Systems and methods for enabling dialog amongst different participant groups with variable and association-based privacy

ABSTRACT

A network-connected communication system is provided, via which individuals may engage in dialog with one or more dialog members. Differing views of the dialog may be presented to different individuals, based on the viewer&#39;s association with the dialog and/or variable privacy settings associated with the dialog. Dialogs may be initiated as private conversations, with members electing to make available views of the conversation to individuals other than the dialog members. Tools, such as redaction tools, may be provided for dialog participants to control availability of dialog content outside of dialog members. A dialog display user interface may be provided to dialog members, which includes a toggle permitting members to toggle between public and private dialog views, thereby highlighting differences in how a dialog is rendered to different audiences. Association-based and variable privacy may also be implemented in connection with online forums and restricted access communities. Such privacy-enabling systems may integrate to receive dialog content from another messaging system, and/or to disseminate privacy-conscious views of dialogs to external systems such as messaging platforms, social networks and search engines.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 15/681,293, filed on Aug. 18, 2017, which claims the benefit ofU.S. provisional patent application 62/508,989, filed May 19, 2017; andU.S. provisional patent application 62/468,464, filed Mar. 8, 2017; andU.S. provisional patent application 62/460,723, filed Feb. 17, 2017; andU.S. provisional patent application 62/419,878, filed Nov. 9, 2016; andU.S. provisional patent application 62/409,475, filed Oct. 18, 2016; andU.S. provisional patent application 62/376,894, filed Aug. 18, 2016. Thepresent application is also a continuation-in-part of abandoned U.S.nonprovisional patent application Ser. No. 15/095,638, filed Apr. 11,2016, which claims the benefit of provisional U.S. patent applicationno. 62/146,061, filed on Apr. 10, 2015; and which is also acontinuation-in-part of U.S. nonprovisional patent application Ser. No.14/848,172, filed Sep. 8, 2015 and issued as U.S. Pat. No. 9,473,447 B1on Oct. 18, 2016; which is a continuation of U.S. patent applicationSer. No. 14/526,488, filed Oct. 28, 2014 and issued as U.S. Pat. No.9,160,555 on Oct. 13, 2015; which is a continuation of U.S. patentapplication Ser. No. 14/525,169, filed Oct. 27, 2014 and issued as U.S.Pat. No. 9,122,931 on Aug. 18, 2015.

TECHNICAL FIELD

The present disclosure relates in general to data processing techniques,and in particular to systems and methods for network-based communicationamongst individuals, with variable and/or association-based privacy.

BACKGROUND

Electronic communication is a method for exchanging digital messages andinformation amongst multiple individuals. Electronic communication mayoperate across the Internet or other electronic communication networks.Examples of electronic communication include email, mobile and computerapplications (“apps”), Short Messaging Service (SMS) communication,Multimedia Messaging Service (MMS) communications and web-basedapplications facilitating conveyance of information using a web browser.

Electronic communications have become a primary method by which peoplecommunicate information. One form of electronic communication that hasbecome particularly popular is online question-and-answer services. Ingeneral, a question-and-answer service is a service that allows its endusers to engage in dialog by posting questions or other opening content,posting responses to such content, and/or viewing content includingresponses to questions that others have posted. In some systems, ongoingdialog can occur amongst multiple participants and users contributecontent and respond to content contributed by others. Thus, Q&A servicesprimarily act to store, organize and facilitate the distribution ofuser-generated content.

In many existing question-and-answer services, users ask questions to apredefined community of users registered with the service. Often,questions are organized within predefined topics in order to aggregateusers having a common interest in the subject matter. After a questionis submitted, the asker waits for a qualified member to see thequestion, and hopefully, respond with a relevant, informative andaccurate response.

Existing Q&A models typically rely on attracting audiences of primarilystrangers around specific topics, with the hope that human nature andshared interests will lead users to help one another. The self-selectingnature of these communities, and the fact that users typically do notknow each other outside of the community, can lead to a wide variety ofresponder backgrounds and qualification levels. Many responders may beunqualified from the subjective viewpoint of the asker, resulting inunwanted and low quality answers for both the asker and future readersof the dialog. Existing solutions to this challenge, such as pointsystems or cumbersome biographical information collection, raise thehurdle to participation and often discourage qualified contributors.

Some systems attempt to provide question-and-answer functionality withopen-ended subject matter and no inherent system of organization.However, in such systems a wide diversity of subject matters may inhibitthe formation of an active user community within any given topic, whichmay in turn yield significant delays between the time a question isasked and the time a meaningful answer is received.

Other prior question-and-answer systems implement subject matterspecialization in order to promote development of an active communityproviding timely and high quality answers. However, such systems mayrequire a large user base in order to ensure that a sufficient number ofusers with relevant knowledge and motivation to respond are regularlyviewing questions to provide answers in a timely manner. Attracting andmaintaining a sufficient user base that is ready, willing, and capableof engaging in timely, productive dialog, can be challenging and elusivefor any site operator.

Privacy issues may also be important in maximizing the effectiveness ofonline communications. It is human nature to trust certain people orgroups of people, and go to them for insights and discourse. Yet themost valuable responses might have come from people outside thesetrusted groups, including people we don't know. It is often privacyconcerns that stop us from going beyond our trusted groups for insightsand discourse.

Some systems allow users to participate anonymously. However, suchsystems may be subject to trolling, abusive content and low-qualitydiscourse. Other systems require publishing real-names from users toprovide accountability and avoid such problems. However, many users maybe hesitant to share information publicly under their own names, even ifthe information is of relatively high quality. To address these privacyconcerns, we avoid opening our conversations to others, foregoing accessto what might have been the most useful responses.

SUMMARY

The present disclosure describes systems and methods for electroniccommunications amongst individuals, providing mechanisms for variableand/or association-based privacy. The system can be implemented on oneor more network-connected servers communicating with a plurality of userdevices via one or more digital communication networks, such as theInternet and cellular networks. Dialog content can be presented via,e.g., web site, a user-installed application, or directly withinnotifications.

In accordance with one aspect, an individual's view of a dialog variesbased on their association with the dialog, in order to limit access toindividually-identifying information regarding dialog participants. Forexample, one or more network-connected servers implement acommunications platform providing multiple views of a dialog, of which asubset of individuals are members. The dialog includes one or morecontent contributions, authored by members of the dialog. A first viewis displayed to dialog members, such as via a web browser or mobileapplication in communication with the servers via a data network. Thefirst view includes content contributions from dialog members, renderedproximate indicia identifying each content contribution's author. Theidentifying indicia may include, for example, a content contributor'sreal name, the content contributor's picture, and/or information from acontent contributor's individually-configured profile. The second viewis displayed to one or more individuals that are not dialog members. Thesecond view includes dialog member content contributions, renderedwithout indicia identifying each content contribution's author. Invarious embodiments, the individuals to whom the second view ispresented may be (other than dialog members) all public Internet users,registered users of a particular network-connected computing platform(for which registration may or may not be publicly available), varioussubsets of registered users of a particular network-connected computingplatform, or members of a restricted access community.

Some embodiments may enable a dialog participant to take a dialog, orportion thereof, that was initially private, and make available morebroadly views of the dialog incorporating variable and/orassociation-based privacy. Such a system may initially facilitateprivate dialog amongst dialog members, such as by implementing a privateor group platform for messaging or chat. A request to make public atleast a portion of the private dialog may be received from a dialogmember, in response to which the above-described first and second viewsof the dialog can be made available. In some embodiments, only a dialogopening member may make available public views of a dialog. In someembodiments, any dialog member may make available public views of adialog. Publication consent may be solicited from other dialog membersprior to making available a second view. Some embodiments automaticallymake second views available to individuals other than dialog membersbased on predefined system rules. In some embodiments, second views maybe published to third party systems. Some embodiments may enable dialogmembers to redact content from the second view of the dialog, therebyproviding dialog participants with a mechanism to, e.g., avoiddisclosure outside the dialog membership of private orpersonally-identifiable information within the body of a contentcontribution.

Individuals may become members of a dialog, and therefore be providedwith a dialog view inclusive of content contributor identification, viavarious mechanisms. For example, an individual may become a dialogmember by an opening user explicitly identifying them as a dialogmember. An individual may become a dialog member via invitation fromanother dialog member. An individual may become a dialog member bysubmitting a subscription request for the dialog, which request mayrequire approval by another individual, such as the dialog openingmember or another dialog member. In some embodiments, variable privacymechanisms may be based on not only membership within a dialog network,but also social connections established and maintained betweenindividuals.

In some embodiments, dialog network members may be provided with adialog display user interface that includes a dialog display region anda view toggle indicium. A first portion of the view toggle indicium maybe selected to render a private view of a dialog within the dialogdisplay region. The private view renders the dialog as it is madeavailable to other dialog network members, e.g. inclusive of privateinformation such as indicia identifying dialog content contributors. Asecond portion of the view toggle indicium may be selected to render apublic view of a dialog within the dialog display region. The publicview renders the dialog as it is made available to individuals otherthan dialog network members, e.g. excluding private information such asindicia identifying dialog content contributors. The view toggleindicium can thereby be used to readily toggle between views, therebyhighlighting to a user differences in content presented to differingaudiences.

In accordance with some embodiments, variable and/or association-basedprivacy mechanisms may be implemented in the context of an onlinediscussion forum. Forum members may be provided with a view of dialogcontent that includes indicia identifying content contributors, whileindividuals who are not members of a forum may be provided with views offorum dialog content that excludes identification of contentcontributors. In some embodiments, individuals may become members ofsuch a forum by opting in, or joining the forum. In some embodiments,forum membership may be restricted, such as by invitation from a forumadministrator or another forum member.

In some communication platforms implementing association-based and/orvariable privacy mechanisms, a privacy-enabling system may integratewith external communication systems. The original source of a dialog maybe a communication platform that is separate and independent from theprivacy enabling system. Additionally or alternatively, a dialog viewgenerated by the privacy-enabling system may be displayed to otherindividuals via one or more other external communication platforms.

Variable privacy mechanisms may be provided to modify dialog contentrendering based on pertinent variable privacy criteria, such as thestatus of a viewing user as a dialog network member or dialog guest.Such variable privacy mechanisms may include automated or manualredaction, or pseudonymous substitutions for personally-identifiablecontent. Users may configure privacy words within user-associatedprofiles that are subject to variable privacy mechanisms, such as name,nick names, family members, employers, addresses, email addresses, orother privacy words that a user believes to be personally identifiable.Some privacy words may be replaced, in some views, by referencesdescriptive of the nature of the replaced content, such as “Friend n”,“Company n”, or “Email Address n”. Other privacy words may be replacedby standard redaction indicators. Dialog content may be displayed withvisual cues to alert users to the variable privacy treatment accorded tosuch content. Visual cues may include highlighting in a contrastingtone, and/or message boxes with explanations of how content is renderedto various viewers.

Some embodiments may be utilized to implement pre-scheduled, groupdialogs, such as Ask Me Anything (“AMA”) events. A web-based userinterface may be provided via which individuals can pre-register as AMAparticipants. Additionally or alternatively, an AMA host and/or otherparticipant may invite individuals as participants. A dialog may beinitiated for the event. Participants may be permitted to submitquestions in advance of a scheduled event, which questions may be queuedfor review by the AMA host or other administrator. During the event, afirst view of the dialog may be provided to the AMA host and registeredparticipants, in which the dialog contributions are presented with theircontributors' individually-identifiable information. A second view ofthe dialog may be provided to others, excludingindividually-identifiable information associated with the dialogparticipants, and optionally the AMA host.

Some embodiments may be utilized to seamlessly integrate content from avariable privacy system with a third party social media platform.Content contributions to the variable privacy platform may be posted toa social media platform as a URL. The URL may be scraped by the socialmedia platform, in response to which the variable privacy platformpresents an untrusted content item view. The scraped, untrusted view maybe delivered directly into social media platform user feeds. Socialmedia platform users may then select the URL within their feeds todirectly query the variable privacy platform for the content item, inresponse to which the variable privacy platform may authenticate theuser for eligibility to receive a trusted view of the content item. Inyet other embodiments, the variable privacy system may provide an APIthat permitting a social media platform to submit viewer-specificqueries for content items, such that a trusted or untrusted view can bedelivered directly to a viewer's social media feed based on the viewer'strust relationship with the content item being queried.

Various other objects, features, aspects, and advantages of the presentinvention and embodiments will become more apparent from the followingdetailed description of preferred embodiments, along with theaccompanying drawings in which like numerals represent like components.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 is a schematic block diagram of a question-and-answer system, inaccordance with a first embodiment.

FIG. 2 is a schematic block diagram of participants in a Q&A dialog.

FIG. 3 is a process for Q&A communications.

FIG. 3B is a process for controlling default push notifications ofdialog content.

FIG. 4 is a user interface for submission of a question.

FIG. 5 is a user interface for question submission confirmation.

FIG. 6 is a user interface for answering a question, in accordance withone embodiment.

FIG. 7 is a dialog network block diagram.

FIG. 8 is a block diagram illustrating dialog network reuse.

FIG. 9 is a process for Q&A communications, in accordance with anotherembodiment.

FIG. 10 is a process for determining visibility of content contributorinformation.

FIG. 11 is a process for determining default view of dialog content.

FIG. 12 is user interface for initiation of a dialog.

FIG. 13A is a user interface for viewing a dialog, responding and/oradding new members to the dialog.

FIG. 13B is a user interface for viewing a dialog and responding.

FIG. 14 is another user interface for initiation of a dialog.

FIG. 15 is a schematic block diagram of a hierarchical dialog network.

FIG. 16 is a further schematic block diagram of a hierarchical dialognetwork.

FIG. 17 is a process diagram for implementing variable privacy.

FIG. 18 is a user interface for messaging with variable privacy.

FIG. 19 is a further user interface for messaging with variable privacy.

FIG. 20 is a user interface for redacting content from dialog views madeavailable outside a dialog network.

FIG. 21 is a process diagram for implementing variable andassociation-based privacy in an online forum.

FIG. 22 is a schematic block diagram of viewer categories for use inapplying association-based and/or variable privacy mechanisms.

FIG. 23 is a schematic block diagram of a privacy enabling systemintegrated with external communication platforms.

FIG. 24A is a first user interface for initiating a second view of a SMSconversation.

FIG. 24B is a second user interface for initiating a second view of aSMS conversation.

FIG. 25 is a schematic block diagram of a communications network formirroring a dialog conducted via an external messaging platform.

FIG. 26 is a process for mirroring a dialog conducted via SMS.

FIG. 27 is first user interface for initiating a second view of an emailconversation.

FIG. 28 is a second user interface for initiating a second view of anemail conversation.

FIG. 29 is a process for reversing pseudonymous references to dialognetwork members in replies, when viewed by dialog network members.

FIG. 30 is a schematic block diagram of a user profile.

FIG. 31 is a process for applying descriptive redaction indicators.

FIG. 32 is a user interface displaying a dialog private view.

FIG. 33 is a user interface displaying a dialog public view.

FIG. 34 is a process for establishing social connections amongstcommunication system users.

FIG. 35 is a process for establishing social connections amongstcommunication system users.

FIG. 36 is a process for determining application of variable privacy toa dialog based on dialog network membership as well as socialconnections.

FIG. 37 is a process for implementing a pre-scheduled group dialog.

FIG. 38 is a user interface for registering dialog members for apre-schedule group dialog.

FIG. 39 is a user interface for configuring a profile with personalreferences for pseudonymous substitution.

FIG. 40 is the user interface of FIG. 39, with personal referencesconfigured.

FIG. 41 is a user interface for submitting dialog contributions, with auser query regarding pseudonymous substitution.

FIG. 42 is a user interface for dialog display with a user cue regardingvariable privacy mechanisms.

FIG. 43 is a user interface for dialog display with a user cue and queryregarding pseudonymous substitution.

FIG. 44 is a process for applying privacy attributes to determinevariable privacy views of a content contribution via combinations ofuser-specified attributes, automated redactions and/or manual review.

FIGS. 45A, 45B, 45C, and 45D are a sequence of mobile user interactionsfor specifying profile-associated privacy words.

FIG. 46 is a process for applying variable privacy functions based onsocial networking relationship.

FIG. 47A is a schematic block diagram of a privacy enablingcommunication platform adapted for content publication via a separatesocial media platform.

FIG. 47B is a process for distributing content contributions to a socialmedia platform with variable privacy.

FIG. 47C is another process for distributing content contributions to asocial media platform with variable privacy.

DETAILED DESCRIPTION

While this invention is susceptible to embodiment in many differentforms, there are shown in the drawings and will be described in detailherein several specific embodiments, with the understanding that thepresent disclosure is to be considered as an exemplification of theprinciples of the invention to enable any person skilled in the art tomake and use the invention, and is not intended to limit the inventionto the embodiments illustrated.

From the perspective of its end users, the value of aquestion-and-answer service depends significantly on multiple factors.Such factors may include: how convenient it is to post a question; theextent to which users receive accurate, insightful and meaningfulanswers to their questions; the timeliness in which users receiveanswers to their questions; the ease with which users can contributeanswers to the system; the extent to which spam and unhelpful contentcontributions can be minimized; the extent to which users may avoidreputation risk and undesired or inadvertent sacrificing of userprivacy; and the extent to which users can easily locate and viewprevious useful conversations other people have had on the topic oftheir questions.

FIG. 1 is a schematic block diagram of an embodiment of aquestion-and-answer communications system. Server 100 communicates,inter alia, via computer network 110, which may include the Internet,with user devices such as personal computer 120, tablet computer 122 andsmart phone 124. Server 100 implements application logic 102, andoperates to store information within, and retrieve information from,database 104. The term “database” is used herein broadly to refer to anindexed store of data, whether structured or not, including withoutlimitation relational databases and document databases. Web server 106hosts one or more Internet web sites enabling outside user interactionwith, amongst other things, application logic 102 and database 104.Messaging server 108 enables messaging, such as mobile network messagingservice (e.g. SMS or MMS), email, or application notifications, betweenserver 100 and user devices 120, 122 and/or 124.

While depicted in the schematic block diagram of FIG. 1 as a blockelement with limited sub elements, as known in the art of modern webapplications and network services, server 100 may be implemented in avariety of ways, including via distributed hardware and softwareresources and using any of multiple different software stacks. Server100 may include a variety of physical, functional and/or logicalcomponents such as one or more each of web servers, application servers,database servers, email servers, SMS or other messaging servers, and thelike. That said, the implementation of server 100 will include at somelevel one or more physical servers, at least one of the physical servershaving one or more microprocessors and digital memory for, inter alia,storing instructions which, when executed by the processor, cause theserver to perform methods and operations described herein. While aserver based architecture is depicted, it is understood other networkconfigurations could be used to implement methods described herein, suchas e.g. peer to peer network configurations.

The communication system of FIG. 1, executing application logic 102, canbe utilized to implement question-and-answer communication servicesamongst the individuals illustrated in FIG. 2. Such individuals includeasker 200, recipient group 210 which includes one or more recipients202, and one or more external participants 220. Asker 200 and recipientgroup 210 can be collectively referred to as dialog network members.Individuals other than asker 200 and recipient group 210, whetherpreviously registered with servers 100 or not, fall within the group ofexternal participants 220.

FIG. 3 is a flowchart illustrating an exemplary process by which theindividuals depicted in FIG. 2 utilize the communications system ofFIG. 1. In step S300, asker 200 communicates a question to server 100,and accordingly application logic 102. The question can be conveyed viaany of several communication methods, including, without limitation:entry into a web page rendered in web browser software on a device suchas PC 120, tablet 122 or smartphone 124 in communication with web server106; entry into a mobile app installed locally on tablet 122 orsmartphone 124 and communicating with server 100; or transmission viaSMS or MMS messaging from smart phone 124 to messaging server 108. It iscontemplated and understood that different embodiments may utilize oneor more such mechanisms for conveying questions, in varyingcombinations, depending upon the desired characteristics of the systemimplemented.

FIG. 4 illustrates an exemplary user interface for communication of aquestion to server 100. Web page 400 is rendered on a user device viacommunication between the user device and web server 106. Text entryfields 405 are provided for asker 200 to enter their contactinformation, in the event that asker 200 has not already joined theservice and created a user account using link 406, or logged in to apreexisting user account using link 407. Asker 200 can enter openingdialog content, such a question, using text entry field 425 for aquestion summary, and text entry field 430 for question detail.

In step S305, asker 200 specifies recipients 202 within recipient group210. For example, in some embodiments, asker 200 may be required todirectly enter some form of electronic contact address (such as emailaddress, mobile phone number for SMS/MMS messaging, username formessaging applications such as Skype or Apple Messages) for eachrecipient 202 within recipient group 210. In the user interface of FIG.4, fields 410 are provided for asker 200 to manually enter questionrecipient information. Link 415 is provided to allow asker 200 tospecify additional users by entering additional recipients manually,selecting from a user-specific address book (if logged in), or selectingfrom previously-configured dialog networks (explained further below).

