the maximum value can be a real number, the local devicecan store an initial state of the timer.

In one example, the intruder indicator can be a Boolean with a value oftrue or false. In one example, intruder indicator can have a threshold,wherein the intruder indicator can be activated or deactivated based onthe threshold. In one example, when the threshold is exceeded, theintruder indicator can be activated. In another example, when thethreshold is not exceeded the intruder indicator can be deactivated(e.g. inactive). In another example, the intruder indicator can have athreshold for activation that is different from the threshold fordeactivation. In this example, the threshold can be activated at a valuethat is greater than the value for deactivation. In this example, thethreshold can be deactivated at a value that is less than the value fordeactivation. This difference in activation value and deactivation valuecan be used to prevent changes between activation and deactivation dueto small differences in the level of intrusion.

In one example, the intruder indicator can be activated or deactivatedbased on one or more of audio data, video data, or proximity data. Audiodata can include auditory information that can be detected by amicrophone or a related sensor. Video data can include visualinformation that can be detected by a camera or a related sensor.Proximity data can include proximity information that can be detected bya proximity sensor.

In one example, the one or more privacy filters can include deactivatinga microphone, deactivating a speaker, deactivating a camera,deactivating a display, deactivating an application window, ordeactivating any other sensor used in a device. “Deactivation,”“deactivated,” and the like as used herein, can refer to a state ofinactivity, for example causing a device, or feature of a device, totake or remain in an inactive state, or otherwise removing theeffectiveness (e.g. effective operation) thereof.

In one example, deactivating the microphone can include one or more ofmuting an audio stream of the microphone, reducing a volume of an audiostream of the microphone, or distorting an audio stream of themicrophone.

In one example, deactivating the speaker can include one or more ofmuting an audio output of the speaker, reducing a volume of an audiooutput of the speaker, or distorting an audio output of the speaker.

In one example, deactivating the camera can include one or more ofswitching off the camera, reducing a brightness of a video stream fromthe camera, or distorting a video stream from the camera.

In one example, deactivating the display can include one or more ofswitching off the display, reducing a brightness of the display,distorting a video output of the display, or switching the display todifferent content.

In one example, the device (e.g., a local device) can be configured toidentify a level of intrusion in the proximity of the local device. Thelevel of intrusion can be based on one or more of audio data, videodata, proximity data, or other related data from a sensor. In oneexample, the local device can activate one or more privacy filters atthe local device based on the level of intrusion. In an example, PersonB's device can identify a loud sound from outdoors by using microphone,an intruder looking at Person B's display from outside a window by usinga camera, and a proximity sensor that can identify the location of theintruder within a proximity of Person B's device. In this example, thelevel of intrusion can be higher than a level of intrusion in which adistant airplane or vehicle passes and emits a weak sound. In theexample of the intruder peering through the window, a greater number ofprivacy filters can be activated with each activated privacy filterbased on a higher level of intrusion. In the example of the distantairplane, a lesser number of privacy filters can be activated with eachactivated privacy filter based on a lower level of intrusion, (e.g. thevolume of the audio stream from the microphone can be lowered).

In one example, the local device can be configured to identify alocation of the local device and activate the one or more privacyfilters at the local device based on the location of the local device.In an example, Person B's device can be in Person B's office. In thisexample, a higher level of privacy filters can be activated. In anotherexample, Person B's device can be in a public park or a coffee shop inwhich a lower level of privacy filters can be activated.

In one example, the local device can be configured to identify privacysettings of the local device and activate the one or more privacyfilters at the local device based on the privacy settings of the localdevice. In an example, the privacy settings of Person B's device can becustomized to be more or less sensitive to potential intrusions. PersonB can customize the privacy settings so that recurring sounds, e.g. abarking dog, do not activate the one or more privacy filters. Person Bcan customize the privacy settings so that recurring intrusions, (e.g.an intruder who frequently attempts to eavesdrop on communicationsinvolving Person B), do activate the one or more privacy filters.

In one example, the local device can be configured to encode data basedon the one or more privacy filters for transmission from the localdevice to one or more remote devices. In an example, Person B's devicecan be configured to transmit the data encoded with one or more privacyfilters to a Person C and a Person D.

In one example, the local device can be configured to identify a levelof ambient audio and a level of background video. The local device canbe configured to activate or deactivate the one or more privacy filtersat the local device based on the level of ambient audio or the level ofbackground video. In an example, Person B's device can be located near arailroad track. In this example, Person B's device can be configured tomodify the threshold for activation of the privacy filters based on theambient audio from trains passing by. In another example, Person B'sdevice can be located near a window with a large number of people movingpast the window without stopping. In this example, Person B's device canbe configured to identify the people passing by the window as backgroundvideo, and can be configured to modify the threshold for activation ofthe privacy filters based on the level of background video.

In one example, the device (e.g. a local device) can be configured todeactivate a portion of one or more of the microphone, the camera, thespeaker, or the display. In an example, a portion of the video streamsent to the remote user can be deactivated, distorted, or blurred. Whenthe local user is in a public place, people walking in the backgroundcan be blurred out or portions of the people can be blurred out. Inanother example, the background of the video stream can be blurred outor distorted.

In one example, the local device can be configured to identify a numberof locations of sources of user audio or a number of user voices. Thelocal device can be configured to activate or deactivate the one or moreprivacy filters at the local device based on the number of locations ofsources of user audio or the number of voices. When the number ofsources of user audio is greater than the number of authorized users,the privacy filters at the local device can be activated. When thenumber of sources of user audio is less than or equal to the number ofauthorized users, the privacy filters at the local device can bedeactivated. When the number of user voices is greater than the numberof authorized users, the privacy filters the local device can beactivated. When the number of user voices is less than or equal to thenumber of authorized users, the privacy filters at the local device canbe deactivated.

In one example, a physical position of a camera of the local device canbe moved or the angle of the camera of the local device can be adjustedto detect intrusion in a proximity of the local device. In one example,the camera can move toward or angle toward a source of a sound to detectintrusion. In another example, the camera can move toward or angletoward a proximity source in order to detect intrusion. In anotherexample, the physical position of the camera or the angle of the cameracan adjust to detect intrusion based on audio data, video data,proximity data, or any other related sensor data.

