Displaying private information on personal devices

ABSTRACT

A computing device is described that includes one or more processors and at least one module operable by the one or more processors to determine whether the computing device is currently designated to display private information, receive an incoming communication, and determine that the incoming communication includes content that is private information. The at least one module is further operable by the one or more processors to, if the computing device is currently designated to display private information, output, for display, an indication of the incoming communication, and, if the computing device is not currently designated to display private information, refrain from outputting, for display, the indication of the incoming communication.

BACKGROUND

Mobile computing devices allow a user to perform a variety of functions,including various forms of communication and computing. For example,mobile computing devices may be capable of accessing the Internet,executing gaming applications, playing media, receiving messages, aswell as providing functionality of a traditional cellular telephone. Insome examples, a user may wear such mobile computing devices. However,people other than the user wearing the mobile computing device may beable to view information displayed by such wearable devices.

SUMMARY

In one example, a method includes determining, by a computing device,whether the computing device is currently designated to display privateinformation by at least determining whether one or more individualsother than a user to whom the incoming communication is directed arelikely to view the indication of the incoming communication if theindication of the incoming communication is output by the computingdevice, receiving, by the computing device, an incoming communication,and determining that the incoming communication includes content that isprivate information. The method further includes, if the computingdevice is currently designated to display private information,outputting, by the computing device and for display, an indication ofthe incoming communication, and, if the computing device is notcurrently designated to display private information, refraining fromoutputting, by the computing device and for display, the indication ofthe incoming communication.

In another example, a computing device includes one or more processorsand at least one module operable by the one or more processors todetermine whether the computing device is currently designated todisplay private information by at least determining whether one or moreindividuals other than a user to whom the incoming communication isdirected are likely to view the indication of the incoming communicationif the indication of the incoming communication is output by thecomputing device, receive an incoming communication, and determine thatthe incoming communication includes content that is private information.The at least one module is further operable by the one or moreprocessors to, if the computing device is currently designated todisplay private information, output, for display, an indication of theincoming communication, and, if the computing device is not currentlydesignated to display private information, refrain from outputting, fordisplay, the indication of the incoming communication.

In an additional example, a computer-readable storage medium comprisinginstructions that, when executed, configure one or more processors of acomputing system to determine whether the computing device is currentlydesignated to display private information by at least determiningwhether one or more individuals other than a user to whom the incomingcommunication is directed are likely to view the indication of theincoming communication if the indication of the incoming communicationis output by the computing device, receive an incoming communication,and determine that the incoming communication includes content that isprivate information. The instructions, when executed, further configurethe one or more processors of the computing system to, if the computingdevice is currently designated to display private information, output,for display, an indication of the incoming communication, and, if thecomputing device is not currently designated to display privateinformation, refrain from outputting, for display, the indication of theincoming communication.

The details of one or more examples of the disclosure are set forth inthe accompanying drawings and the description below. Other features,objects, and advantages will be apparent from the description anddrawings, and from the claims.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a block diagram illustrating an example system for managingthe display of private information, in accordance with one or moretechniques of the present disclosure.

FIG. 2 is a block diagram illustrating an example computing system thatdetermines whether to output private information to a computing device,in accordance with one or more techniques of the present disclosure.

FIG. 3 is a block diagram illustrating a mobile computing device thatdetermines whether to display private information, in accordance withone or more techniques of the present disclosure.

FIG. 4 is a block diagram illustrating an example computing device thatoutputs information for display at a remote device, in accordance withone or more techniques of the present disclosure.

FIG. 5 is a flow diagram illustrating example operations of a computingdevice to manage the display of private information at a wearabledevice, in accordance with one or more techniques of the presentdisclosure.

DETAILED DESCRIPTION

Techniques according to the disclosure may enable a computing device toselectively output public or private information in response to adetermination that someone other than a user associated with thecomputing device and/or an intended recipient of the information islikely viewing the computing device. The computing device may, forexample, use microphones and cameras to capture audio and video data,which the computing device analyzes to determine whether the userassociated with the computing device is the only person likely toreceive information output by the computing device. In some examples, acomputing device may display the information when the user of thecomputing device is likely viewing the computing device and refrain fromdisplaying the information when other people, in addition to or insteadof, the user is likely viewing the computing device. In other examples,audio information, haptic information, graphical display information orother forms of output provided to a user may be selectively presentedbased on a determination whether the likely recipient currently usingthe computing device is indeed associated with the computing device. Inthis manner, techniques of this disclosure may reduce the likelihood ofprivate information being unintentionally shared with other people.