Preferably, askers are prompted by the system to enter first and lastnames for each recipient, as reflected in FIG. 4 and fields 410. Theopener and the listed individuals will become members of a dialognetwork and as such, may have special privileges that non-members do nothave. One such special privilege that can then be provided is to alwayssee the first and last name of the asker and each recipient included inthe dialog network. In some embodiments, dialog network memberinformation is revealed to other dialog network members regardless ofwhether the recipient may have configured their first and last name inthe system. This is a courtesy to everyone in the dialog network, sothat they know whom they are conversing with since the dialog networkmembers may be able to see each other's posts and associated personallyidentifiable information. Non-members of the dialog network willpreferably never see the list of first and last names as entered by theasker. If a recipient chooses to respond while publicly sharing theirfirst and last name, then that personally identifiable information willbe available to users outside the dialog network, but otherwise it willnot.

Preferably, recipients 202 are (a) selected from amongst a group ofpeople that asker 200 already knows and trusts, (b) irrespective ofwhether the recipients have ever used the question-and-answer service,and (c) with no need for the recipients to be part of any online networkor any other predefined group. While these characteristics of questionrecipients are believed to be beneficial, it is understood that otherembodiments may be implemented without requiring all or any of theseattributes for targeted recipients.

A communications system in which users direct questions to a dialognetwork, with specific recipients that an asker knows and trusts, maysolve numerous problems that can arise in systems where questions areposted generally to system members. For example, a pre-existingrelationship between the asker and recipient may increase the likelihoodthat the recipient will (a) expend the time and effort to respond to thequestion, and (b) respond in a timely manner. Asking questions torecipients that an asker knows and trusts may also improve the qualityof answers, compared to other systems in which questions are availablegenerally for response by any member of the community. Theoretically,recipients may be selected based on the asker's understanding that therecipient has some level of expertise relating to the question, therebyavoiding situations in which content quality is diluted by unqualifiedor unknowledgeable individuals providing answers.

Implementing a Q&A system enabling participants to communicate directlywith people they already know may result in a paradigmatically differentquality dynamic for several reasons. For one, the asker is likely toselect participants qualified to provide input on the topic at hand;otherwise, the asker likely would not risk bothering or wasting the timeof a known colleague by directing a question to an unqualified oruninterested source. Additionally, the fact that people are engagingwith other people they already know may lead them to be increasinglythoughtful and honest in their responses to minimize their real lifereputation risk within their respected personal networks. Ideally, theasker and the selected group of recipients will collectively form aMinimum Viable Dialog Unit for each question asked, the Minimum ViableDialog Unit being a group of individuals collectively having sufficientknowledge and expertise to provide helpful answers to the question askedwithout turning to additional resources. Combining a Minimum ViableDialog Unit with trusted relationships and a supporting electroniccommunications platform, as described herein, can enable individuals toobtain fast and accurate responses to a wide variety of questions.

Implementing a system in which an asker can direct a question to arecipient without regard for whether the recipient has ever used thesystem may also provide benefits, as compared to systems in whichquestions are directed to an existing community user base. Thischaracteristic can operate to increase the pool of individuals providingvaluable information to the system, and reduce friction in obtainingresponses from qualified individuals (some of which may be hesitant toregister with or sign up for a new service). Similarly, enabling arecipient to receive a question without requiring their participation inany particular online network, online system or other predefined group,also operates to maximize the pool of prospective recipients that canprovide valuable information, and reduce friction in obtaining responsesfrom qualified individuals.

Once asker 200 specifies a question and recipients, asker 200 can selectAsk! button 445 to submit the question information to server 100. FIG. 5is an exemplary web browser user interface presented to asker 200 afterselection of Ask! button 445. Message 505 provides confirmation that thequestion has been submitted. Buttons 510 and 520 enable a user topublish notification of a question via other communication platforms,such as social networking platforms. Link 530 allows a user toimmediately enter another question.

Server 100 then manages ensuing publications, notifications, dialog andanswers. In step S310, server 100 operates to publish the question (e.g.by making it available via a web site), and push notifications of aquestion asked to recipient group 210. Notifications are pushed torecipient group 210 using the contact information provided by asker 200in step S305 and associated digital communication protocols. Forexample, if asker 200 provides an email address for a recipient 202, instep S310 server 100 may operate to transmit an email via network 110and email servers, which email can be received by the correspondingrecipient using email application software implemented on therecipient's computing device(s), such as a smartphone, PC or tablet.Email notifications will typically include a hyperlink URL that, ifselected by the recipient, launches a local web browser application andinitiates communications between the user's device and web server 106implemented within server 100.

Preferably, hyperlinks included within a notification are uniquelyassociated with the notification, such that corresponding resource callsto server 100 can be used to identify the recipient and the question towhich the recipient is responding, using information within thehyperlink. Hyperlinks can be uniquely associated with the notificationby embedding special identifiers unique to that notification within theURL, such as a user identifier or embedding an authorization ID thatprovides the user with special authority that some other users may nothave, such as performing functions normally reserved to registeredmembers of the dialog or the overall system. In other embodiments, a URLcan act as a dialog identifier, providing a unique association between anotification and a particular dialog. Additionally or alternatively, aunique identifier can be included within the body text of the email; inwhich case the user may be queried by servers 100 to authenticate bymanually entering the identifier for identification. While numerousembodiments can be implemented, preferably one or more identifiers(whether URL, UID, cookies, or other) provide correlation with one ormore of the user or user device, the dialog and/or the particularnotification.

If asker 200 provides a mobile telephone number for a recipient 202, instep S310 server 100 may operate to transmit a SMS or MMS message viamessaging server 108 and network 110 to that user's mobile phone,optionally also including a hyperlink to redirect further interactionsto a web application hosted by web server 106.

If a designated recipient has downloaded and installed a dedicated appon the recipient's mobile device, in step S310 notification may beprovided via an app notification protocol. In an exemplary embodiment,notifications to users of a mobile app will further receive some or allof the question contents directly within the notification.

Because question notifications in step S310 are directed to specificindividuals, by another individual typically known to the recipient, tothe recipient it may appear that they were directly contacted by someonethey know seeking their help. Furthermore, that contact will often takeplace using whatever contact method that asker might ordinarily use tocontact the recipient for any other reason. By providing a personalcommunication amongst known associates, it is expected that simplicityof communications and timeliness of responses will be improved comparedto other question-and-answer systems, while barriers to participationwill be reduced. Barriers to participation can also be reduced to theextent that recipients need not be members and need not become membersto learn a question has been asked, to answer such questions, or tostart their own dialogs (e.g. as a result of responding to pre-validatednotifications).

In step S315, any of recipients 202 can submit answers to the question.The term “answer” is used herein to refer to communications responsiveto an initial “question” communication. It is contemplated andunderstood that the term “answers” may include any type of communicationresponsive to a “question.” Further, it is contemplated and understoodthat the term “question” may include any number of types of openingcommunications intended to lead to an exchange of thoughts or opinionsbetween multiple users. For example, a “question” could include arequest for clarification or additional information by the asker, or aninvitation to comment on a document, news article or other topic. Inthis way, communication system embodiments described herein can beutilized broadly as dialog engines, facilitating the exchange ofcommunications, such as ideas or opinions on a particular issue, betweentwo or more people. The asker can also be referred to more broadly as anopening user, to the extent that the asker's communication opens thedialog with other users.

One or more means of communication can be utilized to submit an answerin step S315. FIG. 6 illustrates an exemplary user interface forsubmission of an answer by a recipient 202. Web page 600 is rendered ona user device via communication between the user device and web server106 implemented within server 100, in response to selection of a URLwithin a question notification in step S310. Fields 605 and 610 statethe question to which a response is being provided. Field 615 notifiesthe user of the number of replies to date, and provides a link to viewthose replies, which are also displayed lower on the page in region 645.Text entry field 620 enables a user to enter their response. Field 625provides the respondent with an indication of the individuals within thedialog network, who will be notified of responses to the question andwho will see a list of other people in the dialog network even if thedialog has been marked “private” by the asker (see more below). Whilethe embodiment of FIG. 6 shows both names and contact addresses withinfield 625, it is contemplated and understood that in other embodiments,it may be desirable to provide names without contact addresses in field625, in order to provide greater confidentiality to participants. Whenthe user has finished entering an answer into field 620, selection ofbutton 640 advances the process of FIG. 3 to step S320.

In step S320, answers provided in step S315 are published. Preferably,the publication in step S320 includes making answer content publiclyavailable via request to networked database 104. Making answer contentavailable via request to a networked database 104 can be achieved in anumber of ways, some or all of which may be provided simultaneously. Onesuch way is via an Internet web site implemented by web server 106,communicating with database 104. Another means of making answer contentavailable is via request from a locally-installed application executedon user device 120 and interacting with networked database 104,potentially through an API or application server within server 100.Another is via request from a mobile device application executed locallyon user devices 122 and 124 and interacting with networked database 104,again likely through an API or application server within server 100.

Preferably, the electronic communication service will be configurable toprovide selective push notification of new content. Asker 200,recipients 202 and external participants 220 can be configured viaapplication logic 102 and messaging servers, to receive directcommunication of new content contributed to dialogs with which they haveinteracted or have some relationship. For example, notifications can becontrolled based on, amongst other things, the prospective notificationrecipient's relationship to the dialog (e.g. role as asker, targetrecipient, external user). In some embodiments, a question asker may bydefault receive push notifications of all dialog contributions, whetherfrom target responders or external users. In other embodiments, aquestion asker may by default receive push notifications of dialogcontributions from target responders only, unless the asker expresslyopts into receiving notifications of content contributions from externalusers as well. Target responders may also by default receive pushnotifications based on their relationship to the dialog as a targetresponder, with the default scope of notifications includingcontributions from dialog network members or from all users, dependingon system design preferences.

Push notification of new content may also be triggered by a user'sinteraction with the system and/or a particular dialog. For example, insome embodiments, a target responder may by default receive pushnotification of all contributions from dialog network members. In otherembodiments, a target responder may by default receive push notificationof the asker's opening dialog content only, at which point interactionwith the communication system by the target responder can change thedefault push notification setting to opt into notifications of contentcontributions from dialog network members and/or external users.Interactions controlling default push notification behavior may includereceipt by servers 100 of a response from the notification recipient.Such responses include, without limitation: transmission by therecipient user device of an email “read receipt”; transmission by therecipient user device of a messaging delivery confirmation; selection bya recipient user device of a URL included within a notification ofdialog content; selection of user interface elements rendered on a userdevice web browser interacting with servers 100; and selection of userinterface elements rendered on a user device locally installedapplication interacting with servers 100.

Asker 200 may also receive a direct notification via a predeterminedform of communication (e.g. email, SMS, app notification), immediatelyupon receipt by server 100 of an answer from a member of the dialognetwork by server 100 in step S315. Optionally, asker 200 can configurenotifications to further include notifications of answers by externalusers 220.

Server 100 can also be configured to promptly transmit digitalcommunications containing notification of, and optionally content from,an answer communication of step S315, to one or more members ofrecipient group 210. FIG. 3B illustrates an exemplary process formanaging push notifications to recipient group members in an electroniccommunication system of the nature described herein. In order to avoidthe appearance of “spamming” or undesirably high messaging volume ontopics not of interest to the recipient, preferably, answers will onlybe automatically communicated to a member of recipient group 210 afterthat member has acknowledged receipt of the original question in someway and has not opted out of further communications regarding thequestion.

Specifically, in step S350, the asker identifies the target responder.In step S352, servers 100 transmit a push notification to targetresponders, notifying them of the opening dialog content. Steps S354,S356 and S358 operate in parallel, through which servers 100 awaitconfirmation of notification receipt by the target responder (S354, e.g.email read receipt or messaging platform delivery confirmation); targetresponder selection or activation of the notification (S356, such asselection of a URL within the notification); or self-identification bythe target responder (S358, such as the target responder logging into aweb site hosted by servers 100 and entering an identifier or contactaddress associated with that target responder). If the target responderself-identifies in step S358, the target responder is further queried instep S360 to confirm or self-specify their preferred contact address,which may be different than the contact address specified by the askerin step S350. In any event, upon interaction by the target responder insteps S354, S356 or S358, servers 100 default to providing the targetresponder with push notification of contributions by the dialog network(step S362).

In addition to facilitating prompt exchange of valuable informationamongst users, the communication system described herein also enables anew mechanism for organizing system content. Traditionally, manyquestion-and-answer systems organize their information by topicalcommunities that are predefined and categorized by an intended scope ofsubject matter. Participants typically self-select membership (e.g. byfinding such community, forum, blog, or thread while browsing orsearching, then choosing to subscribe to it) based on how close of a fitthey can find for their specific interests. Users can then configuretheir associations and notifications based on their interest level. Forexample, for topical communities of high interest level for a user, theuser may configure the system to receive immediate publication ofquestions and answers via email. For topical communities of lessinterest level, the user may receive “daily digest” emails summarizingthe day's communications. For topical communities of low interest level,the user may receive “weekly digest” emails summarizing communicationsthat took place during the course of a given week. For communities ofeven lower interest level, the user may receive no notification of newquestions and answers, and instead may elect to only view communicationswhen the user logs into a web site for the system or utilizes a mobileapp dedicated to the system. As a result, in such conventionalquestion-and-answer systems, a user asking a question or submitting aresponse in a question-and-answer dialogue may not be able to determineor control if and when any other particular user is notified of thecommunication, thereby potentially inhibiting effectiveness of suchsystems as a rapid or reliable platform for question-and-answercommunications.

Additionally, to the extent that users self-select into topicalsubcommunities, topic or forum membership varies over time, usersinherently come to and leave from communities as their interestsfluctuate. As a result, communities that provide rich interaction on atopic during one question-and-answer exchange, may provide a lessvaluable interaction during a closely-related exchange taking place at alater time if, e.g., high-value participants in the prior exchange haveceased their participation in the community or subcommunity since theprior exchange, or reduced the frequency of notifications related tothat community or subcommunity.

FIG. 7 is a schematic block diagram of an alternative means oforganizing communications in a question-and-answer system, in accordancewith another aspect of the system illustrated herein. Rather than (or inaddition to) providing predefined topical communities into which usersself-select, question-and-answer communications are organized viadynamically-created dialog networks. A dialog network is a group ofspecific individuals invited by a question submitter, who will benotified of a question, and preferably notified of any ensuing dialog inresponse to that question unless a member opts out of notification.Thus, dialog network 700 typically includes asker 200 and recipients 202within recipient group 210. External participants 220 may or may nothave access to some or all of the information within a dialog, and theymay elect to “follow” a dialog, receive notifications just as members ofdialog network 700 do, or even post a response, but they are preferablynot members of dialog network 700. Dialog network 700 thus becomes aself-contained mini topical discussion group around a particular dialog,until that dialog is complete.

By incorporating dialog networks, system participants can quickly reusecommunication groups that have proven valuable in prior communications.Since originators specify a unique audience for each question they ask,each question (or dialog) represents a group of people that the askermay wish to ask other questions to in the future, such as questions thatare on the same topic. Similarly, since the audience was selected basedon a belief by the originator that each recipient had an inherentinterest in the topic, the recipients may also wish to post to that samegroup again on a similar topic. Therefore, each dialog that a user hasstarted also preferably represents a network that can be reused at anytime in the future, without being subject to unknown fluctuations incommunity membership. Further, a dialog contact group can be customized,added to, combined or removed from for future dialogs to provide anasker with maximum convenience and flexibility.

For example, when an asker specifies recipients in step S305, server 100may act to store within database 104 a dialog network record thatincludes the electronic contact addresses associated with the recipientsto whom an outbound question message is directed. During subsequent usesof the system, when an asker specifies recipients in step S305, a userinterface may be provided such as that of FIG. 4. In addition to manualentry fields 410 and “more recipients” link 415 for specifying questionrecipients, the asker can select “re-use prior dialog network” link 420to be presented with a list of recent dialog networks from dialogs inwhich the user has previously participated. One or more such dialognetworks can be selected via user interface elements displayed on a usercomputing device. Preferably, asker 200 can elect to reuse a priordialog network as-is in step S305, or modify a prior dialog network byadding or removing recipients from that network. In addition to dialognetworks created by a user being available for reuse by that user,preferably recipients will also be able to reuse dialog networks inwhich they were identified as a recipient, such that those recipientscan select a dialog network for reuse in later system use cases in whicha former recipient takes on an asker role.

FIG. 8 illustrates dialog networks available for re-use by a user. Whensubmitting question 850, the asker manually specifies recipients Bob,Pam and Jim, thereby creating new dialog network 855 that includes thoserecipients. Later, when submitting question 860, the asker manuallyspecifies recipients Jan, Pat, Jim and Sam, thereby creating new dialognetwork 865. When submitting question 870, the subject matter of whichis similar to that of question 850, the asker can select to re-use priordialog network 855. When submitting question 880, the asker reusesdialog network 855, but decides to add Sam as a recipient, therebycreating new dialog network 885. In this way, users can quickly engagein new dialogs with existing groups of contacts.

Another way in which embodiments described herein can facilitateparticipation is by eliminating or minimizing user registrationrequirements, particularly amongst question recipients. Early Internetdiscussion forums often allowed any user to post without subscribing.However, this typically led to a large quantity of posts that were oftenlow quality, off topic or spam, sometimes overtaking a community andessentially killing it. As a result, most online forums now requireregistration prior to posting. The subscription process sometimes evenforces users to build networks, choose topics of interest, and configureprofiles prior to posting. These high hurdles exclude many people fromparticipating at all, or limits the communities in which a user activelyparticipates.

By contrast, since embodiments described herein enable people tocommunicate directly with people they already know and simply use thesystem as a notification and organization mechanism, the system may beimplemented without explicit registration by recipients. Authenticity ofcommunications can be confirmed via the source of communications, e.g.,from a user that came to the question via a URL within a notificationthey received containing a unique code, or through a sender's addressassociated with an email received by server 100 or a mobile phone numberassociated with an SMS or MMS message. Question recipients need not setup a profile, learn how a community is organized, build a network ortake any other activity before meaningfully contributing to the system.

FIG. 9 illustrates an exemplary process by which recipients canparticipate without prior registration. In step S900, an asker enters aquestion, analogous to step S300 in FIG. 3. In step S910, the askerspecifies a recipient group, each member of the recipient group beingidentified by an email address or mobile telephone number. In step S911,the system (in this case, server 100) then determines whether the askeris recognized (e.g., via having previously logged into the system orhaving accessed the system via an authenticated communication methodsuch as mobile app or unique http link). If the asker is recognized, thepost is staged within database 104 but flagged as “not visible” suchthat it does not yet appear within user views (step S913) and thedesignated recipients are staged (step S914). If the asker is notrecognized, a contact method record is first created within database 104corresponding to the asker (step S912).

In step S917, the system checks to see if the asker communicationchannel is valid. Validation may be accomplished via any number of ways.If the specified communication channel is a mobile telephone number, amobile communications network message (such as SMS or MMS) can be sentto the asker's mobile phone with a unique validation code, entry ofwhich is required via a web site user interface prior to validation ofthe mobile phone number. For validation of an email address, an emailcan be sent to the specified email address with a unique hyperlink,selection of which is detected by server 100 to validate the emailaddress. Validation of the asker's communication channel helps preventindividuals who do not own an email address or mobile phone number fromusing the system to send notifications to others.

In some embodiments, it may be desirable to require validation of thecontact channel for each dialog. In other embodiments, a contact channelmay require validation once, during its first use, after which servers100 may store confirmation of validation during future communicationsvia that channel. Optionally, validation may expire after apredetermined length of time, after which re-validation of thecommunication channel is required in step S917. Alternatively, forquestions and answers submitted via a web site channel, validation maybe achieved by requiring the user to log in to the web site. Known meansof authenticating web site users can be implemented in step S917.

If the asker contact channel has not yet been validated, the systemawaits validation (step S918). Once the asker communication channel hasbeen validated, in step S919, the post status is updated to “visible,non-staged”. In step S920, the system pushes a communication to eachrecipient in the recipient group via a communication mechanismcorresponding to the identification provided by the asker in step S910.E.g. if an asker specifies an email address for a recipient in stepS910, an email is transmitted to that recipient in step S920. If anasker specifies a mobile telephone number for a recipient in step S910,a mobile communication network message (such as SMS or MMS) istransmitted to that recipient in step S920. In step 922, the recipient'scontact record status is updated within database 104 to reflect receiptof an initial notification for this specific question.