In one example, a local device can receive video data, audio data,proximity data, or other sensory data from other devices to detectintrusion at the local device. In an example, the local device can usevideo data obtained from a camera that is separate from the local deviceto detect an intrusion at the local device.

In one example, a user can be authenticated by one or more of an audiosample, a video sample, or a proximity sample.

In one example, the local device can be configured to identify anauthorized user based on one or more of facial recognition, bodyrecognition, gait recognition, voice recognition, or proximityrecognition. In another example, the local device can be configured toidentify an intruder based on one or more of facial recognition, bodyrecognition, gait recognition, voice recognition, or proximityrecognition.

In another example, the local device can be configured to activate oneor more privacy filters at a remote device in communication with thelocal device.

In another example, the local device can be configured to communicatewith a remote device, wherein the remote device is a cloud device.

In another example, a device can be configured to decode datacommunicated from a local device.

In one example, as depicted in a table in FIG. 2, Person B (the localuser) and Person A (the remote user) can each want privatecommunication. Person B can attain privacy by one or more of: (a)deactivation of Person B's camera and displaying a message to the remoteuser on the remote user's device about the presence of an Intruder, (b)deactivation of Person B's microphone, (c) deactivation of openapplication windows at Person B's device, (d) deactivation of Person B'sdisplay, or (e) deactivation of Person B's speakers. Person A can attainprivacy by one or more of: (a) deactivation of application windows onPerson B's device that can reveal visual information about Person A, or(b) deactivation of speakers on Person B's device that can revealauditory information about Person A.

In one example, Person B (the local user) might want privatecommunication while Person A (the remote user) might want publiccommunication. Person B can attain privacy by one or more of: (a)deactivation of Person B's camera and displaying a message to the remoteuser on the remote user's device about the presence of an Intruder, (b)deactivation of Person B's microphone, (c) deactivation of openapplication windows at Person B's device, (d) deactivation of Person B'sdisplay, or (e) deactivation of Person B's speakers. In this example,Person A, who does not want privacy, would not depend on the actions atPerson B's device.

In one example, Person B (the local user) might want publiccommunication while Person A (the remote user) might want privatecommunication. Person A can attain privacy by one or more of: (a)deactivation of application windows on Person B's device that can revealvisual information about Person A, or (b) deactivation of speakers onPerson B's device that can reveal auditory information about Person A.

In one example, Person B (the local user) might want publiccommunication and Person A (the remote user) might want publiccommunication. In this example, Person B's device may not use anyprivacy filters.

In one example, as depicted in the diagram in FIG. 3, video or audioinformation can be communicated from a local device to a remote device.In operation 302 new video or audio information from the local devicecan be identified at the local device. In operation 304, the intruderflag can be checked. If the intruder flag is true (306), then operation308 can be triggered. In operation 308, if the timer is not expired(310), then the timer can be decremented and the initial state of thetimer can be saved if the timer is at a maximum value (312). Inoperation 316, one or more privacy filters can be applied or activatedat the local device. In operation 320, the local device can encode databased on the one or more privacy filters. The local device cancommunicate the encoded data for transmission from the local device to aremote device in operation 324. The one or more privacy filters appliedat the local device can include one or more of: deactivating amicrophone at the local device, deactivating a speaker at the localdevice, deactivating a camera at the local device, deactivating adisplay at the local device, deactivating an application window at thelocal device, or a combination thereof.

In one example, if the timer is expired in operation 308 or if theintruder flag is false in operation 304, intruder detection can beidentified in operation 330. In operation 334, if the number of faces ornumber of persons identified by the local device is greater than 1, thenthe local device can set the intruder flag to true, start the timer, anddeactivate the display in operation 338. In operation 334, if the numberof faces or number of persons identified by the local device is notgreater than 1, then the local device can check the intruder flag inoperation 344. In operation 344, if the intruder flag is set to false(346), then the local device can encode data in 320. The local devicecan communicate the encoded data for transmission from the local deviceto a remote device in operation 324. In operation 344, if the intruderflag is set to true (346), then the local device can reset the intruderflag, restore the initial state of the timer, and activate the displayin operation 350. The local device can encode data in 320. The localdevice can communicate the encoded data for transmission from the localdevice to a remote device in operation 324.

In one example, new video or audio information communicated from a localdevice can be identified at the remote device in operation 302. In oneexample, the remote device can receive an intruder indicator from thelocal device, wherein the intruder indicator can indicate that anintruder has been detected in a proximity of the local device. Inanother example, the remote device might not receive an intruderindicator from the local device. In operation 304, the intruder flag canbe checked at the remote device based on the new video or audioinformation communicated from the local device. If the intruder flag istrue (306), then operation 308 can be triggered. In operation 308, ifthe timer is not expired (310), then the timer can be decremented andthe initial state of the timer can be saved if the timer is at a maximumvalue (312). In operation 316, one or more privacy filters can beapplied or activated at the remote device. In operation 320, the remotedevice can encode data based on the one or more privacy filters. Theremote device can communicate the encoded data for transmission from theremote device to the local device in operation 324. The one or moreprivacy filters applied at the remote device can include one or more of:deactivating a microphone at the remote device, deactivating a camera atthe remote device, deactivating an application window at the remotedevice, terminating communication with the local device, or acombination thereof.

In one example, if the timer is expired in operation 308 or if theintruder flag is false in operation 304, intruder detection can beidentified in operation 330 based on the new video or audio informationcommunicated from the local device. In operation 334, if the number offaces or number of persons identified by the remote device is greaterthan 1, then the remote device can set the intruder flag to true andstart the timer in operation 338. In operation 334, if the number offaces or number of persons identified by the remote device is notgreater than 1, then the remote device can check the intruder flag inoperation 344. In operation 344, if the intruder flag is set to false(346), then the remote device can encode data in 320. The remote devicecan communicate the encoded data for transmission from the remote deviceto the local device in operation 324. In operation 344, if the intruderflag is set to true (348), then the remote device can reset the intruderflag and restore the initial state of the timer in operation 350. Theremote device can encode data in 320. The remote device can communicatethe encoded data for transmission from the remote device to a localdevice in operation 324.