Throughout the disclosure, examples are described where a computingdevice and/or a computing system may analyze information (e.g.,locations, speeds, etc.) associated with a computing device only if thecomputing device receives permission from the user to analyze theinformation. For example, in situations discussed below in which thecomputing device may collect or may make use of information associatedwith the user, the user may be provided with an opportunity to provideinput to control whether programs or features of the computing devicecan collect and make use of user information (e.g., information about auser's current location, current speed, etc.), or to dictate whetherand/or how to the computing device may receive content that may berelevant to the user. In addition, certain data may be treated in one ormore ways before it is stored or used by the computing device and/orcomputing system, so that personally-identifiable information isremoved. For example, a user's identity may be treated so that nopersonally identifiable information can be determined about the user, ora user's geographic location may be generalized where locationinformation is obtained (such as to a city, ZIP code, or state level),so that a particular location of a user cannot be determined. Thus, theuser may have control over how information is collected about the userand used by the computing device.

FIG. 1 is a block diagram illustrating example system 1 for managing thedisplay of private information, in accordance with one or moretechniques of the present disclosure. As shown in the example of FIG. 1,system 1 includes computing devices 10A-10N (collectively, “computingdevices 10”), information server system 40, and network 30.

Network 30 represents any public or private communication network, forinstance, a cellular, Wi-Fi, and/or other type of network fortransmitting data between computing devices. Computing devices 10 andinformation server system 40 may send and receive data across network 30using any suitable communication techniques. For example, computingdevice 10A may be operatively coupled to network 30 using network link32A, and computing device 10N may be operatively coupled to network 30using network link 32N. Information server system 40 may be operativelycoupled to network 30 by network link 32X. Network 30 may includenetwork hubs, network switches, network routers, etc., that areoperatively inter-coupled thereby providing for the exchange ofinformation between computing devices 10 and information server system40. In some examples, network links 32A-32N, and 32X (collectively,“network links 32”) may be Ethernet, ATM or other network connections.Such connections may be wireless and/or wired connections.

In the example of FIG. 1, computing device 10A is a laptop computer andcomputing device 10N is a wearable computing device (e.g., acomputerized watch, computerized eyewear, computerized gloves, etc.).However, in other examples, computing devices 10 may be any combinationof tablet computers, mobile phones, personal digital assistants (PDA),laptop computers, gaming systems, media players, e-book readers,television platforms, automobile navigation systems, or any other typesof mobile and/or non-mobile computing devices that are configured toreceive notification data from information server system 40 and outputan alert or otherwise provide an indication of the receipt ofnotification data.

As shown in FIG. 1, computing devices 10 each include respective userinterface devices (UID) 12A-12N (collectively, “UIDs 12”). UIDs 12 ofcomputing devices 10 may function as respective input and/or outputdevices for computing devices 10. UIDs 12 may be implemented usingvarious technologies. For instance, UIDs 12 may function as inputdevices using presence-sensitive input screens, such as resistivetouchscreens, surface acoustic wave touchscreens, capacitivetouchscreens, projective capacitance touchscreens, pressure sensitivescreens, acoustic pulse recognition touchscreens, or anotherpresence-sensitive display technology. UIDs 12 may function as output(e.g., display) devices using any one or more display devices, such asliquid crystal displays (LCD), dot matrix displays, light emitting diode(LED) displays, organic light-emitting diode (OLED) displays, e-ink, orsimilar monochrome or color displays capable of outputting visibleinformation to a user of computing devices 10. In some examples, thedisplay devices can be physically separate from a presence-sensitivedevice included in computing devices 10.

UIDs 12 may each include respective presence-sensitive displays that mayreceive tactile input from a user of respective computing devices 10.UIDs 12 may receive indications of tactile input by detecting one ormore gestures from a user (e.g., the user touching or pointing to one ormore locations of UIDs 12 with a finger or a stylus pen). UIDs 12 maypresent output to a user, for instance at respective presence-sensitivedisplays. UIDs 12 may present the output as respective graphical userinterfaces (e.g., user interfaces 14A-14N), which may be associated withfunctionality provided by computing devices 10. For example, UIDs 12 maypresent various user interfaces related to the functionality ofcomputing platforms, operating systems, applications, and/or servicesexecuting at or accessible by computing devices 10 (e.g., electronicmessage applications, Internet browser applications, mobile or desktopoperating systems, etc.). A user may interact with a user interface tocause computing devices 10 to perform respective operations relating tofunctions.