The actual content of the push notifications will vary based on systemimplementation, and could include some or all of the following: the nameof the asker, the subject of the question, all or some portion of thequestion content, the names of others in the recipient group, and a URL(preferably including a UID) facilitating direct linking to thecorresponding dialog content on a web site implemented by web server106. In some embodiments, it may be desirable to vary the pushnotification content based on the communication channel via which thenotification is transmitted. For example, a SMS notification may includebrief content (e.g. “Dan has asked you and 3 others a question. Clickthe following to see it: http://rl.cc.PvmS8S”). However, an emailnotification may include more content, such as the asker's name, thelist of people in the recipient group, the entire text of the question,and a URL hyperlink to provide an answer or view others' answers.

In step S930, the system awaits receipt of further communications fromthe asker or any member of the recipient group. If and when an inboundcommunication is received, the system authenticates the source in stepS940.

Source authentication in step S940 can be achieved in a number of ways.In a preferred embodiment, each outbound notification includes a URLwith a unique code that the system uses to associate individual dialognetwork members with a specific dialog. The URL directs the user device(via web browser or locally installed application) to a web server.Preferably, the code is perishable, with an expiration date and timeassociated with each code. If a user comes to a dialog by way of a URLhyperlink containing a code known to the system, and the code has notyet expired, the system will identify the incoming user as the userpreviously associated with the code, and determine that the source isauthenticated in step S940 without additional user interaction. If auser comes to a dialog by way of a URL hyperlink containing a code knownto the system, but the expiration date and time associated with the codehas passed, the system will identify the incoming user as the userpreviously associated with the code, but will query the user to validatetheir contact address before publishing any subsequent posts or othercontent contributions. If the user comes to a dialog via a link that didnot contain a unique code at all, the system will query the user toenter a contact address, and transmit a communication channel validationcommunication to which the user must respond; with the communicationchannel considered validated in step S940 as coming from a dialognetwork member only if it matches one of the recipient addresses afteraddress validation.

If the inbound communication is not authenticated, in step S980, theresponse is staged as Quarantined, preferably until the recipientcommunication channel is validated. In other words, in step S980, themessage is handled differently as a result of its being provided by anunauthenticated source. Depending on a particular desiredimplementation, the outcome of a message being quarantined in step S980may include, for instance: deletion or discarding of the message;display of the message separately from other, authenticated responses;failure to publish the message via push notification to the asker orrecipient group; or publication of the message only to the asker formanual validation by the asker prior to push publication to therecipient group. Preferably, the system provides the submittingrecipient with a responsive communication (e.g. a reply email or replySMS) including an alert that the sender's communication was not accepteddue to mismatch between the message source and the recipient contactinformation. The recipient may further be provided with an opportunityto authenticate their new communication channel. For example, server 100may transmit an authentication code to the communication source, whichmust be returned via the contact method originally associated with thatrecipient by the asker in step S910. If the new communication method isauthenticated, the process continues to step S982.

In step S982, the recipient response is stored within database 104 withpost status updated to visible/non-staged, such that the responsebecomes visible within search results and user views of the dialog(s)with which the post is associated. In step S984, notification of the newrecipient response is pushed to asker 200 and some or all other membersof recipient group 210, as explained in more detail above, e.g., inconnection with FIG. 3B.

Variable Privacy and Association-Based Anonymity

Another aspect of Q&A systems that may impact user behavior is useridentification. Some prior systems allow users to post anonymously,without providing any user-identifiable information. While anonymousposting can reduce barriers to participation, users often feel little orno accountability for the content they publish, which can lead to highvolumes of inaccurate, low-value, or spam postings. That, in turn, candrive legitimate users away and lead to a downward spiral in systemcontent quality. As a result, other online communities require the useof a real name and/or personal attributes. While this may lead to higherquality posts, it can sometimes deter people from posting information ifthey do not want to risk their personal reputation, even if they mayotherwise be willing and able to provide a high quality answer.

In accordance with another aspect of embodiments described herein,online Q&A systems and/or other computer-implemented, network-basedcommunication platforms can provide association-based anonymity forcontent contributors. Association-based anonymity provides varyinglevels of personally identifiable information about a contentcontributor based on the contributor's relationship to the personviewing the contribution. Types of contributor/viewer relationships thatmay influence the presence and amount of personally identifiableinformation published to a viewer include, without limitation: whetherthe viewer is a member of the dialog network for the content beingviewed; whether the contributor is a member of the dialog network forthe content being viewed; whether the viewer and contributor have knownsocial network relationships; user-level privacy preferences configuredby the contributor; and whether the contributor has affirmativelyrequested to limit disclosure of personally identifiable information ona system-wide or dialog level.

In an exemplary embodiment, some amount of a contributor'spersonally-identifiable information, such as first and last name, willalways be visible to all members of a dialog network for which they arepart of, and that information will be visible to other members of thedialog network with each post they make to that question, therebyproviding a level of accountability to the contributor. Other personallyidentifiable information that can be made available in connection with acontributor's content contribution includes email or other electroniccontact address, system username, and/or a hyperlink to a biographicalprofile of the author. However, contributors can choose (via a defaultsetting and/or on a post-by-post basis) to withhold personallyidentifiable information from content viewers that are not a part of thedialog network (i.e. not an asker or targeted recipient). In otherembodiments the system may make such secondary views available bydefault. This enables contributors to speak freely to a known audience(the dialog network), while still making their valuable user-generatedcontent available to a broader audience, anonymously.

Embodiments also enable authors to specify a private dialog (oranonymous dialog) mode when posting their question. Private dialog modeoverrides any profile or post-level anonymity settings of the asker andall recipients to ensure that all contributions to a dialog from thoseusers are maintained anonymously to viewers outside the dialog network(i.e. individuals other than the asker and targeted recipients). Privatedialog mode may be desirable to minimize any risk of unintentionalidentification of content authors through known personal associations.In this way, Private Dialogs introduce a new form of pseudo-privacy, orpublic privacy, where the asker and recipients are free to engageamongst each other with full knowledge of who they are communicatingwith, perhaps even appearing to them as if they are in a private roomamongst only one another and free to speak accordingly, while the restof the world can look in on that conversation but have no knowledge ofwho is having it. To the extent the asker or recipients have their viewrestricted to only see posts from other members of that dialog network(default view), it will further appear to them as if they are having aprivate group conversation. However, the knowledge and opinions that aregenerated are available for the rest of the world to access and evencontribute to.

In some circumstances, it may further be desirable to enable a privatedialog mode in which respondent identities are withheld from everybodyexcept the original asker, including being withheld from other dialognetwork members. This functionality may be particularly valuable incircumstances where, e.g., question recipients are each knowledgeablebut knowingly hold differing viewpoints, and the potential for conflictamongst individuals known to have differing viewpoints could inhibitopen communications by potential contributors who seek to avoidconflict. Meanwhile, the availability of personal attribution to atleast the question asker still provides a level of accountability,relative to completely anonymous communication forums.

FIG. 10 is a flow chart illustrating a process for determining dialogcontent included in a user's default view, based on their associationwith the dialog being viewed. In step S1000, a request to view dialogcontent (i.e. a query for dialog content) is received bynetwork-connected database 104 within server 100, such as selection of aresult from a keyword search of existing dialogs performed via a Q&Asystem web site implemented by web server 106. In step S1005, adetermination is made as to whether the query originator is a member ofthe dialog network associated with the requested content, e.g., thedialog asker or a member of the asker-specified recipient listassociated with the dialog. If so, by default, content returned inresponse to the query includes dialog content contributed by members ofthe dialog network (i.e. asker 200 or recipients 202) (step S1010). Ifnot, by default, content returned in response to the query includesdialog content contributed by any user (i.e. asker 200, recipients 202or external participants 220) (step S1020). Preferably, users canconfigure broader or narrower views so that, e.g., dialog networkmembers can opt to view content contributed by external participants, orexternal participants can limit their view to content contributed bydialog network members.

FIG. 11 is a flow chart illustrating a process for determiningvisibility of personally identifiable information associated withcontent contributors (such as biographical information), in accordancewith an exemplary embodiment. In step S1100, a request to view dialogcontent (i.e. a query for dialog content) is received bynetwork-connected database 104 within server 100, such as selection of aresult from a keyword search of existing dialogs performed via a Q&Asystem web site implemented by web server 106. In step S1105, adetermination is made as to whether the query originator is a member ofthe dialog network associated with the requested content, e.g. thedialog asker or a member of the recipient list associated with thedialog. If the viewer is a dialog network member, a furtherdetermination is made as to whether the content contributor requestedthat their identity be withheld from everyone except the question asker(S1107). If not, content returned in response to the query includespersonally identifiable information corresponding to contentcontributors (step S1110). If so, the content item returned in responseto the query excludes personally identifiable information (step S1140).

If the viewer is not a dialog network member, a post-level determinationis made as to whether a private dialog mode was selected for thequestion by the asker (step S1120). If so, personally identifiableinformation corresponding to the content contributor is withheld fromthe query response (step S1140). If not, in step S1130 a determinationis made for each element of dialog content as to whether the contentcontributor's system profile (if any) is configured, at a profile level,to maintain anonymity (e.g. to withhold personally identifiableinformation from individuals outside the thread network). If so,personally identifiable information corresponding to that contentcontributor is withheld from the query response (step S1140). If not, adetermination is made as to whether the content contributor identifiedthe contribution as non-public in connection with submission of thespecific element of content requested (step S1135). If so, personallyidentifiable information corresponding to the content contributor iswithheld from the query response (step S1140). If not, content isreturned inclusive of personal information associated with itscontributor (step S1110).

User interface elements enabling implementation of association-basedanonymity functionality described above are illustrated in embodimentsof FIGS. 4 and 6. For instance, in the “new question” user interfaceembodiment of FIG. 4, check box 440 is provided for an asker to selector unselect “Private Dialog” for the question at issue. Selection ofcheck box 440 triggers a “YES” response in step S1120 of the method ofFIG. 11. De-selection of check box 440 triggers a “NO” response in stepS1120 of the method of FIG. 11. Similarly, the answer form userinterface of FIG. 6 includes check box 635 labeled “Withhold my identityfrom the public” beneath the list of individuals involved in a dialog.Selection of check box 635 triggers a “YES” response in step S1135 ofthe method of FIG. 11. De-selection of check box 635 triggers a “NO”response in step S1135 of the method of FIG. 10. The answer form of FIG.6 also includes check box 636 labeled “Conceal my identity fromeverybody except <Asker>, who originally asked this question.” Selectionof check box 636 triggers a “YES” response in step S1107. De-selectionof check box 636 triggers a “NO” response in step S1107. Thus, incombination with the process of FIG. 11, user interface elements 440,635 and 636 operate to provide association-based anonymity on aconversation-level or post-level, respectively. While the embodimentdescribed here allows a user to elect a privacy setting, it iscontemplated and understood that such settings described throughout thisspecification may instead be default behavior of such system, withoutallowing for explicit user selection.

The ability to view personally identifiable information about contentcontributors is, more broadly, an example of a special privilege thatcan be made available or withheld from users based on their associationwith a dialog. Other potential association-based special privilegesinclude the ability to add additional individuals to the dialog asdialog network members, the ability to promote external user posts tothe dialog network members via push notification, the ability to promoteexternal user posts to the dialog network members by flagging anexternal post for inclusion within views that are otherwise limited todialog network content, bypassing moderation or contribution approvalprocesses, or being displayed within a user interface as a “member” asopposed to a “non-member.”

Adding Dialog Members

In embodiments described above, an act of the opening user creates newcontent and defines the dialog network. This initial act preferablycreates a Minimum Viable Dialog Unit with users ready, willing and ableto engage in productive interaction. However, in some circumstances,dialog participants other than the opening user may know individuals notalready a dialog network member who may be productive contributors to aparticular exchange. For example, a target responder identified by theopening user may not have pertinent knowledge themselves, but may have atrusted friend or colleague known to have relevant knowledge andexpertise. Therefore, in some embodiments, it may be desirable to enableindividuals other than the opening user to add new users to a dialognetwork. Yet restrictions and controls over when and how new dialognetwork members can be added may still be desirable in order to preservethe characteristics of the embodiments described herein that promotecontent quality and participant engagement. By enabling (preferablycontrolled) expansion of a dialog network, a Minimum Viable DialogNetwork may evolve into a Maximum Viable Dialog Network with even richercontent and interaction.

In accordance with an embodiment enabling dialog member expansion, FIG.12 illustrates an exemplary user interface that may be presented to anasker 200 for interacting with server 100 to initiate a dialog. Thedialog initiation form of FIG. 12 is analogous to that of FIG. 4, andthe operation of steps S300 and S305 in the process of FIG. 3, buthaving additional features and capabilities as described herein.

Web page 1200 is rendered on a user device via communication between theuser device and web server 106. Fields 1225, 1230 and 1235 enable asker200 to specify a dialog Subject, dialog content, and contentattachments, respectively (analogously to step S300).

Text entry field 1202 is provided for asker 200 to specify recipients202 within recipient group 210 (analogously to step S305). Specifically,in the embodiment of FIG. 12, text entry fields are provided for FirstName, Last Name, and Email or SMS. Icon 1205 can be selected to addanother set of text entry fields analogous to 1202 in order to addadditional target recipients for dialog membership. Groups icon 1210enables asker 200 to select a predetermined group of recipients, such aswhen re-using a previously-configured dialog network for a new dialog.

Check box field 1215 enables asker 200 to specify whether their name ispresented within dialog views by individuals outside the dialog network,similarly to checkbox 635 in the embodiment of FIG. 6. If check boxfield 1215 is unselected, a modified user interface indicatinginitiation of an Anonymous Dialog is presented. Such a user interface isreflected in FIG. 14. Web page 1400 includes unselected “Show my namepublicly” checkbox 1405, and message 1410 communicating that the dialogis configured as Anonymous, with member names hidden from public view.

Asker 200 can control dialog expansion using a user interface controlcomprising radio buttons 1220. Specifically, radio buttons 1220 can beutilized to limit the dialog network members who are provided with theoption to add new individuals to the dialog network. By selecting “None”within field 1220, asker 200 precludes others from adding new members tothe dialog network for the dialog being initiated, similarly to theoperation of embodiments described hereinabove. By selecting “Original”within field 1220, asker 200 enables only users specified by asker 200as the opening user to invite new members to the dialog network. Byselecting “Any” within field 1220, asker 200 enables users initiallyspecified by asker 200 to invite new members to the dialog network, andadditionally any dialog network members added after the dialoginitiation can also invite new members to the dialog network.

FIG. 13A illustrates an exemplary user interface for communication of aresponse to server 100 from a dialog network target recipient who isauthorized to add members to a dialog network, based on the viewer'srelationship to the dialog and the asker's dialog expansion controlsetting specified by control 1220. If control 1220 is set to “Original”,then the dialog view of FIG. 13A would be provided to dialog networkmembers specified by asker 200. If control 1220 is set to “Any”, thenthe dialog view of FIG. 13A would be provided to dialog network membersspecified by asker 200, as well as dialog network members added to thedialog by other dialog network members. If control 1220 is set to“None”, then the dialog view of web page 1350 (FIG. 13B) would beprovided to the viewing individual, in which field 1320 indicates thatdialog network membership is limited to the displayed members, andomitting field 1325 to add a dialog network member.

Field 1305 indicates the identity of the individual having contributedthe displayed content, as well as an indication of when the content wascontributed. Region 1310 displays the dialog opening content. Region1315 identifies current members of a dialog network associated with thecontent displayed in region 1310. Field 1320 communicates the setting ofcontrol 1220 in FIG. 12, indicating the types of individuals permittedto add new members to the dialog. Fields 1325 enable the addition of anew member to the dialog network associated with the content displayedin region 1310. Thus, by specifying First Name, Last Name, an electroniccontact address such as email or SMS, and selecting the “Add to Group”button, the viewer of web page 1300 can add additional members to thedialog network. Selection of Reply icon 1335 enables the viewer of webpage 1300 to provide responsive content (analogously to step S315).Selection of “Rerush” icon 1330 enables the viewer of web page 1300 toinitiate a new dialog referencing the content of the selected post withtheir own specified group of contacts.

Using functionality described herein, dialog membership (i.e. the dialognetwork) is initially established by asker 200, but can be subsequentlyexpanded by other dialog network members if such expansion is authorizedin the dialog configuration. Dialog membership conveys some set ofrights that non-members do not have. Examples of dialog member rightsmay include, without limitation: the right to post new content in adialog or conversation; the ability to view or participate in a dialogin a way that normally requires a user to have previously registered anaccount with the service hosting the dialog; the ability to view orparticipate in a dialog in a way that normally requires a user to haveopted in or been invited into the forum, group or thread having theconversation; the ability to view aspects of the dialog that non-memberscannot see, such as personal names and/or contact details of dialognetwork members; the ability to receive push notifications of newactivity within a dialog; and the ability to filter the view of theconversation in ways not available to non-members.

While the embodiment of FIG. 12 utilizes control 1220 to specify whichusers can add new members to a dialog network, it is contemplated thatin some embodiments, other mechanisms or combinations of mechanisms willcontrol dialog membership. For example, in some embodiments, moderatorshaving special privileges may be provided with rights to override,supplement or otherwise modify dialog membership. In some embodiments,automated system logic will override, supplement or otherwise modifydialog membership. In some embodiments, various combinations of dialogopener actions, dialog member actions, moderator actions and systemlogic will interact to control the ability to add new members to adialog network.

Preferably, once a member has been added to a dialog network by anothermember, the added member automatically receives all rights conveyed uponthem by the adding member. In some embodiments, the added member neednot opt-in or acknowledge anything to be given these rights. The addedmember may be notified of their addition via push notification, anindicator in the dialog or forum, or web site feed. Optionally, addedmembers may automatically begin receiving push notifications of allgroup activity or some subset of it.

Systems enabling adding of dialog network members may facilitate thedevelopment of dialog networks that are large, evolve over time and/orhave diverse membership. FIG. 15 illustrates an exemplary dialog networkthat may be developed if control 1220 is set to “Any”, thereby allowingany dialog network member to add new members interacting with server 100via a user interface analogous to that of FIG. 13A. Opener 200 initiatesa dialog specifying Tier 1 members 1500, 1502 and 1504 as members of thedialog network. Tier 1 member 1500 adds Tier 2 members 1510 and 1512.Tier 1 member 1504 adds new Tier 2 members 1514, 1516 and 1518. Tier 2member 1510 subsequently adds Tier 3 member 1520. Tier 2 member 1512adds Tier 3 member 1522. Tier 2 member 1514 adds Tier 3 member 1524.Tier 3 member 1520 adds Tier 4 members 1542 and 1544. Tier 3 member 1522adds Tier 4 members 1530, 1532, 1534 and 1536. Tier 3 member 1524 addsTier 4 members 1538 and 1540.

Once a member is added, server 100 will preferably track each member'srelationship to the dialog network, including who invited the addedmember, when the member was added, and the hierarchical membershiphistory. Such information may be stored by server 100, such as withindatabase 104.

In some applications, particularly where large dialog networks may bedeveloped, it may be desirable to facilitate content filtering based on,amongst other things, the relationship of a viewer to the conversationwithin a member hierarchy, such as the hierarchy of FIG. 15. In someembodiments, dialog network members may be presented with user interfacecontrols enabling them to limit the degrees of separation within thedialog network hierarchy for whom content contributions are displayed inthe member's view. In such embodiments, each “hop” to a new node in thedialog network hierarchy may be considered one degree of separation.Thus, for example, if Tier 2 Member 1522 set a degree of separationlimit of 3, the corresponding view would include only contentcontributed by Members 1530, 1532, 1534, 1536, 1522, 1512, 1500, 200,and 1510. This and other mechanisms for filtering based on therelationship between members in the dialog network hierarchy arecontemplated.

FIG. 16 illustrates a further embodiment of a hierarchical dialognetwork 1600. Network members are organized into nodes in which eachnode consists of a dialog network member, and the other membersspecifically added thereby. In the embodiment of FIG. 16, the originalopening user 1611 creates node network 1610 by adding five members(users 1612, 1613, 1614, 1615 and 1616), and specifying that all memberscan add new members. User 1612 creates node network 1620 by adding threeadditional members: users 1621, 1622 and 1623. Member 1616 creates nodenetwork 1630 by adding three members: users 1631, 1632 and 1633. Amember 1631 of the node network 1630 created by user 1616, subsequentlycreates node 1640 by adding users 1641 and 1642 as members. User 1642then creates node network 1650 by adding five more members: users 1651,1652, 1653, 1654 and 1655.