Another example provides functionality 400 of an apparatus of a localdevice operable for secured user access, as shown in the flow chart inFIG. 4. The apparatus can comprise one or more processors. The one ormore processors can be configured to identify an intruder indicator,wherein the intruder indicator indicates that an intruder has beendetected in a physical proximity of either the local device or a remotedevice in communication with the local device, as in block 410. The oneor more processors can be configured to activate one or more privacyfilters at the local device, as in block 420. The one or more processorscan be configured to encode data based on the one or more privacyfilters, as in block 430.

Another example provides functionality 500 of a device operable forsecured user access, as shown in the flow chart in FIG. 5. The devicecan comprise one or more processors. The one or more processors can beconfigured to: identify an intruder indicator, wherein the intruderindicator indicates that a physical intruder has been detected; activateone or more privacy filters at the device; and encode data based on theone or more privacy filters, as in block 510. The device can compriseone or more of: a microphone configured to: communicate an audio stream;a speaker configured to: amplify an audio stream; a camera configuredto: communicate a video stream; or a display configured to: display avideo stream, as in block 520.

Another example provides functionality 600 of a system operable forsecured user access, as shown in the flow chart in FIG. 6. The systemcan comprise a local device comprising one or more processors configuredto: identify an intruder indicator, wherein the intruder indicatorindicates that an intruder has been detected in a proximity of eitherthe local device or a remote device in communication with the localdevice; activate one or more privacy filters at the local device; encodedata based on the one or more privacy filters for transmission from thelocal device to the remote device; communicate, for transmission fromthe local device to the remote device, the encoded data, as in block610. The system can comprise the remote device comprising one or moreprocessors configured to: receive the encoded data from the localdevice, as in block 620.

FIG. 7 illustrates a general computing system or device 700 that can beemployed in the present technology. The computing system 700 can includea processor 702 in communication with a memory 704. The memory 704 caninclude any device, combination of devices, circuitry, and the like thatis capable of storing, accessing, organizing, and/or retrieving data.Non-limiting examples include SANs (Storage Area Network), cloud storagenetworks, volatile or non-volatile RAM, phase change memory, opticalmedia, hard-drive type media, and the like, including combinationsthereof.

The computing system or device 700 additionally includes a localcommunication interface 706 for connectivity between the variouscomponents of the system. For example, the local communication interface706 can be a local data bus and/or any related address or control bussesas may be desired.

The computing system or device 700 can also include an I/O(input/output) interface 708 for controlling the I/O functions of thesystem, as well as for I/O connectivity to devices outside of thecomputing system 700. A network interface 710 can also be included fornetwork connectivity. The network interface 710 can control networkcommunications both within the system and outside of the system. Thenetwork interface can include a wired interface, a wireless interface, aBluetooth interface, optical interface, and the like, includingappropriate combinations thereof. Furthermore, the computing system 700can additionally include a user interface 712, a display device 714, aswell as various other components that would be beneficial for such asystem.

The processor 702 can be a single or multiple processors, and the memory704 can be a single or multiple memories. The local communicationinterface 706 can be used as a pathway to facilitate communicationbetween any of a single processor, multiple processors, a single memory,multiple memories, the various interfaces, and the like, in any usefulcombination.

FIG. 8 illustrates an example 800 of a user device 805 operable forsecured user access. In one example, the user device 805 can include oneor more processor(s) 820, a plurality of sensor(s) 810, an input/output(I/O) interface 830, and a networking interface 840. The one or moreprocessor(s) 820 and the plurality of sensor(s) 810 can communicate witheach other using a local network. In one example, the local network canbe a wireless local area network (WLAN). The processor(s) 820 mayinclude one or more processors and memory configured to process sensordata 812 received from the plurality of sensors. The sensors 810 caninclude, but are not limited to, sound detectors, video cameras,temperature sensors, photo sensors, motion detectors, vibration sensors,etc. The sensor data 812 can include, but is not limited to, audio/videodata, temperature data, photo sensor data, motion data, vibration data,etc.

As in this written description, the terms “local device”, “remotedevice”, and “user device” can be used interchangeably to indicate adevice operable for secured user access.

In one example, the sensors 810 can capture the sensor data 812 in aproximity of the user device. The sensors 810 can send the sensor data812 to the processor(s) 820. The processor(s) 820 can receive the sensordata 812 from the sensors 810. For example, the sensors 810 and theprocessor(s) 820 can include a transceiver that enables thesending/receiving of the sensor data 812.

In one example, the processor(s) 820 can include an intruder indicatormodule 822 configured to identify an intruder indicator, wherein theintruder indicator indicates that an intruder has been detected in aproximity of the user device. In one example, the intruder indicatormodule 822 can be configured to identify when an intruder is in theproximity of the user device based on the sensor data 812 received fromthe sensors 810. The processor(s) 820 can continually receive andprocess the sensor data 812 in order to detect intrusion. For example,the intruder indicator module 822 can monitor noise levels in theproximity of the user device based on the sensor data 812 (e.g., audiodata), and the intruder indicator module 822 can detect intrusion whenthe noise levels in the proximity of the user device reach a certainthreshold. In another example, the intruder indicator module 822 canmonitor noise levels in the proximity of the user device based on thesensor data 812, and the intruder indicator module 822 can detect anintrusion when a spike in noise level occurs in the proximity of theuser device.