Computing devices 10 may each include corresponding user interface(“UI”) modules 20A-20N (collectively, “UI modules 20”), presencedetection modules 22A-22N (collectively, “presence detection modules22”), and privacy modules 24A-24N (collectively, “privacy modules 24”).Modules 20, 22, and 24 may perform operations described using software,hardware, firmware, or a mixture of hardware, software, and firmwareresiding in and/or executing at respective computing devices 10.Computing devices 10 may each execute respective modules 20, 22, and 24with one or more processors. Computing devices 10 may execute respectivemodules 20, 22, and 24 as one or more virtual machines executing onunderlying hardware of computing devices 10. Modules 20, 22, and 24 mayexecute as one or more services or components of operating systems orcomputing platforms of computing devices 10. Modules 20, 22, and 24 mayexecute as one or more executable programs at application layers ofcomputing platforms of computing devices 10. UIDs 12 and modules 20, 22,and 24 may be otherwise arranged remotely to and remotely accessible torespective computing devices 10, for instance, as one or more networkservices operating at network 30 in a network cloud.

Rather than automatically displaying a notification on the one ofcomputing devices 10 that received the notification (e.g., computingdevice 10A), techniques of this disclosure enable computing device 10Ato selectively output and redirect the notification based on whether thenotification includes private information and whether computing device10A is currently designated to output private information. Selectivelyoutputting the notification may include selectively outputting audioinformation, haptic information, graphical display information or otherforms of output provided to a user. In various instances, a device orsystem automatically determines whether a device is currently designatedto output private information based on a current usage context of thedevice. In some examples, the current usage context of the device isappropriate for the output of private information when someone otherthan the intended recipient will likely not receive the privateinformation. Whereas, the current content of the computing device maynot be appropriate for the output of private information when someoneother than or in addition to the intended recipient will likely receivethe private information.

Computing device 10A may receive an indication of an incomingcommunication (e.g., from information system server 40) and provide theindication of the incoming communication to privacy module 24A. Forexample, computing device 10A may receive an incoming communication(e.g., from a spouse) asking whether the user remembered to pick upSally from school. Privacy module 24A may determine that the incomingcommunication includes private information based on the sender (e.g.,the user's spouse) and the inclusion of their daughter's name (e.g.,“Sally”) in the text of the incoming communication. Privacy module 24Amay request presence information from presence detection module 22A todetermine whether the user is likely in control of computing device 10Aand whether the user or other people are likely viewing user interfacedevice 12A.

Presence detection module 22A may receive information from one or moreinput devices (e.g., cameras, microphones, presence-sensitive inputdevices, etc.), from motion sensors (e.g., accelerometer, gyroscope,compass, etc.), from an operating system executing at computing device10A, and from other software and/or hardware modules of computing device10A. Using the received information, presence detection module 22Adetermines whether information output for display by computing device10A (e.g., at user interface device 12A) will likely be viewed orotherwise observable by people other than a user associated withcomputing device 10A. That is, presence detection module 22A determineswhether people, other than the user associated with computing device10A, are present and may likely view information displayed by computingdevice 10A.

Privacy module 24A may receive an indication of whether informationoutput for display by computing device 10A will likely be viewed orotherwise observable by people other than the user associated withcomputing device 10A. In some instances, regardless of whether theincoming communication includes private information, privacy module 24Amay determine that, if information output for display by computingdevice 10A will likely be viewed or otherwise observable by people otherthan the user associated with computing device 10A, a notification ofthe incoming communication or the incoming communication itself shouldnot be displayed by computing device 10A (e.g., based on a location ofcomputing device 10A, a currently active application executing atcomputing device 10A, a configuration state of computing device 10A,etc.).

As one example, privacy module 24A may determine that computing device10A is not currently designated to display private information based atleast in part on determining that computing device 10A is currentlybeing used for a presentation based on the current location of computingdevice 10A (e.g., at the user's workplace), the currently activeapplication (e.g., presentation software), and the current configurationof computing device 10A (e.g., connected to an external display device,such as a projector). For example, privacy module 24A determines thatuser interface device 12A is currently outputting user interface 14Athat includes presentation 16A. At least in part because privacy module24A determines that computing device 10A is currently be used for apresentation (i.e., not currently designated to display privateinformation), privacy module 24A determines that no indication of theincoming communication should be displayed by computing device 10A.Accordingly, computing device 10A automatically refrains from outputtingan indication of the incoming communication.

In various instances, privacy modules 24 may include functionality toanalyze an incoming communication to determine that the incomingcommunication includes private information. Private information, as usedin this disclosure, includes any information that a user of a devicewould prefer not be shared with other persons. Public, or non-private,information, as used in this disclosure, includes any information otherthan private information. Privacy modules 24 may receive data from othercomponents of computing devices 10. For instance, privacy modules 24 mayreceive user presence information from a respective one of presencedetection modules 22. Privacy modules 24 may send data to othercomponents of computing devices 10. For instance, privacy modules 24 maysend a graphical indication that includes non-private information to UImodules 20.