In the embodiment of FIG. 16, filtering of displayed content can beimplementing by, inter alia, specifying a number of node networks aboveand below the member's current node network that are desired fordisplay. For example, the narrowest view of user 1642 may include nodenetwork 1640. She may specify a hierarchical display filter of −1/+1, inwhich the −1 setting includes in her view content from individualswithin one node upstream (i.e. node network 1630), and the +1 settingincludes in her view content from individuals within one node downstream(i.e. node network 1650). If user 1642 adjusts her filter to −2/+1, shewould additionally include content from individuals up to two nodesupstream (i.e. node networks 1630 and 1610).

In some embodiments, hierarchical node network content can be filteredusing a slider user interface component to implement a hierarchical zoomfunction. In an example of such an embodiment, a user's narrowest, mostzoomed in view may include content contributed by the node network towhich a member belongs, as well as the node network created by themember (if any). As a member moves a slider control in a “zoom out”direction, content filtering can adjust to present progressively morecontent from node networks progressively further from the member's ownnode network in the dialog network hierarchy.

While existing social networks, such as LinkedIn™, may rely on userrelationships and degrees of user separation, certain embodimentsdescribed herein implement dialog-specific, or conversation-oriented,associations based on a user's relationship to a specific conversation.Conversation- or dialog-specific network relationships can recognize,inter alia, the varying natures of an individual's interests,experiences and expertise across different subject matter.

Variable Privacy

In some circumstances, when sharing insights and opinions, privacy is ofmodest importance. In such cases, the rules of privacy, and theknowledge and expectations of how a system works may be similarly,modestly defined. In other cases, privacy is of greater importance whensharing our insights and opinions.

When important, privacy generally requires a solid foundation of trustto be meaningful. When we know and trust the right people will, and thewrong people will not know what we say, we may be willing to be far moreforthcoming and vulnerable, sharing a deeper and more meaningful levelof insights.

However, it is human nature that this trust is sensitive. If we don'tknow with confidence in advance who will see content we post, andwhether our personally identifiable information will be visible, we aremore likely to act as though anyone can see it and we have little or noprivacy at all, significantly limiting our willingness to share ourthoughts and valuable insights. By creating an environment in whichusers understand their privacy with confidence, a deeper and moremeaningful level of insights can be exposed and shared for others tolearn from.

One key to wide distribution and availability of deep insights throughsecond, anonymous views is trust in how system works and who will seewhat. To establish such trust in a system may require a combination ofa) knowing with certainty that personally identifiable information willbe removed and triangulation or reidentification will be difficult orimpossible (such as by knowing names of all other dialog network memberswill also be redacted) and b) knowing in advance with certainty who anysecond, anonymized view will be available to.

Thus, one vital key to enabling this trust in privacy and unlockingsharing and wider distribution of these valuable insights for others todiscover can be giving users advance knowledge, and in some casesadvance choice, as to who else outside their dialog network theircontent will be distributed to, and what, if any, author identifiableinformation is included. In contrast, if users don't know with certaintyif a second view will be available outside their dialog network, whatauthor identifiable information it will include, and know exactly who itwill (or perhaps will not) be available to, they are more likely toassume they have little or no privacy at all, restricting what they sayand share, if they say and share anything at all.

By providing advance knowledge and in some cases advance choice asdescribed above, this privacy trust can be effectively created andmanaged both in cases of broad distribution and narrow. If a user knowswith certainty in advance that a second view of their content, withpersonally identifiable information removed, will be available to allmembers of the public (whether all Internet users or all users of aregistered system) in addition to the members of their dialog network,they can have confidence in their understanding of the degree of privacyto which they will receive. Similarly, if a dialog network of medicaldoctors knows in advance that any second view of their content withattribution removed will only be available to other practicing medicaldoctors within a restricted access community, or a known third partyservice restricted to medical doctors, they can interact and shareinsights with confidence that this information (with or without authorattribution) won't be seen by their patients. Getting even more narrow,if members of a dialog network know a second view of their content maybe made available to only an explicitly named list of other viewers,such as the names and email addresses of three employees at a medicalequipment manufacturer, they may have the privacy trust necessary toopenly share their insights.

In contrast, if user expectations are such that a system may or may notmake a second view available, the second view may or may not concealpersonally identifiable information, concealed information may or maynot be subject to triangulation or reidentification (such as bydisclosing names of known associates within a dialog's membership), orthat if such a second view is made available, the system willautomatically determine who else it's available to without advanceknowledge of the planned distribution list to all participants, privacyis less likely to be trusted and to the extent privacy was important forthe people and subject matter involved, knowledge sharing and discourseis likely to be significantly constrained or it simply won't occur atall.

In addition to association-based privacy implementations, such as thosedescribed above, other embodiments may provide variable privacyfeatures. Variable privacy features may enable users to selectivelyalter dialog privacy attributes between two or more options. Forexample, in some embodiments, dialog content or portions of dialogcontent may be selectively set or adjusted to occupy any of threeprivacy treatments: a public status (e.g. one in which each content itemis available to users outside the dialog group, with author attributionsuch as personally-identifiable information); public-private status(e.g. one in which each content item is available to users outside thedialog group without personally-identifiable author attribution, andavailable to dialog members with personally-identifiable authorattribution); or private status (e.g. one in which each content item isonly viewable by dialog members). Enabling dialogs to have broaderdiscoverability may have the following benefits to knowledge sharing anddiscourse: 1) It increases the chances that other people with valuableinsights may find these dialogs and contribute valuable information tothem, leading to better and/or more robust answers, and 2) It allowsother people who may benefit from the content in these dialogs to findthem, whether they have anything helpful to add or not. In somecircumstances, the broader the distribution, the more value that will becreated and shared. In these circumstances, the system may utilizemethods aimed at encouraging users to publish second views of theirdialogs to as inclusive of an audience as possible (e.g. entirepopulations, user bases, or defined groups without exclusiverestriction). In other circumstances where privacy is particularlyimportant (e.g. where there may be unforeseen legal implications fordisclosure), the system may instead implement methods designed toachieve the critical goal of limiting discoverability exclusively tonarrow and/or selective audiences.

Regardless of how an electronic conversation originated, it may bevaluable to enable that conversation to come to exist in thepublic-private state: where conversation members see one view thatincludes personally identifiable information, and the remaining viewerssee a view that excludes personally identifiable information of theconversation members. Variable privacy mechanisms may be beneficiallyimplemented in numerous different communication platforms implementedvia central network-connected servers or peer-to-peer clients.

FIG. 17 illustrates one process for implementing variable privacymechanisms, in the context of a network-connected computing platformthat enables private communication amongst individuals interacting withthe computing platform. The embodiment of FIG. 17 allows users toinitiate a private conversation, and then later elect to disseminate thedialog content more broadly, while still controlling the privacy of thedialog participants. For example, users could initiate a private dialogamongst known, trusted individuals; then, if the invited dialog memberscannot answer a question sufficiently, they can “crowdsource” an answerby exposing the dialog content more broadly and therefore increasingopportunities for valuable engagement with knowledgeable individuals.

In step S1700, a private dialog is conducted amongst one or more dialogmembers. The dialog includes one or more content contributions, witheach content contribution being originated by a dialog member. In stepS1700, the dialog content is not made available to individuals otherthan dialog members; meanwhile, dialog content is made available todialog members via a first view, which includes personally-identifiableinformation enabling dialog members to attribute each dialogcontribution to its contributor.

FIG. 18 provides an exemplary user interface for a mobile applicationimplementing private conversations with variable privacy, such as couldbe implemented on smartphone 124 interacting with server 100. The userinterface of FIG. 18 provides a first view of dialog content that isprivate to dialog members, with no view being made available toindividuals who are not members of the dialog. Dialog content isdisplayed in display region 1800. Display region 1810 providespersonally-identifiable information indicative of the contributor ofcontent displayed in region 1810. Display region 1820 displays indiciaindicative of some or all other dialog members. Lock icon 1830 providesa visual indicium indicating to a viewer that the dialog is private.

Returning to the process of FIG. 17, in step S1710, a determination ismade as to whether a dialog member has requested to publish the dialog,or a portion thereof, towards making at least some of the dialog contentavailable beyond the dialog members, such as a public or public-privateview of the dialog. The request to publish in step S1710 will typicallybe associated with an explicit group of individuals to whom the dialogcontent (or portions thereof) will be made available. For example, insome embodiments, a request to publish may be specifically directed tomaking dialog content available (in whole or in part) to allindividuals, i.e. the public at large. In other embodiments, a requestto publish may be specifically directed to making dialog contentavailable to specific individuals or groups of individuals, such as: allother members or registered users of a service via which the content ispublished; predefined subsets of users of a service via which the dialogcontent is published; individuals associated with a third party service(e.g. sharing a second view of the dialog via Twitter™ or Facebook™);individuals associated with a subgroup defined via a third party service(e.g. sharing a second view of the dialog with a user's FacebookFriends, a Facebook Group or Google Group); individuals individuallyidentified by a dialog member (e.g. via email address, phone number orother contact mechanism); and/or individuals individually identified bythe opening dialog member.

It is understood publishing to third party audiences may include makinga second view of the dialog available for publishing and/or receivingresponses at a third-party platform that is not associated with thesystem where the dialog originated. In such a scenario, a second viewwith personally identifiable author information removed might bepublished at Facebook, LinkedIn, or some other third-party platform.Depending on available integration, comments to such views may or maynot be published back to the originating system. In some embodiments, acommunications platform could be provided that allows users to startconversations with known dialog members, where the platformautomatically posts a second, anonymized view of the conversation to theuser's account on a third party social networking platform, to help getmore answers without comprising the user's privacy or the privacy ofothers with whom the user initiates the communication. The platform mayalso post the dialog to the social network accounts of other dialogmembers, if authorized. The dialog members' social network connectionscan view the conversation, share it with their own connections, andparticipate, allowing the conversation to live on the web anonymously.

If no request to publish is received in step S1710, the dialog continuesas a private dialog (step S1700). If so, a determination is made as towhether the requesting dialog member has requested to publish apublic-private view, in which dialog member personally identifiableinformation is shielded from exposure outside the dialog members, or apublic view, in which dialog content is made available with personallyidentifiable contributor information to individuals outside the dialognetwork. If the dialog member has requested to publish a public-privateview, the communication platform makes a second view of the dialogcontent available to individuals other than the dialog members, thatexcludes personally-identifiable information associated with theindividual(s) that contributed each element of dialog content (stepS1730).

If the dialog member has requested to publish a public view (whichincludes personally-identifiable author information) to individualsother than dialog members, other dialog members can be queried forauthorization (step S1740). If the public view of the dialog content isauthorized, the platform makes available a view of the dialog contentthat includes personally-identifiable author attribution, to individualsother than dialog members (step S1750). If the public view of the dialogcontent is not authorized by the dialog members, the dialog continues asa private dialog accessible only to dialog members (step S1700). It isunderstood and contemplated that circumstances may arise where somedialog members provide authorization while others withhold, and that insuch circumstances partial views of the dialog may be made available ina second view that exclude the contributions by the withholding dialogmembers.

FIG. 19 illustrates an exemplary mobile user interface via which a usercould specify variable privacy settings for a previously-private dialog(e.g. steps S1710-S1720). In some embodiments, the display of FIG. 19could be triggered by, e.g., a user selecting privacy status indicium1830 via the user interface of FIG. 18. User query window 1900 pops overthe private dialog display. Query window 1900 includes button 1910,selection of which preserves the dialog as private with no second viewavailable to individuals other than the dialog members (e.g. a means forselecting the “No” option of step S1710). Selection of button 1920causes server 100 to make available a public-private second view of theprivate dialog content of region 1800, in which contributor identity1810 and group member identities 1820 are withheld (e.g. step S1730).Selection of button 1930 causes server 100 to make available a publicsecond view of the private dialog content of region 1800, in whichcontributory identity 1810 and group member identities 1820 are madeavailable to individuals other than group members (e.g. step S1750).

While the method of FIG. 17 provides an exemplary embodiment of variableprivacy for a dialog initially started as private, other variations maybe implemented. For example, in some embodiments, unless and/or untiluser consent to a fully public view is obtained from the dialog membersin step S1740, a public-private view of the dialog may be exposedautomatically (step S1730), rather than withholding any public orpartially-public view at all. In other variations, consent may be soughtto provide a public-private view rather than a fully public view. Inother variations, the ability to control privacy features (e.g.requesting publication in step S1710) may be provided only to a dialogopening member, rather than all dialog members. In other variations, adialog opener may be permitted to modify dialog privacy settings (e.g.exposure of a second view that is public or public-private) withoutconsent of other users, while non-opening dialog members may be requiredto obtain consent (e.g. from the opening user and/or other dialogmembers) before modifying a dialog privacy setting.

In other embodiments, a network-based communication platform may beutilized to make available views of dialogs initiated via various other,independent private communication mechanisms (such as email, SMS, andother chat or messaging platforms) with variable and/orassociation-based privacy. Thus, for example, a member of an emailcommunication chain could initiate a dialog (analogous to step S1700)within the network-based communication platform of FIG. 17, based on thecontents of a prior email exchange with others that transpired throughsome other independent communication mechanism. The process of FIG. 17,and the associated communications infrastructure, could then be used toenable members of the public to review, learn from and/or comment on thedialog exchange, via a view providing association-based privacy, such asa public-private view that withholds the identity of dialog members toindividuals who are not dialog members.

While the embodiment of FIG. 17 discloses a variable privacy mechanismin the context of a dialog that is initiated as a private dialog, in yetother embodiments, a network-connected communication server mayimplement a variable privacy mechanism in the context of a dialog inwhich non-private (e.g. public-private) views are exposed ab initio. Forexample, a communications server may be configured to expose a second,public-private view of a dialog by default, with dialog members beingpresented with options to add user attribution to the second view (i.e.make the second view fully public) or remove the second view entirely(i.e. make the dialog private).

Embodiments may also enable users to control the scope of exposure forvarious dialog views. Dialog members may be provided with a selectiontool to pick one or more of multiple groups of individuals to whom thedialog content is made available, in whole or in part. In someembodiments, the groups are known to the dialog member, enabling thedialog member to understand the scope of distribution being permitted.For example, the embodiment of FIG. 17 contemplates universal access tothe second view, when it is made available. The second view isinherently made available to a group known to the dialog members, whichincludes all individuals other than dialog members (or in some cases,all registered users of a communication platform other than dialogmembers). However, in other embodiments, users may specify one or moreof multiple possible scopes of distribution for the various dialog viewsthat are made available. For example, a second view of a dialog could bepublished to predefined subsets of individuals, in accordance withdefault system rules and/or publishing dialog member specification.Predefined subsets of individuals may include, e.g., a user's socialnetwork connections (such as Facebook™ Friends or publication viaTwitter™), groups of individuals defined via third party platforms (e.g.a Facebook Group or LinkedIn™ group), groups of individuals defined viathe communication platform (e.g. distribution lists, followers ofcertain topics or hashtags, forum members, members of a restrictedaccess community, etc.), or individually-specified individuals.

Selection of individuals to whom the second view is made available mayalso be determined algorithmically, such as by a centralizedcommunication server. For example, when a user requests to publishdialog content outside the dialog members in step S1710, an associatedserver 100 identifies potential recipients believed to be interestedand/or knowledgeable in the subject matter of the dialog. For example,application logic 102 may implement natural language processing on thedialog content to extract dialog content characteristics (such askeywords or topics), and then compare those dialog contentcharacteristics against characteristics associated with each user (suchas via user profile keywords or other profile content, user behavioralprofiling, prior dialog contributions by each user, topics followed by auser, or the like). These and other user targeting mechanisms may beemployed to facilitate optimal distribution of dialog content. In someembodiments, the publishing user may be presented with a systemrecommended list of potential users, groups, or forums for distributionfrom which the user may select or deselect prior to publishing. In somecircumstances, knowing exactly which people, groups of people, or otherpopulations at large their post will be available to prior to publishingmay be critical to providing the degree of trust and confidence in theirprivacy necessary for them and their dialog members to openly contributetheir insights and opinions.

In some embodiments, it may also be desirable to provide multiple orvarying mechanisms by which an individual may be designated a dialogmember. For example, as described in several embodiments herein, dialogmembers may be explicitly identified by a dialog opener. In someembodiments, dialog members may be permitted to invite other individualsto become dialog members. In some embodiments, individuals may bepermitted to subscribe to a dialog in order to opt in to dialogmembership. In some embodiments, individuals may be permitted to requestdialog membership, which request may be approved by, e.g., the dialogopener, a dialog administrator, or another dialog member. In any case,once an individual is designated a dialog member, the first view of thedialog may be made available to them.

User Control Over Broadly Disseminated Dialog Views

While providing variable and/or association-based privacy mechanisms tocontrol dissemination of information that is personally-identifiablewith content contributors may eliminate or significantly mitigate dialogmember privacy concerns, in some circumstances, dialogs amongstindividuals may include information embedded within the substantivedialog content that reveals contributor identity or otherwise includesinformation content that may be considered private or sensitive (e.g.posting the name of someone's family member or employer could be used toreveal their own identify, as would, obviously, posting an image ofthemselves or a family member). In such circumstances, the availabilityof a broadly-disseminated view may inhibit dialog members fromcommunicating freely. Dialog members may also inadvertently disseminateinformation more broadly than intended, within the members' substantivedialog content. As a result, it may be desirable to provide contentcontributors and/or dialog members with tools to modify the view ofdialog content published to individuals other than dialog members.

One such tool for controlling dissemination of dialog content is aredaction tool. Dialog members may be provided with tools to manuallyidentify portions of a content contribution that will be redacted orotherwise removed from a second view of the content made available toindividuals not having privileges required to view a user's personalcontent, such as individuals other than dialog members. FIG. 20illustrates an exemplary user interface 2000 that may be rendered on aclient device, in communication with a centralized application server,in order to mark content for redaction from publicly-disseminated dialogviews in a text-based dialog. Message display 2010 provides a user withan indication of the current privacy status of a dialog. A contentcontribution from the currently logged in user is displayed in region2020. Mark for Redaction indicium 2030 can be selected, after whichportions of text within region 2020 can be selected for redaction from asecond view of the dialog, made available to individuals other thandialog members. Apply Redactions indicium 2040 can then be selected toapply marked redactions to the dialog content, when rendered in thesecond view.

While FIG. 20 illustrates an exemplary user interface for redaction ofuser-entered text content, other types of user content contributions maycall for analogous redaction mechanisms. For example, in some use cases,users may contribute content in the form of a PDF document; well-knownPDF redaction tools may be applied by users to provide viewer-dependentredactions in the manner described herein. Similarly, contentcontributions may include bitmap graphics, such as images of scanneddocuments or photos of people. For example, users may wish to share animage of a medical record or bill to discuss with trusted colleagues; insuch a circumstance, it may be desirable to redact any name and addressappearing on the document from viewing outside of a trusted group, whileenabling feedback regarding unredacted portions from others. As anotherexample, a user may desire to post a photo in its entirety to a trustedgroup, while making the image available with certain individuals' facesblurred for comment or consumption by others. Image-based contentredaction tools, such as “black box” or image-based graphic overlaytools, or tools to blur a portion of an image (such as a blur filter),are known and may be applied to enable presentation of viewer-dependentviews of such content, using the methods and mechanisms describedherein.

Using such mechanisms, content contributors can be provided withfine-grained control over dissemination of their content to individualsoutside a privilege group, such as individuals outside a particulardialog network.

Association-Based and Variable Privacy For Forums

In yet other embodiments, association-based and/or variable privacymechanisms can be implemented in the context of a communicationsenvironment in which privacy criteria are determined at anorganizational level that is separate and distinct from an individualdialog. One such example is an online forum in which individuals canbecome members or registered users. Thus, the forum has a definedmembership that may be utilized as a criterion for association-basedand/or variable privacy mechanisms.

FIG. 21 illustrates an exemplary association-based and variable privacymechanism, in the context of an online forum. In step 2100, a set of oneor more individuals become forum members. Forum membership may begranted by one or more mechanisms, such as being added by someone withauthority to do so (such as a forum moderator), by an individual optingin to membership (e.g. joining the forum), or both. In step S2105, acontent thread is generated by one or more of the forum members.Typically, a content thread will be generated by an opening memberposting an initial content item for publication by the forum to othermembers. Other members may then contribute further content in response.In some forum, content may be organized by hierarchical subcategoriesbased on, e.g., intended subject matter for content therein.