In one example, the intruder indicator module 822 can visually monitoruser actions that occur in the proximity of the user device based on thesensor data 812 (e.g., video data), and the intruder indicator module822 can detect an intrusion when certain user actions occur in theproximity of the user device. In another example, the intruder indicatormodule 822 can monitor a brightness level in the proximity of the userdevice based on the sensor data 812 (e.g., photo sensor data), and theintruder indicator module 822 can detect an intrusion when thebrightness level reaches a defined threshold. In another example, theintruder indicator module 822 can monitor an odor level in the proximityof the user device based on the sensor data 812 (e.g., odor data), andthe intruder indicator module 822 can detect an intrusion when the odorlevel reaches a defined threshold. In yet another example, the intruderindicator module 822 can monitor a temperature level in the proximity ofthe user device based on the sensor data 812 (e.g., temperature data),and the intruder indicator module 822 can detect an intrusion when thetemperature level reaches a defined threshold. In another example, theintruder indicator module 822 can monitor a vibration level in theproximity of the user device based on the sensor data 812 (e.g.,vibration data), and the intruder indicator module 822 can detect anintrusion when the vibration level reaches a defined threshold (e.g.,due to a person's vibrating chair or physical activity such as jumping).

In one configuration, the processor(s) 820 may include an intruderindicator module 822 that determines, using a model, whether theintrusion events that occurs in the proximity of the user device exceeda threshold. For example, certain intrusion events that occur can beclassified as not exceeding a threshold when the intrusion event istransitory, unavoidable, expected for a certain user given the user'sunique circumstances, etc. For example, certain noises such as coughs,sneezes, sudden noises when an item is dropped, etc. can generally beconsidered as brief and unavoidable, and therefore, the intruderindicator module 822 can determine, using the model, that theseintrusion events are below the threshold. Alternatively, certainintrusion events that occur in the proximity of the user device can beclassified as exceeding the threshold when the intrusion event isprolonged, avoidable, and generally intrusive.

In one example, the model used by the intruder indicator module 822 toclassify the intrusion event can include, but is not limited to, amachine learning model, an artificial intelligence (AI) model, a neuralnetwork, a support vector machine, a Bayesian network, a geneticalgorithm, etc. The model can use predictive analytics, supervisedlearning, semi-supervised learning, unsupervised learning, reinforcementlearning, etc.

In one configuration, the model can be generated and trained usingtraining data. The training data can include data on intrusion eventsthat exceed a threshold and data on intrusion events that are below thethreshold. The model can be trained to distinguish between intrusionevents that are above the threshold versus intrusion events that arebelow the threshold. In addition, the model can continue to receiveadditional training data over time, in order to recognize new types ofbelow/above threshold intrusion events that can potentially occur in theproximity of the user device. Therefore, the model can continuallymature and improve over time, and enable the intruder indicator module822 to accurately classify intrusion events as being below or above thethreshold.

In one example, the processor(s) 820 may receive the sensor data 812from the sensors 810, and the processor(s) 820 can delete the sensordata 812 after a defined period of time. Thus, the sensor data 812 canbe stored on the processor(s) 820 for a limited duration of time. In oneexample, the processor(s) 820 can receive the sensor data 812 andprocess the sensor data 812 to determine whether an intrusion event hasoccurred. When the sensor data 812 does not indicate an occurrence of anintrusion, that sensor data 812 can be deleted from the processor(s)820.

In one example, the processor(s) 820 can include a privacy filteractivation module 824 configured to activate one or more privacy filtersat the user device. In one example, the privacy filter activation module822 can be configured to activate one or more privacy filters at theuser device based on the sensor data 812 received from the sensors 810.The processor(s) 820 can continually receive and process the sensor data812 in order to detect intrusion. The one or more privacy filters caninclude one or more of deactivating a microphone, deactivating aspeaker, deactivating a camera, deactivating a display, deactivating adisplay window, or deactivating another sensor, wherein the sensor caninclude one or more of temperature sensors, photo sensors, motiondetectors, vibration sensors, proximity sensors, and the like.

In one example, the processor(s) 820 can include an encoding module 826configured to encode data based on the one or more privacy filters. Inone example, the encoding module 826 can be configured to encode databased on the one or more privacy filters at the user device 805 based onthe sensor data 812 received from the sensors 810. The processor(s) 820can continually receive and process the sensor data 812 in order todetect intrusion. The encoded data can include one or more of, but isnot limited to, audio data, video data, temperature data, photo sensordata, motion data, vibration data, proximity data, and the like.

The user device 805 can also include an I/O (input/output) interface 830for controlling the I/O functions of the system, as well as for I/Oconnectivity to devices outside of the user device 800. A networkinterface 840 can also be included for network connectivity. The networkinterface 840 can control network communications both within the systemand outside of the system. The network interface can include a wiredinterface, a wireless interface, a Bluetooth interface, opticalinterface, and the like, including appropriate combinations thereof.

The user device 805 can also additionally include one or moremicrophones, one or more speakers, one or more cameras, one or moredisplays, or one or more additional sensors that would be beneficial forsuch a device.

In one example, as illustrated in FIG. 9, a local device 910 can beconfigured to communicate with a remote device 920. Person B can belocated in a proximity of the local device. An Intruder can also belocated in the proximity of the local device. Person A can be located ina proximity of a remote device. In one example, the local device 910 canbe configured to identify an intruder indicator, wherein the intruderindicator indicates that an intruder has been detected in a proximity ofthe local device 910; activate one or more privacy filters at the localdevice 910; and encode data based on the one or more privacy filters.The encoded data can be communicated from the local device 910 to theremote device 920.

In one example, the remote device 920 can be configured to identify anintruder indicator, wherein the intruder indicator indicates that anintruder has been detected in a proximity of the local device 910;activate one or more privacy filters at the remote device 920; andencode data at the remote device based on the one or more privacyfilters. The encoded data can be communicated from the remote device 920to the local device 910.