In situations in which the systems discussed herein, such as privacymodules 24, may collect personal information about the user, or may makeuse of the user's personal information, the user may be provided with anopportunity to control whether, and to what extent, programs or featurescollect the user's information (e.g., information about the user'ssocial network, social actions or activities, profession, the user'spreferences, or the user's current location), or to control whetherand/or how to receive content from the content server that may be morerelevant to the user. In addition, certain data may be treated in one ormore ways before it is stored or used, so that personally identifiableinformation is removed. For example, the user's identity may be treatedso that no personally identifiable information can be determined for theuser, or the user's geographic location may be generalized wherelocation information is obtained (such as to a city, ZIP code, or statelevel), so that a particular location of the user cannot be determined.Thus, the user may have control over how information is collected aboutthe user and used by a content server.

Privacy module 24A may receive the indication of the incomingcommunication and determine that the incoming communication includesprivate information. Privacy module 24A may determine that the incomingcommunication includes private information based on a sender of theincoming communication (e.g., a doctor, a lawyer, an accountant, aspouse, a close friend, etc.), content of the incoming communication(e.g., text of the incoming communication, audio of the incomingcommunication, content of images included in the incoming communication,etc.), a privacy flag associated with the incoming communication (e.g.,the sender manually indicated that the incoming communication asprivate), one or more predefined privacy settings (e.g., time of day,geographical location of computing device 10A, list of non-privatesenders, and/or list of private senders) etc. In some examples, privacymodule 24A may determine that the incoming communication includesprivate information based on any combination of factors. As one example,privacy module 24A may determine that an incoming communication thatindicates a level of a battery of computing device 10A or other systeminformation does not include private information based on the type ofinformation (i.e., system information) included in the incomingcommunication. As another example, privacy module 24A may determine thatan incoming communication includes private information based on acurrent location of computing device 10A (e.g., the user's workplace).

While privacy modules 24 are described as determining whether theincoming communication includes private information and whether or not arespective one of computing devices 10 is currently designated todisplay private information, information server system 40 may performone or more of these actions and may provide the one of computingdevices 10 to which the incoming communication is directed with anindication of whether the particular computing device 10 is currentlydesignated to display private information and/or whether the incomingcommunication includes private information. For example, notificationhost module 42 may receive an incoming communication (e.g., an email ortext message) from another server. Privacy module 44 may analyze theincoming communication to determine whether or not the incomingcommunication includes private information (e.g., based on keywords,sender, type of incoming communication, visual content included in theincoming communication, etc.).

In instances where privacy module 24A determines that computing device10A is not currently designated to display private information, privacymodule 24A may cause computing device 10A and/or information serversystem 40 to identify a different computing device associated with theuser (e.g., computing device 10N) and direct at least an indication ofthe incoming communication to the identified different computing device.In various instances, information server system 40 may maintaininformation about one or more of computing devices 10 associated withthe same user and may forward an incoming communication or an indicationof an incoming communication to any of computing devices 10. Similarly,computing device 10A may identify one or more other computing devices ofcomputing devices 10 that are communicably coupled to computing device10A (e.g., via Wi-Fi, Bluetooth, etc.) and forward the incomingcommunication to the other one(s) of computing devices 10.

As one example, computing device 10A may determine that computing device10N is operatively coupled to computing device 10A (e.g., via Bluetooth)and may forward at least an indication of the incoming communication tocomputing device 10N. In some instances, computing device 10A may alsoforward an indication of whether the incoming communication includesprivate information to computing device 10N. As another example,computing device 10A sends, to information server system 40, a messageindicating that computing device 10A is not currently designated todisplay private information. Responsive to receiving the message,information server system 40 determines one or more other computingdevices associated with the same user as is associated with computingdevice 10A (e.g., computing device 10N) and identifies one of the othercomputing devices as a possible alternative computing device to displayat least an indication of the incoming communication. In either example,computing device 10N receives at least an indication of the incomingcommunication.

Responsive to receiving the incoming communication, computing device 10Nmay determine whether to display a notification of the incomingcommunication and/or the incoming communication based at least in parton whether the incoming communication includes private information andwhether computing device 10N is currently designated to display privateinformation. In instances where computing device 10N receives anindication of whether the incoming communication includes privateinformation from computing device 10A or information server system 40,privacy module 24N of computing device 10N may determine that theincoming communication includes private information based on therelieved indication. In some examples, privacy module 24N may determinewhether the incoming communication includes private information by atleast analyzing the content of the incoming communication similar tothat discussed above with respect to privacy module 24A.