In step S2110, a first view of forum content is published or otherwisemade available to other forum members. This first view includes bothdialog content and user attribution, such as personally-identifiableinformation associated with the dialog content contributors. In stepS2112, a second view of forum content is published or otherwise madeavailable, implementing an association-based privacy configuration thatis a system default or most recently configured for the thread. In stepS2120, a determination is made as to whether association-based privacyis reconfigured for a particular content thread. If so, anassociation-based privacy configuration is specified in step S2125. Inthe illustrated embodiment, one of three privacy states may be specifiedin the reconfiguration: a private state S2130, in which the second viewis withheld from publication to individuals other than members in stepS2112; a public-private state S2132, in which a second view is madeavailable to individuals other than members in step S2112, but thesecond view omits personally-identifiable information associated withthe content contributors; and a public state S2134, in which a secondview is made available to individuals other than members in step S2112,and the second view includes personally-identifiable informationassociated with content contributors. In any event, afterreconfiguration, the content thread is made available accordingly insteps S2110 and S2112.

In some embodiments, any member may be permitted to reconfigure privacysettings for a content thread. In other embodiments, a forum platformmay solicit consent from content thread contributors prior toimplementing a reconfiguration of privacy settings.

While the embodiment of FIG. 21 illustrates variable andassociation-based privacy mechanisms applied to a forum on a contentthread basis, in other embodiments, variable and association-basedprivacy mechanisms may be applied to a forum at different levels of acontent hierarchy. For example, the configuration of a second viewexposed to non-members may be configurable for an entire forum, ratherthan on an individual thread basis. Alternatively or additionally, forforums in which content threads are organized by topical categories andsubcategories, the configuration of a second view exposed to non-membersmay be separately configurable for a particular category or subcategory.

Variable and association-based privacy may be configured at hierarchicallevels below an individual thread as well. For example, a subset ofcontent contributions within a thread may be made available via anon-member second view that differs from the non-member second viewapplied to the thread, as a whole. In such embodiments, members mayselect specific content items for broader or narrower dissemination.

Restricted Access Communities

In some embodiments of communication platforms implementingassociation-based and/or variable privacy mechanisms, second views ofdialog content that potentially withhold dialog member identificationmay be defined relative to a broad public body of users, such as anyInternet user. However, in other embodiments, it may be desirable toimplement a communication platform with variable and/orassociation-based privacy mechanisms within a restricted accesscommunity, where membership is controlled.

In such an environment, the public to which a second view of dialogcontent is accessible may be restricted to a controlled set ofindividuals, i.e. members of the restricted access community. Thus, forexample, dialog content designated as Private may be viewable only byassociated dialog members; dialog content designated as Public-Privatemay be viewable with user attribution by associated dialog members, andwithout user attribution by any member of the restricted accesscommunity; and dialog content designated as Public may be viewable withuser attribution by all members of the restricted access community.Meanwhile, no view of the dialog content at all may be provided toindividuals who are not members of the restricted access community.

In some embodiments, restricted access communities may also permit yetother variable privacy options. For example, dialog content may be madeavailable with contributor attribution to all members of the restrictedaccess community, but without attribution to the public-at-large, i.e.individuals who are not members of the restricted access community. Anoption may also be provided to make dialog content available withcontributor attribution to all individuals, regardless of whether theyare members of the restricted access community.

FIG. 22 is a schematic representation of viewer categories which may beutilized as a basis for selecting a variable privacy mechanism forapplication to a dialog content view. Viewer categories include: thedialog opening member 2200; other dialog members 2210 (including, insome embodiments, users specified by the opening member); all members ofa restricted access community 2220; and individuals other thanrestricted access community members 2230.

In yet other embodiments, multiple restricted access communities may beimplemented within a communications platform, having separate and/oroverlapping membership. In such embodiments, variable privacy mechanismsmay be applied on a per-community basis. For example, content from adialog concerning an individual's personal medical condition may be madeavailable with user attribution to a restricted access communitycomposed of licensed medical doctors, and without user attribution to arestricted access community composed of individuals suffering from arelated medical condition.

Variable privacy mechanisms such as those of FIGS. 17-22 may provideindividuals with important tools to balance accountability achievedthrough personal attribution of contributions, with privacy sufficientto promote unfettered participation by dialog members.

Integration With External Communication Systems

In some communication platforms implementing association-based and/orvariable privacy mechanisms, a privacy-enabling system may integrate invarious ways with external communication systems. The original source ofa dialog may be a communication platform that is separate andindependent from the privacy enabling system. Additionally oralternatively, a dialog view generated by the privacy-enabling systemmay be displayed to other individuals via one or more other externalcommunication platforms.

FIG. 23 provides a schematic representation of some such embodiments. Adialog conducted amongst a group of dialog network members via messagingplatform 2300, may be conveyed to privacy-enabling system 2310, with amodified view of the dialog content being published via communicationplatform 2320. Privacy-enabling platform 2310 can be implemented tomirror a conversation or dialog conducted on platform 2300, providing asecond dialog view that removes personally identifiable informationdirectly by system 2310 and/or by publishing the second dialog view toplatform 2320. Communication platform 2320 may include one or more othercommunication mechanisms such as a web site, mobile app, API feed,and/or third party social network such as Facebook™ or Twitter™.

In one embodiment, one or more individuals may start a dialog using SMSor MMS text messaging as a messaging platform 2300. By adding adedicated text number provided by the privacy enabling system to theirtext message conversation (e.g. adding the privacy enabling system to agroup text message), a second view of all messages sent to thatconversation with author attribution removed is published to theprivacy-enabling system. FIG. 24A illustrates an exemplary userinterface that may be provided to initiate configuration of a textmessaging conversation integration, with which the user specifies thetype of integration desired (e.g. Public or Public-Private). FIG. 24Billustrates an exemplary user interface subsequently providing atelephone number for inclusion in the group SMS exchange. The members ofthe text message conversation are considered to be the dialog members.

FIG. 25 illustrates an embodiment of a communications network forgenerating an anonymized mirror of a conversation conducted via anindependent group messaging platform, such as group SMS. A messaginggroup 2500 (e.g. an SMS messaging group) includes multiple users 2510and agent 2520. Users 2510 are associated with dialog participantdevices capable of messaging on the desired messaging platform, such assmartphones. Agent 2520 is a data service providing network-connectedservers or devices with messaging services on the desired messagingplatform, such as via an API. For example, in an SMS messagingembodiment, Twilio™ SMS services may be utilized, with agent 2520 beingassociated with an SMS number such as that provided via the userinterfaces of FIGS. 23 and 24. Members of group 2500 transmit andreceive messages via messaging network 2530. In a group SMS embodiment,messaging network 2530 may include one or more cellular service providernetworks. Agent 2520 also interacts with network 110, and in turn,server 100, in order to convey messaging platform content to server 100.

While agent 2520 is illustrated, in the embodiment of FIG. 25, as acomponent separate from server 100, in other embodiments, agent 2520 maybe implemented directly by server 100, such as by a componentimplemented in application logic 102. Such embodiments may beparticularly advantageous when messaging network 2530 provides an APIfor direct interaction by network-connected servers.

FIG. 26 illustrates a process that can be implemented within the networkof FIG. 25, to provide mirroring of SMS conversations with participants'personally identifiable information removed. In step S2600, one of users2510 sends an SMS message to a SMS group 2500, namely, each of users2510A, 2510B et seq., and further including an SMS number associatedwith a SMS agent 2520 (such as that provided in FIG. 24). In step S2605,the SMS message sent in step S2600 is received by SMS network 2530, andrelayed to the other members of SMS group 2500. In step S2610, SMS agent2520 receives the inbound message, and pushes its content to server 100(e.g. via API connection between SMS agent 2520 and messaging server108).

In step S2615, server 100 (via operation of application logic 102)removes (or flags for removal) personally identifiable information (PII)from the received message, and stores the message within database 104.Varying levels and types of PII removal can be implemented. For example,in some embodiments, PII removal may include removal of sender andrecipient information (e.g., in the context of group SMS messaging,removing the sender and recipient phone numbers).

While step S2615 may be referred to as removal of personallyidentifiable information, it is contemplated and understood that thisstep encompasses various techniques to prevent the display of some orall personally identifiable information within a public, or more broadlydisseminated, view of a dialog otherwise conducted amongst individualsusing a non-public messaging platform. For example, upon receiving adialog content contribution in step S2610, server 100 may operate toremove PII prior to storing an anonymized copy of the contentcontribution later published in step S2620. In other embodiments, server100 may operate to flag content known to be, or suspected of being, PII.The original dialog content and PII flags can then be stored withindatabase 104, and utilized to later render a view of dialog content withPII removed prior to its publication. These and other variations of PIIremoval sequences may be utilized, as would be understood by a personhaving ordinary skill in the relevant field.

In some embodiments, anonymization of message content may be undertakenby making message content pseudonymous, such as replacing the phonenumber of senders and recipients with system-assigned (and possiblyrandom) icons, monikers, avatars or other user indicia that does notidentify the associated individual's real identity. Server 100 mayassociate a dialog participant's electronic contact address used for aparticular communication (e.g. SMS number) with a non-identifying userindicium on a per-dialog basis (e.g. such that a random indicium isassociated with the user persistently within a given dialog), or acrossdialogs (such as where a user is assigned a user indicium that is usedacross multiple dialog networks in which the user participates).

Particularly in an embodiment in which a group dialog, conducted via atraditionally private messaging platform, is seamlessly or automaticallymirrored with a public view, dialog participants may naturally refer toone another by name within the body of content contributions, withoutfully considering privacy implications of doing so. Therefore, inaddition to removing personally-identifiable information from dialogsender and recipient fields in the mirrored dialog view, it may also bedesirable to remove personally-identifiable information from substantivedialog content contributions made available in a mirrored dialog viewthat is made available beyond the dialog network. For example, in anembodiment providing aggressive automated removal of personallyidentifiable information, application logic 102 may include a naturallanguage processing mechanism configured to recognize and remove anyproper names from the mirrored view of a content contribution.

Other embodiments may seek to limit name removal to known names ofdialog participants or people or entities with whom a dialog participantmay be identified. For example, dialog participants may each be providedwith a user profile, illustrated schematically in FIG. 30. User profile3000 may be configured within privacy enabling system 2310, asimplemented by server 100, and available for editing via user devices120, 122 or 124. User profiles may include, amongst other things, userpreferences 3005, a list 3010 of electronic contact addresses andexternal communication platform handles with which the user isassociated, as well as a list 3015 of words or phrases that the userbelieves to be potentially identifying in the context of theircommunications and which the user desires to conceal from viewers otherthan other members of dialog networks in which the user participates.Additionally or alternatively, user profile 3000 may include a number ofidentifying information fields 3020, each prompting the user for an itemof text content with which the user may be identified, such as “EmployerName”, “Spouse”, “Child” or the like.

In operation, the user profile of FIG. 30 may be used to remove PII instep S2615, using the process in FIG. 31

Upon receiving a dialog contribution from a dialog network member,server 100 operates to identify the content contributor (step S3100).For contributions originating on external messaging platform 2300, thecontent contributor may be identified by cross-referencing acontributor's electronic communication address from the privatemessaging platform (e.g. SMS number, email address, social networkusername, or the like) with contact address fields 3010 within userprofiles. For contributions contributed via a messaging mechanismimplemented directly by server 100, server 100 may associate thecontribution with a user profile based on the logged in user. In anyevent, server 100 may then search the contribution for PII specified inuser profile fields 3010, 3015 and/or 3020 (step S3110). PII identifiedin step S3110 may then be flagged for replacement in step S3120. Acontribution version with replacements determined in step S3120 maysubsequently be published (e.g. in step S2620, described below).

In some embodiments, PII content removed or flagged for removal may bereplaced by a redaction indicator. Removed content may be replaced witha generic redaction indicator, such as [REDACTED] or [XXXX]. In someembodiments, server 100 may operate to replace PII content withdescriptive redaction indicators. Information within profile 3000 may beutilized to select redaction indicators descriptive of the removedcontent. For example, if profile field 3020A corresponds to a user'scurrent employer, and the user specifies “Acme” within field 3020A, theinstances of text content “Acme” found within a dialog contribution maybe replaced with “[COMPANY NAME]”, thereby providing an indication ofthe nature of the content removed.

In step S2620, the dialog view with PII removed (and replaced withredaction indicators) is published via one or more publicationmechanisms. In some embodiments, server 100 may make available a website using web server 106, through which individuals other than dialogmembers may access a mirrored view of dialog content, with PII removed.In some embodiments, the mirrored dialog view with PII removed may bepublished to social network 2540, such as Facebook™ (e.g. publishingdialog content to a Facebook group or a user's timeline), LinkedIn™ orTwitter™. In some embodiments, the mirrored dialog view with PII removedmay be published via an API made available by server 100, such that themirrored dialog content may be accessed by third party informationsystems. For example, a search engine may index mirrored dialog views toindex and make available substantive dialog content, while limiting oravoiding the disclosure of participants' personally identifiableinformation.

In some embodiments, it may be desirable to permit users of messagingplatforms to which anonymized dialog views are mirrored, to reply todialog content, with replies being relayed back to the originatingdialog group 2500 via the originating messaging platform. For example,in the SMS messaging example described above, as other users of theprivacy enabling system (and/or third party platforms to which theprivacy enabling system pushes anonymized dialog content) other thandialog members reply, their messages may be automatically texted back tothe SMS group 2500, and these messages may or may not include personallyidentifiable information of the author. In particular, server 100 mayutilize SMS agent 2520 to send a SMS message containing reply dialogcontent to users 2510 via messaging network 2530. In some embodiments,by texting a simple command (e.g. REPLIES OFF), any dialog member maydisable further replies from the privacy enabling system. In someembodiments, dialog members may further have the option to text acommand (e.g. “DELETE”), thereby causing the privacy-enabling system tostop publishing the second view.

The embodiments of FIGS. 23-26 can provide simple and seamless mirroringof a second view of dialogs conducted via SMS, by adding an SMS numberassociated with a communication platform to a group SMS recipient group.However, like embodiments can be readily used to extend the samefunctionality to other independent messaging platforms. For example,users may automatically mirror a group dialog conducted via email, withPII removed, by including an email address associated with server 100 tothe email recipient list. FIG. 27 illustrates an exemplary userinterface that may be provided to initiate configuration of an emailconversation integration, with which the user specifies the type ofintegration desired (e.g. Public or Public-Private). FIG. 28 illustratesan exemplary user interface subsequently providing an email address forinclusion in the group email exchange. The members of the emailconversation are considered to be the dialog members.

A second view of all messages sent to that email conversation, withauthor attribution or other PII removed, can then be published by theprivacy-enabling system, as described above in connection with stepS2620. In such an embodiment, agent 2520 may be an email inbox withpredetermined message processing, while communication network 2530 maybe a network of interconnected mail servers. In email embodiments, mailheaders may include not only electronic contact addresses, but also namefields associated with senders and recipients, which can be extracted byserver 100 in order to identify and remove PII in step S2615.

Similar to SMS embodiments described above, as other users of theprivacy enabling system other than dialog members reply to a dialog,their messages can be automatically emailed back to all members of thegroup email message, similar to a CC all function in email, and thesemessages may or may not include personally identifiable information ofthe author. In some embodiments, by emailing a simple command (e.g.REPLIES OFF), any dialog member may disable further replies from theprivacy enabling system. In some embodiments, dialog members may furtherhave the option to email a command (e.g. “DELETE”), thereby causing theprivacy-enabling system to remove the second view from its system orstop publishing the second view.

In another variation of the email embodiment described above, an emailconversation integration may begin with an initial conversation threadbeing forwarded to the dedicated email address provided by the privacyenabling system, thereby prepopulating the second view of theconversation on the privacy enabling system with an email conversationthat already transpired. Consistent with other embodiments describedhere-in, the prepopulated view will preferably have personallyidentifiable information removed prior to publishing. In suchembodiments, the system may accept conversations previously published onan external communication system, and publish a second view from thatpoint and time to an audience with personally identifiable informationremoved.

Other embodiments may incorporate similar integrations with variousother external communication platforms that enable group conversationswith external sources. For instance, Facebook and Snapchat integrationsmay be implemented allowing similar second views of group conversationsto be published on the privacy-enabling system or other externalcommunication networks. For example, agent 2520 may be implemented by anAPI provided by a network-based messaging platform 2530.

Certain embodiments described above illustrate front-end externalintegrations, in which dialogs originate on a communication platformthat is external to the privacy-enabling platform, with or withoutback-end external integrations to publish an anonymized view of thedialog. However, in other embodiments, only a back-end externalintegration may be provided. A dialog may be conducted amongst a dialognetwork on the same communication system on which privacy-enablingmechanisms are implemented. The anonymized dialog view may then bepublished by that system to external systems, such publication fordisplay on social networks or for indexing by search engines. Thus,messaging systems such as those described herein in connection with,e.g., FIGS. 1-14 and 17-22, may additionally publish dialog views withauthor attribution or other PII removed via external platforms, such asFacebook™, Twitter™ or the like.

Embodiments implementing external integrations may rely on systemdefault configurations to determine which individuals the dialogs willbe published to (e.g. all other individuals, all registered users, orsome subgroup). Alternatively, these configurations may be determined bythe integration address used (e.g. the text number or email addressprovided by the system that is used to start the dialog on the privacyenabling system).

Reversing Pseudonymous References to Dialog Network Members

When dialog network member PII is replaced by system-generated monikersor other indicia, users viewing the anonymized dialog view may wish torespond to dialog content with reference to dialog network members andtheir content. Some embodiments may implement reverse anonymizationmechanisms, whereby system-generated pseudonymous monikers used toreplace dialog network member identification in anonymized dialog viewsmay be used in responses from individuals responding to anonymizeddialog view content. When rendering views of such responses, the privacyenabling system then renders the system-generated moniker within ananonymized dialog view, but converts the system-generated monikers backto identifiable references to the associated dialog network member whendisplayed to dialog network members.

FIG. 29 illustrates an exemplary process involving reverse anonymizationof references to dialog network members by viewers of an anonymizeddialog view. In step S2900, privacy enabling system 2310, implemented byserver 100, publishes dialog content with pseudonymous references todialog network members, replacing personally identifiable references todialog network members with pseudonymous dialog network references(“PDNRs”), each PDNR being uniquely associated with a dialog networkmember at least within a given dialog. In step S2905, responsive dialogcontent is received by system 2310, containing one or more pseudonymousreferences to a dialog network member. In step S2910, system 2310receives a request for dialog content that includes the responsereceived in step S2905. A determination is made by system 2310 as towhether the request should be responded to with a dialog network memberview, or an anonymized view (step S2915). If system 2310 determines torespond with an anonymized view, the requested content is published,including the response with references to system-generated monikers,substantially as received in step S2905. If system 2310 determines torespond with a dialog network member view, each PDNR is replaced withthe dialog network member personally identifiable information for whichthe PDNR was previously substituted (step S2925). The resulting view ofthe response is then published (step S2930).

User Interface Mechanism For Conveying Variable Privacy Views

While above-described systems and methods may be effective in enablingvariable privacy within communication platforms, in some environments,it may be important to ensure that users readily understand how contentwill be displayed to various viewers. Improving user understanding ofhow variable privacy features are applied may help promote user adoptionand improve user satisfaction.

To that end, dialog rendering and user interface mechanisms may beprovided to allow users to interactively toggle between public andprivate views of a given dialog. Such mechanisms permit users to readilyappreciate how a public dialog view will be modified to preserveprivacy, including how dialog participant pseudonyms and any redactionswill be applied. Users can therefore confirm that no undesiredinformation will be conveyed outside the dialog network, while alsoverifying whether the dialog substantive content is still comprehensibleand unambiguous as conveyed in a public view.

FIGS. 32 and 33 illustrate an exemplary embodiment of a user interfaceproviding a dialog view toggle mechanism that may be rendered on adisplay of a personal electronic device, such as on smart phone 124interacting with server 100, for a user that is a member of a dialognetwork for the dialog being viewed. Toggle 3210 enables a user tochange the dialog view rendered in display area 3200 between an “InvitedFriend View” (i.e. a private view that would be available for renderingonly to members of a dialog network for the dialog being viewed) and a“Public View” (i.e. a view that would be available for rendering toindividuals, regardless of whether they are dialog network members). TheInvited Friend View is rendered upon selection of toggle region 3212,while the Public View is rendered upon selection of toggle region 2314.The Public View rendered upon selection of toggle region 3214 may,depending on dialog settings, be a public-private view, in whichpersonally-identifying information associated with dialog networkmembers is withheld, or a purely public view, in which dialog networkmember information is not withheld. While private, public-private andpublic concepts of variable privacy are discussed elsewhere herein, theuser interface mechanisms of FIGS. 32 and 33 enable users to readilycomprehend the privacy implications associated with a particular dialog.