Various techniques, or certain aspects or portions thereof, can take theform of program code (i.e., instructions) embodied in tangible media,such as floppy diskettes, CD-ROMs, hard drives, non-transitory computerreadable storage medium, or any other machine-readable storage mediumwherein, when the program code is loaded into and executed by a machine,such as a computer, the machine becomes an apparatus for practicing thevarious techniques. Circuitry can include hardware, firmware, programcode, executable code, computer instructions, and/or software. Anon-transitory computer readable storage medium can be a computerreadable storage medium that does not include signal. In the case ofprogram code execution on programmable computers, the computing devicecan include a processor, a storage medium readable by the processor(including volatile and non-volatile memory and/or storage elements), atleast one input device, and at least one output device. The volatile andnon-volatile memory and/or storage elements can be a RAM, EPROM, flashdrive, optical drive, magnetic hard drive, solid state drive, or othermedium for storing electronic data. The node and wireless device canalso include a transceiver module, a counter module, a processingmodule, and/or a clock module or timer module. One or more programs thatcan implement or utilize the various techniques described herein can usean application programming interface (API), reusable controls, and thelike. Such programs can be implemented in a high level procedural orobject oriented programming language to communicate with a computersystem. However, the program(s) can be implemented in assembly ormachine language, if desired. In any case, the language can be acompiled or interpreted language, and combined with hardwareimplementations. Exemplary systems or devices can include withoutlimitation, laptop computers, tablet computers, desktop computers, smartphones, computer terminals and servers, storage databases, and otherelectronics which utilize circuitry and programmable memory, such ashousehold appliances, smart televisions, digital video disc (DVD)players, heating, ventilating, and air conditioning (HVAC) controllers,light switches, and the like.

EXAMPLES

The following examples pertain to specific technology embodiments andpoint out specific features, elements, or steps that can be used orotherwise combined in achieving such embodiments.

In one example, there is an apparatus of a local device operable forsecured user access. The apparatus can comprise one or more processors.The one or more processors can be configured to identify an intruderindicator, wherein the intruder indicator indicates that an intruder hasbeen detected in a physical proximity of either the local device or aremote device in communication with the local device. The one or moreprocessors can be configured to activate one or more privacy filters atthe local device. The one or more processors can be configured to encodedata based on the one or more privacy filters.

In one example of the one or more processors, the one or more processorscan be configured to: identify a number of authorized users at theproximity of either the local device or the remote device; identify anumber of users at the proximity of either the local device or theremote device; and activate the intruder indicator when the number ofusers at the proximity of either the local device or the remote deviceis greater than the number of authorized users at the proximity ofeither the local device or the remote device.

In one example of the one or more processors, the one or more processorscan be configured to: identify a number of authorized users at theproximity of either the local device or the remote device; identify anumber of users at the proximity of either the local device or theremote device; and deactivate the intruder indicator when the number ofusers at the proximity of either the local device or the remote deviceis less than or equal to the number of authorized users at the proximityof either the local device or the remote device.

In one example of the one or more processors, the one or more processorscan be configured to: modify a list of authorized users by adding a userto the list of authorized users or deleting a user from the list ofauthorized users.

In one example of the one or more processors, the one or more processorscan be configured to: activate the intruder indicator when a user in theproximity of either the local device or the remote device is recognizedwho is not an authorized user.

In one example of the one or more processors, the one or more processorscan be configured to: deactivate the intruder indicator when each userrecognized in the proximity of either the local device or the remotedevice is recognized as an authorized user.

In one example of the one or more processors, the one or more processorscan be configured to: identify a status of a timer; and decrement atimer value of the timer when the status of the timer is not expired; orstore an initial state of the timer when the timer value is at a maximumvalue.

In one example of the one or more processors, the one or more processorscan be configured to: identify a threshold to activate the intruderindicator; and activate or deactivate the intruder indicator based onthe threshold.

In one example of the one or more processors, the one or more processorscan be configured to: activate or deactivate the intruder indicatorbased on one or more of audio data, video data, or proximity data.

In one example of the one or more processors, wherein the one or moreprivacy filters can include deactivating a microphone, deactivating aspeaker, deactivating a camera, deactivating a display, or deactivatingan application window.

In one example of the one or more privacy filters, wherein deactivatingthe microphone can include one or more of: muting an audio stream of themicrophone; reducing a volume of an audio stream of the microphone; ordistorting an audio stream of the microphone.

In one example of the one or more privacy filters, wherein deactivatingthe speaker can include one or more of: muting an audio output of thespeaker; reducing a volume of an audio output of the speaker; ordistorting an audio output of the speaker.

In one example of the one or more privacy filters, wherein deactivatingthe camera can include one or more of: switching off the camera;reducing a brightness of a video stream from the camera; or distorting avideo stream from the camera.

In one example of the one or more privacy filters, wherein deactivatingthe display includes one or more of: switching off the display; reducinga brightness of the display; or distorting a video output of thedisplay.

In one example of the one or more processors, the one or more processorscan be configured to: identify a level of intrusion in the proximity ofeither the local device or the remote device; and activate the one ormore privacy filters at the local device based on the level ofintrusion.

In one example of the one or more processors, the one or more processorscan be configured to: identify a location of the local device; andactivate the one or more privacy filters at the local device based onthe location of the local device.

In one example of the one or more processors, the one or more processorscan be configured to: identify privacy settings of the local device; andactivate the one or more privacy filters at the local device based onthe privacy settings of the local device.

In one example of the one or more processors, the one or more processorscan be configured to: encode data based on the one or more privacyfilters for transmission from the local device to an additional remotedevice.

In one example of the one or more processors, the one or more processorscan be configured to: identify a level of ambient audio; identify alevel of background video; and activate or deactivate the one or moreprivacy filters at the local device based on the level of ambient audioor the level of background video.

In one example of the one or more processors, the one or more processorscan be configured to: identify a number of locations of sources of useraudio; identify a number of user voices; and activate or deactivate theone or more privacy filters at the local device based on the number oflocations of sources of user audio or the number of user voices.

In one example of the one or more processors, the one or more processorscan be configured to: adjust a physical position of a camera or adjustan angle of a camera to detect intrusion at the local device.

In one example of the one or more processors, the one or more processorscan be configured to: receive video data, audio data, or proximity datafrom other devices to detect intrusion at the local device.

In one example of the one or more processors, the one or more processorscan be configured to: authenticate a user based on an audio sample, avideo sample, or a proximity sample.