In FIG. 32, toggle region 3212 has been selected, thereby rendering an“Invited Friend View” of an associated dialog within dialog displayregion 3200. The Invited Friend View includes opening dialog content3230, rendered proximate indicium 3220 indicative of the individual whocontributed dialog content 3230. Reply region 3235 can be selected tocontribute a response to message 3230. Because FIG. 32 illustrates anInvited Friend View, reply region 3235 includes an explanatory reference3236 indicative of the author of content to whom a reply would bedirected. Dialog display region 3200 further includes other contentcontributions 3250 and 3270 within the dialog, proximatecontributor-identifying indicia 3240 and 3260, respectively. Thus,dialog region 3200 provides a dialog view available only to dialognetwork members, which includes personally-identifying informationassociated with each content contribution.

In FIG. 33, toggle region 3214 has been selected, thereby rendering a“Public View” of an associated dialog within dialog display region 3200.The Public View includes dialog content items 3330, 3350 and 3370, eachof which contains the same substantive content as Invited Friends Viewdialog content items 3230, 3250 and 3270, respectively. (In the exampleof FIG. 33, no content has been redacted by a user or automaticallyreplaced by pseudonymous indicia, as described elsewhere herein.)However, personally-identifying dialog opener indicium 3220 (asystem-generated identifier rather than user-originated substantivecontent) has been replaced with pseudonymous indicium 3320, therebypreserving the privacy of the opening user relative to viewers who arenot members of the dialog network. Other system-generatedpersonally-identifying dialog member references in the Invited FriendsView of FIG. 32 are replaced similarly. For example,personally-identifying dialog contributor indicia 3240 and 3260 arereplaced by pseudonymous contributor indicia 3340 and 3360,respectively. Personally-identifying reply region reference 3236 isreplaced by pseudonymous reference 3336. In the embodiment of FIG. 33,information that is rendered differently between the Invited Friends andPublic views is highlighted visually, such as by local application of acontrasting color background (e.g. yellow highlighting on a lightneutral background).

In sum, the user interface illustrated in FIGS. 32 and 33 implementsseveral features to readily convey to users, information concerning howprivate information will be viewed by various other users. The userinterface provides a user with direct control over view rendering, suchas via toggle 3210, so that the user can readily switch back and forthbetween various views and compare information rendering. Privateinformation is replaced with anonymous or pseudonymous references, withthe replacements being visually highlighted when rendering the PublicView. These operations, individually and in combination, may be used toeffectively convey a communication platform's privacy preservingmeasures to users.

Variable Privacy Using Privacy Attributes

In the context of social dialog or content sharing, there are a numberof different ways that a participant's personal information may beconveyed. In addition to disclosures through system operation, such aspublication of a user name or personal profile link proximate aparticular content contribution and/or a dialog generally, usersthemselves may reveal private information about themselves or otherusers, intentionally or not, within an opening content contributionand/or during the course of a dialog. Therefore, in some embodiments, itmay be desirable to provide users with mechanisms for fine control overvariable privacy functions, which may be applied by various combinationsof manual user actions and/or system-driven automation to managedisclosure of private content and information. Different embodiments mayapply privacy-preserving operations to different types of information,such as one or more of: information that may directly identify a personas perceived by observers (e.g. name, username, image); information thatmay re-identify an individual when perceived by others in combinationwith other information (e.g. job title, employer); information that maybe processed by a data analysis system to re-identify an individual; andany other information directly or indirectly associated with a user.Various embodiments may provide users with either, or both, knowledgeof, and control over, how one or more of these types of information isdisclosed to others. It may also be desirable to provide certain userwith cues to facilitate user comprehension of variable privacyoperation, thereby increasing user confidence in, and understanding of,how private content will be disclosed (or not disclosed) to others. Somesuch mechanisms are described hereinabove. Other embodiments ofprivacy-preserving mechanisms are described hereinbelow.

One such embodiment is illustrated in FIG. 39 et seq. FIG. 39 is a userinterface that may be rendered on user devices, in order for users tospecify privacy attributes, such as may be stored in user profile 3000(FIG. 30), and subsequently used (e.g. by a network-connectedcommunication platform and/or local user device) in order to replacereferences to private user information with anonymized references.Anonymized references may include redaction indicators, pseudonymouscontent substitution, content obfuscation or other variable-privacyfunctions.

For example, for text-based content, a user may specify one or morenicknames. In applications facilitating social discourse, individualsmay commonly refer to one another by nicknames, in lieu of anindividual's full or proper name. Therefore, user profile mechanism 3900includes multiple profile tabs 3905, including bio tab 3910. Bio tab3910 includes text entry field 3915, which may be used by a user tospecify nicknames by which the user may be referred, as privacyattributes for application of variable privacy functions. Theillustrated user interface displays explanatory popover pane 3920 when,e.g., hovering over field 3915 and/or an associated tooltip icon.Content entered into nickname field 3915 on a user device (e.g. device120, 122 or 124) may be transmitted to server 100 via network 110 andstored within database 104, and in particular, user profile record 3000.FIG. 40 illustrates user profile mechanism 3900, with exemplary contentitems “Markie” and “Marky” entered as nicknames for a user associatedwith profile 3900.

Nicknames associated with a dialog participant may subsequently beutilized by a dialog entry mechanism to automatically recognize dialogcontent references to a user's nickname. Recognized dialog references toprivate information such as nicknames may be then replaced withanonymous references, either automatically or upon prompting of theuser.

FIG. 41 illustrates such a dialog entry mechanism, implemented as a webapplication with PC 120 interacting with server 100, including webserver 106. Web page 4100 is rendered on PC 120 (e.g. within a webbrowser application) to facilitate a response to question 4110, asked byan opener designated by user indicium 4115. Text entry field 4120 can beused for entry of a dialog content contribution in response to question4115. Upon selection of a SUBMIT indicium (not shown) proximate field4120, content entered into field 4120 is transmitted by PC 120 to server100. Application logic 102 compares the content of field 4120 withnicknames associated with user profiles of dialog network members (e.g.via entry into the profile form of FIG. 39). In the event that dialogcontribution content matches a nickname associated with a dialog networkmember, the dialog entry mechanism of FIG. 41 prompts the user forclarification as to whether the matching text is referring to the dialognetwork member with whom the text is associated as a nickname.Specifically, server 100 transmits code causing PC 120 to render modaldialog box 4125 on web page 4100, extracting the relevant reference fromthe dialog contribution text and querying whether the reference isintended to refer to the dialog network member having specified anassociated nickname. The dialog contributor can then select YES button4130 or NO button 4135, which selection is conveyed to server 100 andutilized to determine whether to apply a variable privacy mechanism tothe relevant reference, such as redaction or substitution with apseudonymous indicium, as described elsewhere herein.

By requesting confirmation of the user reference, rather thanautomatically applying a redaction or substitution, the platform mayavoid problems arising from words having multiple meanings. For example,a sentence beginning with the word “Mark” may be referring to a userhaving a first name of “Mark”, or it may be a use of theEnglish-language verb “mark”. In the latter case, automated substitutionof “Friend n” for the word “Mark” may render the dialog contentconfusing or meaningless. Even worse, such an erroneous substitution mayactually serve to compromise user privacy, as the context of thesentence may make it clear that the verb “mark” was replaced with a“Friend n” reference, thereby indirectly revealing that one of thedialog network members is named “Mark”. Thus, user confirmation ofwording substitutions can be beneficial.

While the embodiment of FIG. 41 provides for identification of privacywords by a dialog content entry form upon submission of dialog contentto server 100, it is contemplated and understood that in otherembodiments, the timing of privacy word identification may differ. Forexample, in some embodiments, server 100 may accept and store dialogcontent as written, without marking privacy words; when later viewed,server 100 may identify privacy words and, depending on the identity ofthe viewer, replace privacy words with redaction indicators and/orpseudonymous substitutions automatically. In other embodiments, thedialog content entry form may operate to evaluate dialog content textentered in substantially real time, as the content is entered, toidentify privacy words and flag them for redaction or substitution whilea user is entering the dialog content (either automatically, or byprompting the user during text entry).

Once a portion of a dialog contribution is identified as a reference toa dialog network member, server 100 may designate the dialog portion, asstored in database 106, as PII eligible for substitution in variableprivacy views of the dialog. Server 100 may then make available views ofthe dialog having variable privacy, based on factors described elsewhereherein (e.g. the identity of the viewer and their relationship to thedialog as a member or guest, or the platform from which the contributionis viewed). In public views, server 100 may render dialog content withpseudonymous substitutions in place of dialog network member names ornicknames. Thus, dialog network member names and nicknames may bereplaced with pseudonymous indicia such as “Friend n”, with n being anumeric reference that is incremented each time a different word sharinga common type is used in a given dialog. For example, all references ina dialog to a first dialog network member may be substituted with apseudonymous indicium “Friend 1”; all references in a dialog to a seconddialog network member may be substituted with a pseudonymous indicium“Friend 2”; all references in a dialog to a third dialog network membermay be substituted with a pseudonymous indicium “Friend 3”, et seq. Thepseudonymous dialog member indicia are preferably applied consistentlyacross a particular dialog, such that, e.g., references to a particularuser will be consistently substituted with “Friend 1” each time thatuser is referenced in a particular dialog, regardless of the individualsubmitting the dialog contribution.

In embodiments involving social networking functionality, qualifyingsocial network relationships may also be defined in order to applypseudonymous substitutions and visual obfuscation to the content of auser contribution. For example, a communications platform having socialnetworking functionality (or integrating with social networkfunctionality of another system) may operate to identify andautomatically apply pseudonymous substitutions to names of individualshaving a qualifying relationship with the contributing user (e.g. all ofthe user's first-degree social network connections, or some subset of auser's social networking connections such as those assigned to a Familygroup or a Friends group). In various contexts and applications, socialnetwork relationships may be used in addition to or in lieu of dialognetwork membership or other criteria for identifying portions of contentcontributions to be removed from a public or untrusted content view.

One challenge to applying social networking relationships as criteriafor anonymity, is that many social networking applications provide alarge number of groups, forums or contexts within which a user maycontribute content. A user may, for example, participate in a relativelyobscure or limited-membership group that includes no other individualswith whom the user has a “friend” or other qualifying social networkingrelationship. In embodiments, it may be feasible for a user to preventthe automatic dissemination or notification of content contributions tothe user's friends, e.g. by removing the post from the contributinguser's personal content feed and directing the post to a forum having noqualified trusted users. In such cases, the user's qualifying socialnetwork relationships would have to manually locate the user's contentcontribution on their own. Thus, in this scenario, in a large socialnetworking environment, it may be unlikely that a user's qualifiedsocial network relationships will ever see such content. The content maytherefore be effectively published on a purely anonymous basis. Suchanonymity may lead to lack of accountability and thus lower qualitycontent. Therefore, for social networking applications, it may bedesirable to restrict the application of anonymity functions such ascontent redactions to content contributions having some threshold levelof exposure to trusted individuals (e.g. automatic notification to someminimum number of individuals within the contributor's trusted group),thereby maintaining some desired level of contributor accountability forposted content.

In some embodiments, user interface cues may be provided in dialognetwork member views to clearly convey the nature of privacysubstitutions or redactions made in public views. FIG. 42 illustrates aweb application user interface implementing such a user cue. Web page4200, rendered on PC 120, includes dialog content contribution 4205.Text content 4210 has been identified as a reference to a dialog networkmember, and therefore rendered as highlighted in a contrasting tone,thereby providing a first cue to a viewer that variable privacytreatment is applied to the highlighted text content. Additionally,popup pane 4215 provides further explanation of the variable privacytreatment applied to the associated text; in the embodiments of FIG. 42,popup pane 4215 indicates that the highlighted text “Mark” is beinganonymized, i.e. replaced by the pseudonymous indicium “Friend 1” inrenderings of dialog content 4205 that are made available to publicviewers.

It may also be desirable to permit users to apply variable privacytreatment to dialog content contributed by themselves or others indialogs for which they are dialog network members, even after the dialogcontent has been contributed to the dialog. Mechanisms for applyingvariable privacy treatment in this situation may help address, e.g.,situations in which another dialog network member failed (inadvertentlyor not) to apply variable privacy treatment to a dialog network memberreference, or where a user had not configured their profile to includeprivacy terms at the time a dialog contribution is submitted, or where adialog member is added and the added member's profile includes privacyattributes appearing in the prior dialog content.

FIG. 43 illustrates an embodiment rendering a dialog to a dialog networkmember, incorporating proactive user cues to query for privacy status ofcontent corresponding to terms associated with the viewer's profile. Webpage 4300 is rendered by, e.g., PC 120, in response to a query to server100 for display of dialog content 4305. Upon receiving the query fordisplay of dialog content 4305, the text within dialog content 4305 iscompared to privacy terms associated with the profile of the requestinguser (e.g. name, nick names, employer, or other designated privacyterms). Upon identifying the presence of text content 4310 correspondingto the viewer's profile privacy terms but not previously identified as aprivacy term, the corresponding content 4310 is rendered as highlightedin a contrasting tone, thereby drawing the viewer's attention to thecontent. Additionally, popup pane 4315 provides further explanation thatcontent 4310 matches a privacy term associated with the viewing user,and queries whether the viewer would like to apply a variable privacytreatment to the content. The viewer may then select button 4320 toanonymize the content (e.g. replace the nickname with a pseudonymous“Friend n” reference in public views of the dialog content), or button4325 to leave the text content unaltered in public views of the dialogcontent.

In addition to replacing nicknames with anonymous references, such asredaction references or pseudonymous indicators, other types of termsand other privacy attributes may be configured within profile 3000 foranonymization in variable privacy views. With the profile user interfaceof FIG. 39, users may select Privacy Words tab 3925 in order to render auser interface having one or more text entry fields in which a user mayspecify terms for classification as privacy words. Such terms aresubsequently associated with the user and stored in user profile 3000.

Various types of privacy words may be specified. Like nick name field3915, some privacy words may be associated with a reference type, suchas company name, person name (spouse, child, etc.), email address, orphone number. Some privacy words may be useful for preserving privacy ofindividuals about whom discussion is made (e.g. a user's spouse orchildren), in addition to the user contributing content. Like nicknamefield 3915, privacy words associated with a specific reference type maythen be anonymized in public views via a s that is indicative of thenature of the masked content, and applied consistently throughout adialog rendering. For example, references to companies, such as a user'scurrent or former employer, may be replaced in public dialog views witha “Company n” pseudonymous substitution. References to a person may bereplaced with a “Person n” pseudonymous substitution, or if the personis a dialog network member, with a “Friend n” pseudonymous substitution.Therefore, when a user specifies a privacy word to be stored inconnection with their profile, it may be desirable to query the user tocategorize the privacy word (e.g. as a company, person, email address,phone number, or other), thereby enabling pseudonymous substitutions incontent contribution views rendered to untrusted recipients.

Alternatively, in some circumstances it may be desirable to substituteprivacy words with redaction indicators, which may or may not provideindicia of the type of reference redacted. For example, public views ofa dialog containing a user's email address may be rendered with apseudonymous substitution of “Email address n”, a content-specificredaction indicator of “[EMAIL ADDRESS REMOVED]”, or a content-neutralredaction indicator such as “[PRIVATE CONTENT REMOVED]”.

Privacy words tab 3925 may also permit free text entry of terms that auser deems to be personally identifying information. Such terms can alsobe stored within profile 3000 (e.g. terms field 3015) and are typicallysubstituted with content-neutral redaction indicators in public dialogviews.

FIGS. 45A-D illustrate an exemplary embodiment of a sequence of userinteractions for specifying profile-associated privacy words on a mobiledevice. FIG. 45A provides a mechanism 4500 to specify settings for auser's profile. “Privacy Words” option 4505 may be selected to access aprivacy words control interface 4510 (FIG. 45B). Indicium 4515 may beselected to add a new privacy word, in response to which the user isprovided with a privacy word entry mechanism 4520 (FIG. 45C). A modal4525 is presented, via which a user may enter a privacy word in field4530, and select a corresponding classification of the privacy word inpicker field 4535. As described above, the classification specified inpicker field 4535 may subsequently be utilized to identify apseudonymous substitution for the privacy word in untrusted contentviews. Upon selection of commit button 4540, the user's privacyattributes stored within user profile 3000 are updated to reflect theadded Privacy Word, with the updated Privacy Word List conveyed to theclient via display 4545 (FIG. 45D).

As with nicknames defined in field 3915, dialog content contributionssubmitted by a user (e.g. via form 4100) to server 100 may be searched(e.g. operation of via application logic 102) for privacy words, or anyother privacy attributes, defined in a profile 3000 associated with thecontent contributor, and optionally other dialog network members. Insome embodiments, where communications are structured as a dialogamongst a defined set of dialog network members with a variable privacyview made available to individuals outside the dialog network,application logic 102 may operate to pool a set of privacy attributesfrom all dialog network members into an aggregate set of privacyattributes. The pooled set of privacy attributes may then be appliedwhen dialog network members submit new content contributions, or querythe system for content contributions, via various combinations ofautomatic and/or manual redaction, substitution or obfuscation.

Upon identification of potentially-applicable privacy attributes, suchas privacy words, during a process of content contribution, modaldialogs such as modal 4125 may be rendered on the end user interface, toeffect contributor confirmation of potential content anonymizations.Similarly, when a dialog network member views a dialog, a user interfacemay be rendered with anonymization queries for other types of privacywords defined in the viewer's profile 3000, analogous to the nick namequery illustrated in FIG. 43.

While it may be desirable, in some circumstances, for users to exercisecontrol over identification of personal content for removal from publicviews of a content contribution, in other circumstances, it may bedesirable to allow for automated identification of personal content (orcontent deemed likely to be personal). Automated identification ofcontent portions may be utilized to query a user for confirmation of thepersonal nature of the content portion, or it may be appliedautomatically to remove the identified content portions from publicviews without user interaction.

In some embodiments, automated content analysis mechanisms such asnatural language processing and/or machine learning components may beapplied to user contributions, in order to identify user content thatshould be subject to redaction, pseudonymous substitution, or otherprivacy-preserving treatment. For example, upon submission of a usercontent contribution containing text, application logic 102 may apply anatural language processing (“NLP”) component to the submitted text. TheNLP component may be, e.g., implemented directly by application logic102 or implemented via call to an external network-connected service,such as the Google Cloud Natural Language API. The NLP component maythen classify (e.g. by applying tags to) elements of the submitted text.The tags that may be utilized in the application of variable privacytreatment. NLP tags may include attributes such as identifying a textelement as an organization, a location, a person, an event, a phonenumber, an address, or the like. In some embodiments, NLP tags may beused to automatically classify content as personal information and applyredactions or pseudonymous substitutions in variable privacy views tountrusted viewers. (E.g., automatically replace telephone numbers with“[PHONE NUMBER]”.) In some embodiments, NLP tags may be used to selectportions of text for which the user should be queried about privacyattributes (similarly to the query UI of FIG. 43). If the user respondspositively to applying variable privacy treatment to a text elementflagged based on its NLP tags, that text element may be automaticallyadded to the user's profile privacy words, or the user may be furtherqueried as to whether the text element should be added as a profileprivacy word. User decisions on automated content classifications mayalso be utilized as feedback to automated content classificationmechanisms incorporating supervised machine learning components.

Automated content analysis and privacy classification mechanisms mayadditionally or alternatively be applied to substantive content atvarious other times throughout the process of creating and viewing acontent contribution. For example, in some embodiments, dialogcontribution text entered into field 4120 may be compared to privacywords pertinent to the dialog in real-time or quasi-real time, as thetext is entered, with dialog-pertinent privacy words being highlightedwith a contrasting tone or appearance to notify the dialog contributorthat a word is or may be a privacy word. The highlighted word may thenbe clicked, hovered-over or otherwise selected to initiate aconfirmation dialog or modal, such as query 4125 and 4315.

As with nick names, it may be important to permit user confirmation ofprivacy treatment for other types of privacy words in a dialog contentcontribution. For example, a dialog may involve individuals having“Microsoft” as their employer, but may also refer generically forpopular products such as Microsoft Word or Microsoft Windows. Enablingusers to apply variable privacy treatment to individually-associatedMicrosoft references, without redacting all references to popularMicrosoft products, permits dialog members to achieve privacypreservation objectives without significantly sacrificing dialogcomprehension from public views.

Insofar as privacy words are user-configurable and/or personalized for auser, it may be desirable to permit users to delete privacy words fromtheir profile 3000, and/or whitelist terms that are identified as beingsubject to variable privacy treatment via automated mechanisms.Preferably, once server 100 categorizes a portion of dialog content as aprivacy word, the privacy word designation will be stored with thedialog content and be applied to various views of that content unlessand until a specific variable privacy designation is modified by apermitted user. Therefore, deletion of a variable privacy word from auser's profile 3000 would not retroactively remove variable privacytreatment from previously-submitted dialog content corresponding to thedeleted privacy word. This ensures that dialog members' understanding ofthe scope of dissemination for a particular portion of dialog ispreserved despite subsequent profile changes.

With application of multiple types of pseudonymous substitutions, it maybe desirable for server 100 to implement additional reverseanonymization mechanisms, analogous to reverse anonymization of dialognetwork member references described above, but applied to one or moreother types of pseudonymous substitutions. For example, references tomultiple employers of dialog network members may be presented in apublic view of the dialog as pseudonymous references to “Company 1”,“Company 2”, etc. A guest user, accessing a public dialog view via auser device such as PC 120, tablet 122 or smart phone 124, may submit acontent contribution in which the guest user includes one or more of thepseudonymous references, such as Company 1 or Company 2, within theguest dialog contribution's substantive content. Upon receipt of theguest contribution, server 100 may search the contribution for contentmatching pseudonymous references associated with the dialog. Server 100may then mark the content, as stored in database 106, with correlationsbetween pseudonymous references and their associate private content.When the dialog is subsequently rendered to dialog network members,pseudonymous references in the guest content contributions may bereversed, with the actual, private content items being displayed. Forexample, a guest reference to “Company 1” may be reversed for dialognetwork members, so that in the private dialog view, the pseudonymousreference is replaced with its associated dialog network member employername.

In order to allay any dialog network member concerns aboutconfidentiality of private information, the display of reversedpseudonymous references in a private dialog view may be accompanied byhighlighting or other visual cues, as well as messages to a view (suchas upon selection or hover-over) indicating the nature of the reversedreference. For example, a popover message explaining reverseanonymization of a dialog network member name may indicate, “The guestsaw <Invited Friend First Name> as ‘Friend 3’. The system is showing you<Invited Friend First Name>'s name for your readability, as an invitedfriend of the conversation.” Likewise, a popover message explainingreverse anonymization of a dialog network member affiliated company mayindicate, “The guest saw <Company Name> as ‘Company 1’. The system isshowing you <Company Name> for your readability, as an invited friend ofthe conversation.”

It may also be desirable to implement a reverse anonymization mechanismfor dialog references to guest users. For example, a conversation membermay wish to reply to a dialog content contribution from a guest userdisplayed as “Guest 3”. Accordingly, the dialog member contribution mayinclude a responsive reference to “Guest 3”. Upon submission of a dialogcontent contribution to server 100, application logic 102 may operate tosearch the dialog content contribution for pseudonymous references toguest users, and mark any such references discovered with an associationto the corresponding guest user's account. The associated dialog contentmay then be variably displayed as the guest user pseudonymous reference(e.g. “Guest 3”) or a direct user reference (e.g. the guest user's firstname, or an appropriate pronoun), depending on the identity of theindividual for whom the dialog is subsequently rendered. For example,when server 100 publishes a dialog view to a guest user mentioned byanother user as a pseudonymous reference, the guest user's dialog viewmay include a personal reference, such as “Guest 3 (You)” in both thebody of messages, as well as the byline of that user's posts. Thepersonal reference may be displayed as highlighted or with anothervisual cue to notify the viewer that a variable privacy mechanism hasbeen applied. Upon selecting or hovering over the personal reference, afurther explanatory message may be displayed (e.g. via popover messagebox), such as “<Opener or Friend n> saw you as ‘Guest 3’. The system isshowing ‘You’ here for your readability.”

The same principals and mechanisms applied to text content inembodiments of, e.g., FIGS. 49-43, may also be applied to contentcontributions in which the substantive content consists of or containsimages, such as photos, video, and scanned documents. In embodimentspermitting image-based content contributions, privacy attributes thatmay be subject to variable privacy views may include characteristics ofimage content. Image substantive content may be characterized forprivacy treatment in a variety of ways. For example, application logic102 may apply an image classification component to image-based contentcontributions. Such an image classification component could beimplemented directly by application logic 102 or via call to an imageclassification service implemented externally to server 100, such as theGoogle Cloud Vision API. In either case, image classification may yieldattributes that can be used to control variable privacy treatment. Forexample, in some embodiments, image classification may include anevaluation for the presence of human faces. If human faces are deemedpresent in the image, variable privacy treatment may be triggered.

Variable privacy treatments that may be triggered based on imageclassification and analysis include, without limitation: (a) promptingthe user to manually evaluate and redact any image having certainattributes (e.g. the presence of human faces, the presence of text, thepresence of text that yields user privacy terms upon processing by anoptical character recognition module); or (b) automatically redactingimage areas associated with predetermined types of content (e.g. humanfaces, text). In yet other embodiments, it may be desirable to queryusers for redactions to every image submitted, rather than relying onautomated image classification.

In some embodiments, a privacy-enabling system may integrate with auser-specific image analysis profile to facilitate greater automation ofimage redaction for privacy. For example, some users may utilize photostorage services that can be trained to recognize individuals commonlyappearing in the user's photos. Examples of such systems include GooglePhotos and Apple Photos, in which common faces within a library ofphotos associated with a user are grouped and presented to the user forlabeling. Such systems may utilize such image recognition capabilitiesfor search and classification. However, the same facial recognition andimage analysis functions may be applied to automate application ofprivacy-preserving functions, such as redaction via graphic overlay orapplication of a blur filter, within a communication platform. Suchimage recognition and classification services may permit users tospecify profile-specific image attributes for redactions (such as facesof specific individuals or classes of individuals, e.g. family members),analogous to profile-based nickname specification in the embodiment ofFIG. 40. In various embodiments, a communications platform may integratewith a third party photo library for access to training images, or auser may upload image content (e.g. photos of family members, friendsand/or other things with which the user may be personally associated)directly to the communications platform for training and analysis.

FIG. 44 illustrates an exemplary process that may be used for applying avariable-privacy function to an image-containing content contributionwithin an online social media or communication platform. In step S4400,a user configures profile settings that may include one or more of (a)general image classifications for which the user would like to bequeried for manual privacy designation (e.g. “people”, “houses”,“children”); (b) image general content types for which the user desiresautomated application of privacy designations (e.g. “human faces”,“text”, “mailing addresses”); and (c) specification of user-specificimage tags for a classification mechanism trained by the user (e.g.“Mom”, “Uncle Bob”, “Spouse”, “Children”). In step S4405, a user submitsa content contribution that includes an image, to server 100. In stepS4410, server 100 queries a general image classification API (such asthe Google Cloud Vision API) for analysis of the image content in theuser's content contribution. In step S4415, server 100 queries auser-trained image classification API for identification of user-taggedimage content. (The image classification mechanism of step S4415 may bethe same as the general classification mechanism of step S4410, or adifferent one.) In step S4420, server 100 (i.e. application logic 102)determines whether any areas of the submitted image content correspondto user tags designated as privacy attributes in step S4400. If so,privacy attributes are automatically applied to corresponding portionsof the image (step S4425) (e.g., portions of the submitted imagecorresponding to people configured for privacy in the user's profile,are flagged for application of a variable privacy blurring or otherobfuscation function when the image is rendered to individuals outsideof a dialog network, or otherwise untrusted relative to the specificcontent contribution). In step S4430, server 100 compares query resultsfrom step S4410 with content types configured for automated privacytreatment in the user's profile. If such content is present, in stepS4435, application logic 102 automatically applies privacy attributes tocorresponding portions of image content (e.g. automated blurring of allhuman faces). In step S4440, application logic 102 determines whether toquery the user for manual review of how privacy attributes are appliedto the submitted image. If so, the user is provided with a preview ofthe image, with designations of how privacy attributes will be appliedto untrusted viewers, and tools to add, remove or modify privacyattributes (step S4445). In some embodiments, it may be desirable toflag every image for manual review (either as a system rule, or as auser-configurable preference). In some embodiments, images may beflagged for manual review based on analysis of image content, such asimage classifications derived in step S4410 and/or S4415. In step S4450,the image-containing content contribution is activated within the hostsystem (e.g. is published on a social media platform, communicated tomembers of an associated dialog, and/or made available forprivacy-enabled public viewing).

In some embodiments, privacy-preserving functions described above withrespect to image content generally, may be applied using mechanismsparticularly well-suited to video-based user content contributions. Forexample, video content analysis mechanisms (such as Google Cloud VideoIntelligence, automated face blurring algorithms, filters applyinggraphic overlays on predetermined or dynamically determined portions ofvideo content, and/or other systems for video analysis, classificationand modification) may be applied to user content contributionscontaining video. In some embodiments, image content analysis mechanismsdescribed herein for use with image content (e.g. facial recognitioncomponents for identifying family members in photos), may also beapplied to video content, such as by periodic application of imagecontent analysis mechanisms to frames within video content. Privacyattributes may then be applied to video contributions automatically,and/or manually specified, thereby enabling application of analogousvariable privacy views of content, regardless of whether the contentcontains text, image, video or various combinations thereof.

For all types of content contributions, machine learning andpersonalization components may be beneficially applied to improve theprecision and accuracy of automated privacy classification. For example,criteria described elsewhere herein as useful for automated privacyclassification, may be applied as inputs to a supervised learningclassification algorithm, potentially in combination with otherattributes related to the content contribution and/or any dialogcontaining it, and personalized across an individual user, a dialoggroup, a cohort of users, or all users. User decisions on whether toapply or overturn an automated privacy classification may be utilized asfeedback to the supervised learning algorithm. Thus, for example, if auser typically applies a blur effect to untrusted views of human facesin image content, but the user repeatedly elects not to apply a blureffect to images having numerous faces in a crowd, the system may learnto weight the face image portion size heavily, such that it forgoesvariable privacy treatment of human faces when they fall below athreshold size.

By allowing users to configure and apply content anonymization tools,such as redactions, pseudonymous substitutions and other obfuscations,using various combinations of manual and automated mechanisms, acommunication platform can facilitate a common dialog or contentexchange that can be rendered in multiple views with varying privacyrestrictions, while still being both easily understandable andunburdensome for dialog participants or other trusted viewers.

Determining Dialog View Using Social Relationships

Many embodiments described hereinabove utilize a viewer's status as aninvited dialog network member to determine which of multiple views areapplied when rendering a dialog. However, in other embodiments, variableprivacy views of a dialog may be determined by other factors. Forexample, trusted viewers who see a “Friend View” (such as that of FIG.32) and untrusted viewers who see a “Public View” (such as that of FIG.33) may be determined by factors such as social relationships, such asmutual address book connections or social networking connections betweenthe content contributor and viewer, rather than (or in addition to)conversation groups associated with each conversation. Such variableprivacy mechanisms may be particularly useful, for example, so thatcontent contributors can control dissemination of private information byapplying variable privacy functions in embodiments for which openingcontent contributions are not directed to an explicit group of targetresponders, but rather are made generally available to a universe ofindividuals having varying relationships with the content contributor.Examples of environments in which social relationships may be useful inapplying a variety of variable privacy mechanisms include, withoutlimitation, social networking platforms, messaging platforms, onlineforums or other online communities.

Users of a computer-implemented communication platform may developsocial relationships with one another in various ways. For example,traditional two-way social networking connections may be establishedbetween users, in which each user must consent to establishment of aconnection. In other embodiments, one-way social networking connectionsmay established between users, such as a “follow” relationship in whicha user may connect with another user unilaterally.

Yet another mechanism for establishing and maintaining socialconnections between users of a communication platform is an address bookanalog. In some embodiments, each user may maintain an “address book”with a listing of other individuals with whom the user desires to have asocial connection. The address book listing need not includeindividuals' personal contact information directly, but rather mayinclude system-specific user IDs, or system-specific links to otherusers' accounts.

User connections maintained with such a user address book may beestablished in a number of different ways. In some embodiments,connections may be established implicitly by identifying an individualas a target responder in a dialog. FIG. 34 illustrates such a processfor establishing social connections amongst communication system users.In step S3400, an opener initiates a dialog and invites one or moretarget responders, as described elsewhere herein. In step S3410, invitedtarget responders are automatically added to the opening user's addressbook by the communication system, if they are not already includedtherein. In step S3420, for each target responder, the communicationsystem determines whether a target responder has acknowledged the dialog(e.g., clicked on a link within a notification message directed to thetarget responder, or otherwise viewed the dialog). If not, the systemawaits acknowledgement. If so, the opening user is added to the addressbook of the responding target responder (step S3430).

An explicit invitation mechanism may also be used for establishingsocial relationships between individuals, separate and apart from aparticular dialog. FIG. 35 illustrates an exemplary embodiment. Usershaving one or more electronic contact addresses for other individualsmay enter or select them using, e.g., a user device 120, 122 or 124interacting with server 100 via network 110 (step S3500). In step S3510,server 100 adds the addresses entered in step S3500 to an address bookassociated with the user, and stored within database 104. In step S3520,server 100 transmits connection invitations to contact addressesspecified in step S3500, e.g. via transmission of email, SMS or appnotifications from messaging server 108. In step S3530, server 100evaluates whether connection invitation recipients have accepted theconnection invitations sent in step S3520. If so, the invitation senderis added to an address book associated with the accepting invitationrecipient (step S3540). If not, the invitation sender is not added to anaddress book associated with the invitation recipient (step S3550).

In some embodiments, individuals may also be able to establish socialconnections with other individuals that they meet in conversation, e.g.via user interface mechanisms provided directly from a dialog view. Itis in viewing other peoples' contributions to dialogs that users mayidentify individuals with whom they would like to have furtherinteractions. For example, users may observe others providing contentthat appears interesting or of high value. Thus, it may be beneficial toallow such users to connect with others directly from a view of suchcontent contributions. For example, in some embodiments, a user viewingthe dialog view of FIG. 33 may select a user indicia 3320, 3340 or 3360,in order to initiate a connection request to the associated individual.Such a connection request may be implemented similarly to steps S3510 toS3550 in FIG. 35.

In some embodiments, a user may wish to offer up approval for anotherindividual to open conversations with them by, for example, clicking alink on the other individual's profile or user indicium within aconversation. There is no need for the other individual to reciprocate,but if they want to, they can offer their contact info (or a figurativesocial connection) in exchange. This might happen where someone ishighly impressed with someone else in a conversation and would be happyto consult with them in the future, even though that other person mightbe a e.g. an important figure or influencer who is very guarded aboutwho they share their info with to avoid getting overrun by conversationrequests.

Conversational variable privacy may also be controlled by socialconnections established using diverse systems, such as social networkingconnections, whether implemented locally by server 100 or establishedvia a separate social networking system (e.g. social network 2540 inFIG. 25). Server 100 may access social graphs maintained by users ofserver 100, in associated accounts on social network 2540, for purposesof determining whether users of the communication system implemented byserver 100 have social connections with one another.

Social connections established via mechanisms such as those describedabove, may then be utilized in order to control dialog view. Rather thanlimiting private views only to individuals invited to participate in aparticular dialog, the private view may be made available to anyoneviewing a conversation with a trusted relationship to the contentcontributor and/or dialog network members, such as anyone who has asocial connection with the author of a post or content contributionwithin the conversation. If a viewer is not connected with such acontent contributor in a particular conversation, that conversation isrendered with an untrusted public view, having certain personalinformation removed, as described elsewhere hereinabove.

FIG. 36 illustrates a process for determining a dialog view to berendered to a content viewer, based on both the viewer's status as aninvited dialog participant, as well as the viewer's social connectionswith dialog participants. In step S3600, server 100 receives a requestto view dialog content. In step S3610, server 100 determines whether therequester is a member of the dialog network for the requested dialog. Ifso, server 100 responds with a private view of the dialog, includingidentifying information associated with dialog contributors (stepS3620). If not, server 100 determines whether the requester has a socialconnection with one or more users who are dialog contributors (stepS3630). If so, server 100 responds with a private view of the dialog,including identifying information associated with dialog contributors(step S3620). If not, server 100 responds by sending a public dialogview, which excludes personally identifying information associated withdialog contributors (step S3640).

Various criteria may be utilized in step S3630 for determining whether auser requesting a dialog view has a qualifying social connection withdialog contributors. In some embodiments, in which users develop andmaintain address books as described above, a social connection may bedeemed to satisfy the determination of step S3630 if the dialog vieweris within the address book of any dialog content contributor (i.e. aone-way social connection criteria). In some embodiments, a socialconnection may be deemed to satisfy the determination of step S3630 onlyif the dialog viewer is within the address book of a dialog contentcontributor, and the dialog content contributor is within the addressbook of the dialog viewer (i.e. a two-way social connection criteria).In some embodiments, the social connection evaluation of step S3630 maybe performed based on a viewer's connection with any dialog targetresponder, regardless of whether the target responder has contributedcontent to the dialog. In some embodiments, in which social connectionsare automatically established when individuals are invited toparticipate in a common dialog, step S3610 may be eliminated from theprocess of FIG. 36, as the social connection test of step S3630 willinherently provide private dialog views to all dialog network members.These and other variations and social connection criteria may beutilized to control dialog view and implementation of variable privacy.

Such determinations of user trust via social relationship may also beapplied to implement privacy words within the substance of a contentcontribution, during content submission and/or upon content rendering.For example, operations are described above in which privacy words orother privacy attributes are pooled from dialog network members, with anaggregate set of privacy attributes applied to a content contributionfor automatic privacy treatment of responsive content components (e.g.automatic contributor pseudonymous substitutions 3320, 3340 and 3360 inFIG. 33), and/or for prompting users to consider whether content shouldbe subject to variable privacy treatment (e.g. content submission promptof FIG. 41, or a post-submission prompt of FIG. 43). In embodiments forwhich trusted dialog view status is determined by social relationship(in whole or in part), it may be desirable to extend the pooling ofprivacy attributes, for a given content contribution or for an entiredialog, to include privacy attributes of all individuals having atrusted relationship to the content. Thus, privacy words and otherprivacy attributes associated with all users to whom a trusted (e.g.unredacted) view of the content may be made available (potentiallyincluding, without limitation, dialog network members and/or individualshaving a predetermined social networking relationship to the contentcontributor), may be pooled and applied to a particular contentcontribution.

One potential limitation of providing anonymity to individuals outside auser's social network connections, is that there are some use cases forwhich the impact of real-name accountability within one's social networkmay be ineffective—particularly for broad-based social networking siteshaving a wide diversity of content and contributors. For example, a usermay seek to participate in a group or online dialog in which none of theparticipants have a social networking relationship with the user.Allowing such a user to elect variable privacy based on socialnetworking status, would effectively provide that user with completeanonymity, potentially facilitating the types of trolling and other lowquality content contributions that plague anonymous and pseudonymousonline communication and social networking platforms. (To the extentthat a user's content contributions are automatically posted to auser-specific content feed, the user could defeat any attribution bysocial networking connections by simply deleting a particular contentcontribution from their own feed.) Therefore, when applying variableprivacy functions described herein using social relationship indetermining anonymity, it may be desirable to enable a user to electvariable privacy treatment only if a threshold number of dialogparticipants will be provided with a trusted view containing the user'spersonally-identifiable information.

FIG. 46 illustrates an exemplary process for authorizing use of variableprivacy functions in which content view is dependent on socialrelationships. In step S4600, a user initiates a content contribution.In step S4605, server 100 evaluate whether the posting user has aqualifying social networking relationship with one or more other usersto whom the content contribution will be made directly available. Forexample, if the content contribution is a post of a group having adefined membership, an evaluation is made as to whether the contributinguser has a qualifying social networking relationship with some thresholdnumber of group members. If a content contribution is a reply to contentposted by another user, an evaluation may be made as to whether thecontributor has a qualifying social networking relationship with theuser to whom the reply is directed, and/or others engaged in a dialog towhich the contribution is directed. If not, the user's content post ismade with user attribution (step S4610) and variable privacy views arenot applied. If so, the contributor may elect whether to apply variableprivacy treatment to the content contribution (step S4615). If not, theuser's content post is made with user attribution (step S4610). If so,privacy attributes are applied to the content contribution, enablingcontributor attribution and/or other private information to be withheldfrom view of the content contribution made to untrusted viewers. Such aprocess enables use of social networking relationship to determinevariable privacy view, while avoiding opportunities for contentcontribution without some level of user accountability.

“Ask Me Anything” Dialogs With Variable Privacy

Variable privacy concepts described herein may also be beneficiallyapplied in the context of a pre-scheduled, online group dialog. Oneexample of such dialogs are commonly referred to as “Ask Me Anything”dialogs, or “AMAs”. An AMA typically involves a host user who makesthemselves available during a specified period of time to answerquestions posed by others, often in real time. The question askers maybe drawn from broad groups, such as members of the public at large. Thequestions and answers are then typically made available to the public atlarge.