In one example of the one or more processors, the one or more processorscan be configured to: identify an authorized user based on one or moreof facial recognition, body recognition, gait recognition, voicerecognition, or proximity recognition; or identify an intruder based onone or more of facial recognition, body recognition, gait recognition,voice recognition, or proximity recognition.

In one example of the one or more processors, the one or more processorscan be configured to: communicate the encoded data for transmission fromthe local device to the remote device.

In one example of the one or more processors, the one or more processorscan be configured to: activate one or more privacy filters at the remotedevice.

In one example of the one or more processors, the one or more processorscan be configured to: send an intruder indicator, wherein the intruderindicator indicates that an intruder has been detected in a proximity ofthe local device.

In one example, there is a device operable for secured user access. Thedevice can comprise one or more processors. The one or more processorscan be configured to: identify an intruder indicator, wherein theintruder indicator indicates that a physical intruder has been detected;activate one or more privacy filters at the device; and encode databased on the one or more privacy filters. The device can comprise one ormore of: a microphone configured to: communicate an audio stream; aspeaker configured to: amplify an audio stream; a camera configured to:communicate a video stream; or a display configured to: display a videostream.

In one example of the one or more processors, the one or more processorscan be configured to: deactivate the microphone by one or more of:muting an audio stream of the microphone; reducing a volume of an audiostream of the microphone; or distorting an audio stream of themicrophone.

In one example of the one or more processors, the one or more processorscan be configured to: deactivate the speaker by one or more of: mutingan audio output of the speaker; reducing a volume of an audio output ofthe speaker; or distorting an audio output of the speaker.

In one example of the one or more processors, the one or more processorscan be configured to: deactivate the camera by one or more of: switchingoff the camera; reducing a brightness of a video stream from the camera;or distorting a video stream from the camera.

In one example of the one or more processors, the one or more processorscan be configured to: deactivate the display by one or more of:switching off the display; reducing a brightness of the display; ordistorting a video output of the display.

In one example of the device, wherein the device can be a local device.

In one example of the local device, the one or more processors can beconfigured to: communicate the encoded data for transmission from thelocal device to a remote device.

In one example of the remote device, the one or more processors can beconfigured to: activate one or more privacy filters at the remotedevice.

In one example of the device, wherein the intruder indicator canindicate that a physical intruder has been detected in a proximity ofthe device.

In one example of the device, wherein the device can be a remote device.

In one example of the remote device, the one or more processors can beconfigured to: receive the intruder indicator from a local device,wherein the intruder indicator indicates that an intruder has beendetected in a proximity of the local device.

In one example of the remote device, the one or more processors can beconfigured to: decode data communicated from a local device.

In one example, there is provided a system operable for secured useraccess. The system can comprise a local device comprising one or moreprocessors. The one or more processors can be configured to: identify anintruder indicator, wherein the intruder indicator indicates that anintruder has been detected in a proximity of either the local device ora remote device in communication with the local device; activate one ormore privacy filters at the local device; encode data based on the oneor more privacy filters for transmission from the local device to theremote device; and communicate, for transmission from the local deviceto the remote device, the encoded data. The remote device can compriseone or more processors configured to receive the encoded data from thelocal device.

In one example of the system, the local device can comprise one or moreof a microphone, a speaker, a camera, or a display.

In one example of the system, the remote device can comprise one or moreof a microphone, a speaker, a camera, or a display.

In one example of the system, the remote device can be a cloud device.

In one example, there is provided a method for facilitating secured useraccess. The method can comprise: identifying an intruder indicator,wherein the intruder indicator indicates that an intruder has beendetected in a physical proximity of either the local device or a remotedevice in communication with the local device; activating one or moreprivacy filters at the local device; and encoding data based on the oneor more privacy filters.

In one example of the method for facilitating secured user access, themethod can comprise: identifying a number of authorized users at theproximity of either the local device or the remote device; identifying anumber of users at the proximity of either the local device or theremote device; and activating the intruder indicator when the number ofusers at the proximity of either the local device or the remote deviceis greater than the number of authorized users at the proximity ofeither the local device or the remote device.

In one example of the method for facilitating secured user access, themethod can comprise: identifying a number of authorized users at theproximity of either the local device or the remote device; identifying anumber of users at the proximity of either the local device or theremote device; and deactivating the intruder indicator when the numberof users at the proximity of either the local device or the remotedevice is less than or equal to the number of authorized users at theproximity of either the local device or the remote device.

In one example of the method for facilitating secured user access, themethod can comprise: modifying a list of authorized users by adding auser to the list of authorized users or deleting a user from the list ofauthorized users.

In one example of the method for facilitating secured user access, themethod can comprise: activating the intruder indicator when a user inthe proximity of either the local device of the remote device isrecognized who is not an authorized user.

In one example of the method for facilitating secured user access, themethod can comprise: deactivating the intruder indicator when each userrecognized in the proximity of either the local device or the remotedevice is recognized as an authorized user.

In one example of the method for facilitating secured user access, themethod can comprise: identifying a status of a timer; and decrementing atimer value of the timer when the status of the timer is not expired; orstoring an initial state of the timer when the timer value is at amaximum value.

In one example of the method for facilitating secured user access, themethod can comprise: identifying a threshold to activate the intruderindicator; and activating or deactivate the intruder indicator based onthe threshold.

In one example of the method for facilitating secured user access, themethod can comprise: activating or deactivating the intruder indicatorbased on one or more of audio data, video data, or proximity data.

In one example of the method for facilitating secured user access, themethod can comprise: communicating the encoded data for transmissionfrom the local device to a remote device.

In one example of the method for facilitating secured user access, themethod can comprise: receiving the encoded data at a remote device fromthe local device.

In one example of the method for facilitating secured user access,wherein the one or more privacy filters can include deactivating amicrophone, deactivating a speaker, deactivating a camera, deactivatinga display, or deactivating an application window.

In one example of the method for facilitating secured user access,wherein deactivating the microphone can include one or more of: mutingan audio stream of the microphone; reducing a volume of an audio streamof the microphone; or distorting an audio stream of the microphone.