Platforms hosting AMA events may be fraught with many of the samedisadvantages as other types of public Internet message forums. Forexample, forums permitting completely anonymous participation mayattract trolls, spammers and others contributing low-quality content,diluting the value provided by the AMA host. On the other hand,requiring real name identification of participants may have a chillingeffect on certain individuals who value privacy, particularly if thedialog content is considered to be sensitive.

Therefore, it may be desirable to host an AMA event using a dialogplatform with variable privacy features. One embodiment of a process forimplementing such an AMA event is illustrated in FIG. 37. The process ofFIG. 37 may be implemented by a network-connected server such as server100, described elsewhere herein.

In step S3700, a landing web page is generated and made available topotential event participants, such as via a public web page on theInternet. FIG. 38 illustrates an embodiment of such a landing page 3800.Region 3810 provides information describing the event, such as theidentity and/or description of the AMA host, a contemplated topic fordiscussion and the date and time of the event. In some use cases, areal-name identity of the host may be provided. In other use cases, thehost's identity may be withheld from the public description, with somefeature, characteristic or experience of the host being described toattract participants and guide discussion. User interface element 3820provides a button that can be selected by individuals desiring toparticipate in the AMA event.

In step S3705, a conversation or dialog is initiated, with the AMA hostconfigured as the opener. Step S3705 typically occurs in advance of theevent start time. The conversation generated in step S3705 serves as aplaceholder until the scheduled start of the AMA event.

In step S3710, determinations are made as to whether users have joinedthe AMA, e.g. by selecting button 3820 on landing page 3800. When a userindicates an intent to join the AMA event, the user is queried forcontact information, such as first name, last name and email address orother electronic contact address (step S3715). Contact information forindividuals completing the event registration process of step S3715 maybe stored by server 100 and the individuals may thereafter be deemeddialog network members for the scheduled AMA event dialog. In someembodiments, any individual may be automatically added as a dialogmember by completing registration. In other embodiments, an additionalapproval step may be required, whereby, for example, individuals may notbe added as dialog members unless and until their requested registrationis approved by the AMA host or another administrator.

In step S3720, determinations are made as to whether a member of the AMAevent dialog network (i.e. a user having registered for the event instep S3715), submits a question. Step S3720 permits dialog networkmembers to submit questions in advance of the AMA event. Advancequestions submitted by event members are then submitted to a moderationqueue for consideration and review by, e.g., the AMA host (step S3725).In some embodiments, questions queued in step S3725 may be madeavailable to the AMA host in advance of the scheduled event start time,such as via a published dialog view and/or a queue user interfacepublished by server 100. In some embodiments, questions queued in stepS3725 may be made available to the AMA host at the scheduled time of theAMA event.

In step S3730, a determination is made as to whether the AMA start timehas arrived. If not, server 100 may continue monitoring for eventparticipant registrations and advance questions. While a particularexample of steps and associated sequencing is illustrated in FIG. 37, itis contemplated and understood that other combinations of the same ordifferent steps may also be employed to beneficial effect. For example,in some embodiments it may also be desirable to invite registeredparticipants to an exclusive social network or communications forum,such as a Slack™ group, for pre-event communications amongst the groupof registered participants.

In step S3735, the dialog is opened for communications. The AMA host mayanswer previously-submitted questions, or questions submitted liveduring the event. Event participants may submit new questions during theevent, and/or respond to answers provided by the AMA host. Dialog viewsof the event may be made available during and after the period duringwhich the event is conducted.

System operation in step S3735 is analogous to that describedhereinabove (e.g. steps S310-S320 in the process of FIG. 3) with the AMAhost serving as the dialog opener. However, dialog network members ortarget recipients are those individuals having pre-registered for theAMA event in step S3710 (such as via the landing page of FIG. 38) ratherthan users directly specified by the opening user. In some cases, somemembers may have pre-registered on their own, while others may have beenadded to the conversation by the AMA host as described elsewhere above.The dialog of step S3735 includes variable privacy views describedabove, such that dialog views are made available to event participantsthat include personally identifiable information of other eventparticipants (such as some or all of the information provided by usersin step S3710), while individuals not self-registered as eventparticipants, or not added by the host or another registered participantas event participants, receive anonymized views.

In some embodiments, AMA hosts may desire to limit disclosure of theiridentities, in which case personally identifiable information for theopener (i.e. AMA host) and the registered participants may be withheldfrom unregistered viewers (e.g. public Internet viewers of the dialog orother members of a community). In other embodiments, the AMA host'sidentify may be public, such that all dialog views include personalattribution of the AMA host's dialog contributions, but otherparticipants' identities are only included in dialog views madeavailable to the opener/AMA host and other registered participants.

In some embodiments, individuals not registered as event participants instep S3710 may view the event dialog, but not provide contentcontributions. In other embodiments, unregistered individuals mayprovide content contributions, although they may be filtered from somedialog views, such as is described above in connection with, e.g., FIGS.15 and 16.

While the embodiment illustrated in FIGS. 37 and 38 contemplates alanding page through which individuals may elect to be eventparticipants, in other embodiments, it may be desirable to enable theAMA host to invite a select group of event participants. In such anevent, the AMA host controls the individuals amongst whom participantidentities are disclosed, while still permitting broader disseminationof anonymized dialog content.

Integrating Variable Privacy Views With Third Party DistributionPlatforms

Some variable privacy-enabling embodiments described above enablepublication of public (non-redacted and non-anonymized) content views tothird party content distribution platforms, such as in step S1710 in theembodiment of FIG. 17, or via the arrangement described in connectionwith FIG. 23. In such embodiments, responses to published content may berelayed back to the privacy enabling system and incorporated into anintegrated dialog. However, in other embodiments, it may also bedesirable to enable users of third party content distribution platforms(such as social media sites) to consume variable-privacy views ofcontent directly from within the third-party platform, even when thethird-party platform does not natively support variable privacy. Forexample, a variable privacy enabling system may publish content views toa third-party platform such as Facebook™, Instagram™ or SnapChat™, withcontent consumers on the third-party platform consuming variable privacyviews of the content directly from within the third-party platform.

One such embodiment is illustrated in FIGS. 47A and 47B. The embodimentenables variable privacy views directly within a third party socialmedia platform, with little or no third-party integration. FIG. 47A is aschematic representation of a communication network, implementing theprocess of FIG. 47B. The communication network includes a privacyenabling communication platform (“PECP”) 4700, analogous to variousembodiments described hereinabove. PECP 4700 is accessible via digitalcommunication network 4701 (which may include the Internet) to a firstuser 4704 and a second user 4706. Users 4704 and 4706 may also accessthird party social media platform 4702. While platform 4702 may bedescribed as a third party social media platform, it is contemplated andunderstood that in some embodiments, platforms 4700 and 4702 may beoperated or controlled by a common entity or have some otheraffiliation. However, in other embodiments, the platforms may beoperated independently, with little or no custom integration required toachieve functionality described herein.

In the process of FIG. 47B, in step S4750, first user 4704 submits acontent item to PECP 4700. The content item submission in step S4750 maybe accomplished via, e.g., various mechanisms described herein (such asa web application or mobile application) and may contain varying typesof content. For example, first user 4704 may utilize a smartphone tosubmit an image, portions of which are identified as personalinformation pursuant to, e.g., techniques described elsewhere herein. Instep S4752, PECP 4700 generates a URL uniquely associated with thecontent item submitted in step S4750. In step S4753, privacy enablingsystem 4700 posts the link generated in step S4752, into a social mediafeed on platform 4702 which is associated with first user 4704. In someembodiments, users may elect to post a content item link onto multiplesocial media accounts simultaneously.

The link posted in step S4753 may then be displayed to various users ofsocial media platform 4702, pursuant to the inherent functionality ofthat platform. Social media platform 4702 (like many social mediaplatforms) implements a feed rendering process that automaticallyscrapes URLs that are contained within a user's content feed, so that a“preview” of content accessible via the URL may be rendered to a viewerdirectly within the viewer's content feed. Thus, in step S4754, seconduser 4706 queries the user's content feed on social media platform 4702,which feed contains the URL-based content item that was posted to socialmedia platform 4702 in step S4753.

In step S4756, social media platform 4702 scrapes the URL generated instep S4752. Links generated in step S4752 point to servers implementedor controlled by PECP 4700, which include a link authentication engineto authenticate a system querying each link. Based on the result of theauthentication operation, PECP 4700 determines whether to return apublic view of an associated content item, or a private or anonymizedview of the content item, from which personal information has beenremoved or obscured. In step S4756, upon automated scraping of a link bysocial media platform 4702 automatically scrapes the URL posted in stepS4753, and PECP 4700 returns a public view of the content itemassociated with the scraped URL. That scraped, public view of thecontent item is then published directly into the social media feed ofsecond user 4706 in step S4758.

In step S4760, second user 4706 selects the published URL (rendered witha scraped preview) directly from their social media feed provided bysocial media platform 4702, such as by clicking on the scraped previewimage obtained in step S4756. Selection of the URL results in a query ofPECP 4700. PECP 4700 again authenticates the user or system accessingthe URL to evaluate its trusted or untrusted status relative to contentassociated with the URL (step S4762), and returns a view of theassociated content item (step S4764). If the system accessing the URL isauthenticated as a trusted party relative to the content item associatedwith the queried URL (i.e. if second user device 4706 is determined tobe associated with a member of a trusted group relative to the contentitem being queried), then a private view of the content item is returnedin step S4764. If the system accessing the URL is not authenticated as atrusted party, then a public view of the content item is returned instep S4764, with personal information removed, obscured, or the like.Authentication of a querying system may be accomplished via any of anumber of ways known in the art, such as via cookies stored on seconduser device 4706 indicative of the user's identity, querying second user4706 for login credentials associated with privacy enabling platform4700, or the like. As in other embodiments described herein, a queryinguser may be deemed trusted relative to the queried content based on,e.g., qualifying social networking relationship, membership within adialog group, or the like.

The process of FIG. 47B may, for instance, enable first user 4704 topost an image to PECP 4700, with a request to also push that posting tothat user's social media account on Facebook or the like. The user'ssocial media posting may then be automatically disseminated on the thirdparty social media platform as a scraped preview of the redacted, publicversion of the posted image. However, a trusted viewer can simply clickthe URL from within their social media feed to view the full, unredactedand unobscured version of the image, directly from social media platform4702. Such a mechanism enables relatively seamless implementation ofvariable privacy functionality from third party communication platforms,without requiring substantial system integrations.

While the embodiment of FIG. 47B provides many benefits, some functionallimitations may remain. For example, the version of content from PECP4700 that is scraped by social media platform 4702 for automated displaydirectly within the feeds of social media users, may inherently be theuntrusted view of the content to preserve the content contributor'sprivacy, as the scraping operation would typically be implementedindependently of rendering to a specific viewer. Thus, an extra step isrequired (e.g. clicking or selecting the URL from within a user's feedby a trusted user) in order to authenticate a viewer and access aviewer-specific view of the content item. Additionally, PECP 4700 may berequired to perform viewer authentication to determine whether a trustedor untrusted view of the content item should be served, without thebenefit of authenticating information that may be made available bysocial media platform 4702. For example, PECP 4700 may have to maintainits own social graph to determine qualifying relationships for servingof trusted views. Even if social media platform 4702 permits importationof a Friends list or other type of social graph by PECP 4700, regularupdating may be cumbersome to users and/or prone to delay.

FIG. 47C illustrates another process that may be utilized to rendercontent on social media platform 4702 with variable privacy, which mayaddress some of the above issues. In the embodiment of FIG. 47C, PECP4700 implements an API enabling direct communication between socialmedia platform 4702 and PECP 4700. The platform 4700 API permits contentitem queries having a payload with multiple information items, such as:a unique content item ID, a querying user ID, and social graph data. Theunique content item ID identifies the content item for which serving isrequested, and may be provided to social media platform 4702 in stepS4784 (described below). The querying user ID identifies the user forwhom the content item is being queried. The social graph data may beused to provide additional information for use by PECP 4700 indetermining which version of the content item will be served (e.g. atrusted or untrusted view). For example, in some embodiments, socialmedia platform 4702 may directly convey social graph information (e.g.Friend status, follow status, or degrees of social graph separation)regarding the querying user and the user to whose social media accountthe content item was originally posted.

In operation, first user 4704 initially submits a content item to PECP4700 in step S4780. In step S4782, PECP 4700 associates a content itemidentifier with the content item received in step S4780. In step S4784,the identifier associated with the content item is posted to an accountof first user 4704 on social media platform 4702. In some embodiments,the identifier may be posted as a URL, analogous to step S4753.

In step S4786, second user 4706 accesses a social media feed on socialmedia platform 4702. When the social media feed of second user 4706contains the content item posted in step S4784, social media platform4702 performs a user-specific query of PECP 4700 using theabove-described API. As described above, the query may include thecontent item ID, querying user ID, and social graph data. Theuser-specific query of step S4788 is authenticated by PECP 4700 todetermine which version of the queried content item should be returned(e.g. a trusted or untrusted view of the content item). In step S4790,social media platform 4702 publishes the user-specific content itemview, directly within the content feed of second user 4706.

Because PECP 4700 receives a definitive user ID from social mediaplatform 4702, and because it may also receive real-time social graphdata from social media platform 4702, an accurate and timelydetermination may be made as to which content item view should beprovided to the querying user. For example, a user of PECP 4700 mayconfigure content item submissions to automatically push content itemsubmissions to Facebook, and show a trusted view to Facebook Friendsonly. The embodiment of FIG. 47C thereby permits such content items toappear directly within Facebook content feeds, with the appropriateversion being rendered for any viewer, based on Facebook's real-timesocial graph at the time the content item is served to a user (or cachedby Facebook or a third party). The user-specific content item view mayalso be provided directly within a social media feed, without requiringadditional click-through on the content item. These and other benefitsmay be provided by the embodiment of FIG. 47C.

While certain embodiments are shown herein in the context of anetwork-connected computing platform based on a centralized servercommunicating with client devices, it is contemplated and understoodthat methods, tools, processes and techniques described herein couldalso be effectively implemented via a network-connected computingplatform that comprises or consists of peer-to-peer clients.

Key aspects of this system are enhanced by other aspects mentionedelsewhere. For instance, the likelihood someone may be willing andmotivated to invite other qualified members into a dialog is increasedwhen disclosure of the invited participant's identity can be controlled.Additionally, it is understood that specific aspects of the systems andembodiments described herein may be beneficially employed separately orin different combinations and contexts.

While certain embodiments of the invention have been described herein indetail for purposes of clarity and understanding, the foregoingdescription and Figures merely explain and illustrate the presentinvention and the present invention is not limited thereto. It will beappreciated that those skilled in the art, having the present disclosurebefore them, will be able to make modifications and variations to thatdisclosed herein without departing from the scope of any appendedclaims.

The invention claimed is:
 1. A method for publication of user-contributed content by a network-connected computing system, the method comprising: receiving, from a contributing user via a data communications network, a content contribution comprising user-contributed content; identifying personal information associated with the content contribution; publishing via the data communications network, only to a trusted group of users comprising the content-contribution author and at least one other user, both (a) a trusted view of the content contribution that is inclusive of the personal information, and (b) a second view of the content contribution that excludes the personal information; and publishing via the data communications network, to one or more users other than the trusted group, only the second view of the content contribution that excludes the personal information.
 2. The method of claim 1, in which the second view of the content contribution comprises an anonymous view of the content contribution.
 3. The method of claim I, in which the trusted view of the content contribution comprises visual cues denoting portions of the content contribution corresponding to the personal information.
 4. The method of claim 3, in which the visual cues comprise highlighting of content in a contrasting tone.
 5. The method of claim 1, in which the trusted view further comprises a toggle mechanism selectable by a viewer to alternatively display the trusted view of the content contribution, and the second view of the content contribution.
 6. The method of claim 1, in which the content contribution comprises a social media posting; and the trusted group comprises users having a predetermined social networking relationship with the contributing user.
 7. The method of claim 6, in which the personal information comprises names of the contributing user and one or more users having a qualifying social networking relationship with the contributing user.
 8. The method of claim 1, in which the trusted group comprises users engaged in a dialog with the contributing user via the network-connected computing system.
 9. The method of claim 8, in which the personal information comprises names of users within the trusted group.
 10. The method of claim 8, in which the personal information comprises a name of the contributing user.
 11. The method of claim 1, in which the step of identifying personal information associated with the content contribution comprises identifying one or more portions within the content contribution that consist of personal information.
 12. The method of claim 11, in which the personal information comprises one or more names of the contributing user and/or the users engaged in a dialog with the contributing user.
 13. The method of claim 11, in which the step of identifying one or more portions of the content contribution that consist of personal information comprises identifying matches between content contribution text and privacy words associated with the contributing user by the network-connected computing system.
 14. The method of claim 1, in which the second view of the content contribution is an anonymized version of the trusted view.
 15. The method of claim 1, in which the second view comprises the user-contributed content with personal information visually obscured.
 16. The method of claim 1, in which the second view comprises the user-contributed content with portions comprising personal information being replaced by one or more pseudonymous substitutions.
 17. The method of claim 1, in which: the content contribution comprises a digital image; the step of identifying personal information associated with the content contribution comprises applying an image recognition component to the content contribution to identify private portions thereof; and the second view of the content contribution comprises the digital image with private portions thereof visually obscured.
 18. The method of claim 17, in which private portions of the content contribution are visually obscured in the second view through application of a blur filter.
 19. The method of claim 17, in which private portions of the content contribution are visually obscured in the second view through application of a graphic overlay.
 20. The method of claim 17, in the step of applying an image recognition component to the content contribution to identify private portions thereof comprises: determining a general image classification for the content contribution; and matching the, general image classification with image categories previously configured by the contributing user profile for privacy designation.
 21. The method of claim 20, in which the step of applying an image recognition component to the content contribution to identify private portions thereof further comprises: querying the contributing user for a determination of private portions within the content contribution.
 22. The method of claim 17, in which the step of visually obscuring private portions of the content contribution comprises: applying a user-trained image classification component to the digital image to automatically identify and visually obscure areas of the digital image corresponding to user-specified privacy attributes.
 23. The method of claim 22, in which the step applying a user-trained image classification component to the digital image to automatically identify and visually obscure areas of the digital image corresponding to user-specified privacy attributes comprises: applying a blur filter to areas of the digital image corresponding to user-specified privacy attributes.
 24. The method of claim 1, in which: the content contribution comprises a digital video; the step of identifying one or more portions of the content contribution consisting of personal information comprises applying a video content analysis component to the digital video to identify private portions thereof; and the public view of the content contribution comprises the content contribution with private portions thereof visually obscured.
 25. The method of claim 24, in which the private portions of the digital video comprise portions displaying human faces.
 26. The method of claim 24, in which private portions of the content contribution in the second view are visually obscured through application of a blur filter.
 27. The method of claim 24, in which private portions of the content contribution in the second view are visually obscured through application of a graphic overlay.
 28. A method for publication of a social media posting comprising user-contributed content by a network-connected computing system, the method comprising: receiving, from a contributing user via a data communications network, a content contribution comprising user-contributed content; identifying personal information associated with the content contribution; publishing via the data communications network, only to a trusted group of users comprising at least one user other than the contributing user, both (a) a trusted view of the content contribution that is inclusive of the personal information, and (b) a second view of the content contribution that excludes the personal information; and publishing via the data communications network, to one or more users other than the trusted group, only the second view of the content contribution that excludes the personal information.
 29. The method of claim 28, in which the trusted group further comprises the contributing user.
 30. The method of claim 28, in which the second view of the content contribution comprises an anonymous view of the content contribution.
 31. The method of claim 28, in which the trusted group comprises users having a predetermined social networking relationship with the contributing user.
 32. The method of claim 28, in which the personal information comprises a name of the contributing user.
 33. A method for publication of user-contributed content by a network-connected computing system, the method comprising: receiving, from a contributing user via a data communications network, a content contribution comprising user-contributed content; identifying personal information associated with the content contribution; publishing via the data communications network, only to a trusted group of users comprising the content contribution author and at least one other user, a trusted via of the content contribution that is inclusive of the personal information, wherein the trusted view is displayed to at least the content contribution author with visual cues denoting portions of the content contribution corresponding to the personal information; and publishing via the data communications network, to one or more users other than the trusted group, only a second view of the content contribution that excludes the personal information.
 34. The method of claim 33, in which the trusted view is further displayed to one or more members of the trusted group other than the content contribution author with visual cues denoting portions of the content contribution corresponding to the personal information.
 35. The method of claim 33, in which the second view of the content contribution comprises an anonymous view of the content contribution.
 36. The method of claim 33, in which the visual cues comprise highlighting of content in a contrasting tone.
 37. The method of claim 33, in which the visual cues comprise a popup message pane. 