In one example of the method for facilitating secured user access,wherein deactivating the speaker can include one or more of: muting anaudio output of the speaker; reducing a volume of an audio output of thespeaker; or distorting an audio output of the speaker.

In one example of the method for facilitating secured user access,wherein deactivating the camera can include one or more of: switchingoff the camera; reducing a brightness of a video stream from the camera;or distorting a video stream from the camera.

In one example of the method for facilitating secured user access,wherein deactivating the display can include one or more of: switchingoff the display; reducing a brightness of the display; or distorting avideo output of the display.

In one example, there is provided at least one machine readable storagemedium having instructions embodied thereon for secured user access. Theinstructions when executed by one or more processors at a local deviceperform the following: identifying an intruder indicator, wherein theintruder indicator indicates that a physical intruder has been detectedin a proximity of either the local device or the remote device;activating one or more privacy filters at the local device; and encodingdata based on the one or more privacy filters.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: identifying a number of authorized usersat the proximity of either the local device or the remote device;identifying a number of users at the proximity of either the localdevice or the remote device; and activating the intruder indicator whenthe number of users at the proximity of either the local device or theremote device is greater than the number of authorized users at theproximity of either the local device or the remote device.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: identifying a number of authorized usersat the proximity of either the local device or the remote device;identifying a number of users at the proximity of either the localdevice or the remote device; and deactivating the intruder indicatorwhen the number of users at the proximity of either the local device orthe remote device is less than or equal to the number of authorizedusers at the proximity of either the local device or the remote device.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: modifying a list of authorized users byadding a user to the list of authorized users or deleting a user fromthe list of authorized users.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: activating the intruder indicator when auser in the proximity of either the local device or the remote device isrecognized who is not an authorized user.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: deactivating the intruder indicator wheneach user recognized in the proximity of either the local device or theremote device is recognized as an authorized user.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: identifying a status of a timer; anddecrementing a timer value of the timer when the status of the timer isnot expired; or storing an initial state of the timer when the timervalue is at a maximum value.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: identifying a threshold to activate theintruder indicator; and activating or deactivate the intruder indicatorbased on the threshold.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: activating or deactivating the intruderindicator based on one or more of audio data, video data, or proximitydata.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: identifying a level of intrusion in theproximity of either the local device or the remote device; andactivating the one or more privacy filters at the local device based onthe level of intrusion.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: identifying a location of the localdevice; and activating the one or more privacy filters at the localdevice based on the location of the local device.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: identifying privacy settings of thelocal device; and activating the one or more privacy filters at thelocal device based on the privacy settings of the local device.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: encoding data based on the one or moreprivacy filters for transmission from the local device to an additionalremote device.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: identifying a level of ambient audio;identifying a level of background video; and activating or deactivatethe one or more privacy filters at the local device based on the levelof ambient audio or the level of background video.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: identifying a number of locations ofsources of user audio; identifying a number of user voices; andactivating or deactivate the one or more privacy filters at the localdevice based on the number of locations of sources of user audio or thenumber of user voices.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: adjusting a physical position of acamera or adjust an angle of a camera to detect intrusion at the localdevice.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: receiving video data, audio data, orproximity data from other devices to detect intrusion at the localdevice.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: authenticating a user based on an audiosample, a video sample, or a proximity sample.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: identifying an authorized user based onone or more of facial recognition, body recognition, gait recognition,voice recognition, or proximity recognition; or identifying an intruderbased on one or more of facial recognition, body recognition, gaitrecognition, voice recognition, or proximity recognition.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: communicating the encoded data fortransmission from the local device to a remote device.

In one example of the at least one machine readable storage medium, themachine readable storage medium further comprises instructions that whenexecuted perform the following: activating one or more privacy filtersat the remote device.

While the forgoing examples are illustrative of the principles oftechnology embodiments in one or more particular applications, it willbe apparent to those of ordinary skill in the art that numerousmodifications in form, usage and details of implementation can be madewithout the exercise of inventive faculty, and without departing fromthe principles and concepts of the disclosure.

What is claimed is:
 1. An apparatus of a local user device operable forsecured user access, the apparatus comprising: a network interface totransmit information from a first videoconferencing application at thelocal user device to display via a second videoconferencing applicationat a remote user device; and one or more processors to: identify anintruder indicator, the intruder indicator to indicate that an intruderhas been detected in a physical proximity of the remote user device incommunication with the local user device; initiate, from the local userdevice, activation of one or more first privacy filters at the remoteuser device to cease displaying the information via the secondvideoconferencing application; and encode the information based on oneor more second privacy filters.
 2. The apparatus of claim 1, wherein theremote user device is a first remote user device, the network interfaceto establish a multi-party video conference between the local userdevice, the first remote user device, and a second remote user device.3. The apparatus of claim 1, wherein the one or more processors arefurther to: identify a number of authorized users at the physicalproximity of the remote user device; identify a number of users at thephysical proximity of the remote user device; and activate the intruderindicator when the number of users at the physical proximity of theremote user device is greater than the number of authorized users at thephysical proximity of the remote user device.
 4. The apparatus of claim1, wherein the one or more processors are further to: identify a numberof authorized users at the physical proximity of the remote user device;identify a number of users at the physical proximity of the remote userdevice; and deactivate the intruder indicator when the number of usersat the physical proximity of the remote user device is less than orequal to the number of authorized users at the physical proximity of theremote user device.
 5. The apparatus of claim 1, wherein the one or moreprocessors are further to: modify a list of authorized users by adding auser to the list of authorized users or deleting an authorized user fromthe list of authorized users.
 6. The apparatus of claim 1, wherein theone or more processors are further to: activate the intruder indicatorwhen a user in the physical proximity of the remote user device isrecognized and is not an authorized user.
 7. The apparatus of claim 1,wherein the one or more processors are further to: deactivate theintruder indicator when each user recognized in the physical proximityof the remote user device is recognized as an authorized user.
 8. Theapparatus of claim 1, wherein the one or more processors are further to:identify a status of a timer; and decrement a timer value of the timerwhen the status of the timer is not expired; or store an initial stateof the timer when the timer value is at a maximum value.
 9. Theapparatus of claim 8, wherein, in response to expiration of the timer,the one or more processors is to detect the intruder in the physicalproximity of the remote user device.
 10. The apparatus of claim 1,wherein the one or more processors are further to: identify a thresholdto activate the intruder indicator; and activate or deactivate theintruder indicator based on the threshold.
 11. The apparatus of claim 1,wherein the one or more processors are further to: activate ordeactivate the intruder indicator based on one or more of audio data,video data, odor data, or proximity data.
 12. The apparatus of claim 1,wherein the one or more processors are further to initiate theactivation of the one or more first privacy filters by at least one ofdeactivating a microphone, deactivating a speaker, deactivating acamera, deactivating a display, deactivating an application window, or acombination thereof.
 13. The apparatus of claim 1, wherein the one ormore processors are further to: identify a level of intrusion in thephysical proximity of the remote user device; and activate the one ormore second privacy filters at the local user device based on the levelof intrusion.
 14. The apparatus of claim 1, wherein the one or moreprocessors are further to: identify a location of the local user device;and activate the one or more second privacy filters at the local userdevice based on the location of the local user device.
 15. The apparatusof claim 1, wherein the one or more processors are further to: identifyprivacy settings of the local user device; and activate the one or moresecond privacy filters at the local user device based on the privacysettings of the local user device.
 16. The apparatus of claim 1, whereinthe one or more processors are further to: identify a number oflocations of sources of user audio; identify a number of user voices;and activate or deactivate the one or more second privacy filters at thelocal user device based on the number of locations of sources of useraudio or the number of user voices.
 17. The apparatus of claim 1,wherein the one or more processors are further to: adjust a physicalposition of a camera or adjust an angle of the camera to detectintrusion at the local user device.
 18. The apparatus of claim 1,wherein the one or more processors are further to: receive video data,audio data, or proximity data from other devices to detect intrusion atthe local user device.
 19. The apparatus of claim 1, wherein the one ormore processors are further to: authenticate a user based on an audiosample, a video sample, or a proximity sample.
 20. The apparatus ofclaim 1, wherein the one or more processors are further to: identify anauthorized user based on one or more of facial recognition, bodyrecognition, gait recognition, voice recognition, or proximityrecognition; or identify the intruder based on one or more of facialrecognition, body recognition, gait recognition, voice recognition, orproximity recognition.
 21. The apparatus of claim 1, wherein the one ormore processors are further to: communicate the encoded information fortransmission from the local user device to the remote user device. 22.The apparatus of claim 1, wherein the one or more processors are furtherto: activate the one or more second privacy filters at the local userdevice.
 23. The apparatus of claim 1, wherein the one or more processorsare further to: send a second intruder indicator, the second intruderindicator to indicate that a second intruder has been detected inproximity of the local user device.
 24. A first user device operable forsecured user access, the first user device comprising: one or moreprocessors to: transmit information from a first videoconferencingapplication at the first user device to display via a secondvideoconferencing application at a second user device; identify anintruder indicator, the intruder indicator to indicate that a physicalintruder has been detected; cause activation of one or more firstprivacy filters at the second user device to cease displaying theinformation via the second videoconferencing application; and encodeinformation based on one or more second privacy filters; and one or moreof: a microphone structured to: communicate a first audio stream; aspeaker structured to: amplify a second audio stream; a camerastructured to: communicate a first video stream; or a display structuredto: display a second video stream.
 25. The first user device of claim24, wherein the one or more processors are further to: deactivate theone or more of the microphone; the speaker; the camera; or display. 26.The first user device of claim 24, wherein the first user device is alocal user device, and the second user device is a remote user device.27. The first user device of claim 26, wherein the one or moreprocessors are further to: communicate the encoded information fortransmission from the local user device to the remote user device. 28.The first user device of claim 27, wherein the one or more processorsare further to: activate the one or more second privacy filters at thelocal user device based on the physical intruder.
 29. The first userdevice of claim 27, wherein the intruder indicator is to indicate thatthe physical intruder has been detected in a proximity of the first userdevice.
 30. The first user device of claim 24, wherein the second userdevice is a remote user device.
 31. The first user device of claim 30,wherein the one or more processors are further to: receive the intruderindicator from the second user device, the intruder indicator toindicate that the physical intruder has been detected in a proximity ofthe second user device.
 32. A non-transitory computer readable storagemedium comprising instructions that, when executed, causes one or moreprocessors to at least: cause transmission of information from a firstvideoconferencing application at a first device to a second device;identify an intruder indicator, the intruder indicator to indicate thata physical intruder has been detected; cause activation of one or morefirst privacy filters at the second device to cease display of theinformation at the second device; and encode information based on one ormore second privacy filters; and one or more of: cause transmission of afirst audio stream; cause amplification of a second audio stream; causetransmission of a first video stream; or cause display of a second videostream.
 33. The non-transitory computer readable storage medium of claim32, wherein the instructions are further to cause the one or moreprocessors to deactivate one or more of a microphone, a speaker, acamera, or a display.
 34. The non-transitory computer readable storagemedium of claim 32, wherein the first device is a local user device, andthe second device is a remote user device.
 35. The non-transitorycomputer readable storage medium of claim 34, wherein the instructionsare further to cause the one or more processors to cause transmission ofthe encoded information from the local user device to the remote userdevice.
 36. The non-transitory computer readable storage medium of claim34, wherein the instructions are further to cause the one or moreprocessors to activate the one or more second privacy filters at thelocal user device based on a characteristic of the physical intruder.37. The non-transitory computer readable storage medium of claim 32,wherein the intruder indicator is to indicate that the physical intruderhas been detected in a proximity of the first device.
 38. Thenon-transitory computer readable storage medium of claim 32, wherein theinstructions are further to cause the one or more processors to accessthe intruder indicator after the intruder indicator is obtained from thesecond device, the intruder indicator to indicate that the physicalintruder has been detected in a proximity of the second device.