Privacy module 24N may also determine whether computing device 10N iscurrently designated to display private information by, for example,determining whether anyone other than the user associated with computingdevice 10N is likely viewing a display device (e.g., user interfacedevice 12N) associated with computing device 10N. In some examples,privacy module 24N may determine whether the user associated withcomputing device 10N is actively viewing the display device associatedwith computing device 10N and/or whether the user is actively usingcomputing device 10N. In instances where computing device 10N determinesthat the user is likely the only person who is viewing the displaydevice associated with computing device 10N, privacy module 24N maydetermine that computing device 10N is currently designated to displayprivate information. In these instances, user interface device 12N mayoutput user interface 14N that includes at least indication 16N of theincoming communication. In various examples, indication 16N may includeat least a portion of the private information included in the incomingcommunication.

In this manner, techniques of this disclosure may enable a computingdevice to selectively output information based, at least in part, onwhether the intended recipient of the information is likely to be theonly person who views the information. By selectively outputtinginformation, techniques of this disclosure may reduce the likelihood ofprivate information being unintentionally shared with other people.

FIG. 2 is a block diagram illustrating an example computing system thatdetermines whether to output private information to a computing device,in accordance with one or more techniques of the present disclosure.Information server system 60 of FIG. 2 is described below within thecontext of FIG. 1. FIG. 2 illustrates only one particular example ofinformation server system 60, and many other examples of informationserver system 40 may be used in other instances and may include a subsetof the components included in example information server system 40 ormay include additional components not shown in FIG. 2.

As shown in the example of FIG. 2, information server system 40 includesone or more processors 50, one or more communication units 52, and oneor more storage devices 54. Storage devices 54 of information serversystem 40 include notification host module 42, privacy module 44, anddevice location module 62. Storage devices 54 of information serversystem 40 further include notification information data store 58, anddevice information data store 60. Communication channels 56 mayinterconnect each of the components 50, 52, and 54 for inter-componentcommunications (physically, communicatively, and/or operatively). Insome examples, communication channels 56 may include a system bus, anetwork connection, an inter-process communication data structure, orany other method for communicating data.

One or more communication units 52 of information server system 40 maycommunicate with external computing devices, such as one or more ofcomputing devices 10, by transmitting and/or receiving network signalson one or more networks, such as network 30. For example, informationserver system 40 may use communication unit 52 to transmit and/orreceive radio signals via links 32 to exchange information with one ormore of computing devices 10. Examples of communication unit 52 includea network interface card (e.g. such as an Ethernet card), an opticaltransceiver, a radio frequency transceiver, a GPS receiver, or any othertype of device that can send and/or receive information. Other examplesof communication units 52 may include short wave radios, cellular dataradios, wireless Ethernet network radios, as well as universal serialbus (USB) controllers.

One or more storage devices 54 within information server system 40 maystore information for processing during operation of information serversystem 40 (e.g., information server system 40 may store data accessed bymodules 42, 44, and 62 during execution at information server system40). In some examples, storage devices 54 are a temporary memory,meaning that a primary purpose of storage devices 54 is not long-termstorage. Storage devices 54 on information server system 40 may beconfigured for short-term storage of information as volatile memory andtherefore not retain stored contents if powered off. Examples ofvolatile memories include random access memories (RAM), dynamic randomaccess memories (DRAM), static random access memories (SRAM), and otherforms of volatile memories known in the art.

Storage devices 54, in some examples, also include one or morecomputer-readable storage media. Storage devices 54 may be configured tostore larger amounts of information than volatile memory. Storagedevices 54 may further be configured for long-term storage ofinformation as non-volatile memory space and retain information afterpower on/off cycles. Examples of non-volatile memories include magnetichard discs, optical discs, floppy discs, flash memories, or forms ofelectrically programmable memories (EPROM) or electrically erasable andprogrammable (EEPROM) memories. Storage devices 54 may store programinstructions and/or data associated with modules 42, 44, and 62.

One or more processors 50 may implement functionality and/or executeinstructions within information server system 40. For example,processors 50 of information server system 40 may receive and executeinstructions stored by storage devices 54 that execute the functionalityof modules 42, 44, and 62. These instructions executed by processors 50may cause information server system 40 to store information, withinstorage devices 54 during program execution. Processors 50 may executeinstructions of modules 42, 44, and 62 to provide notification anddevice information to one or more computing devices (e.g., computingdevices 10 of FIG. 1). That is, modules 42, 44, and 62 may be operableby processors 50 to perform various actions or functions of informationserver system 40.

Data stores 58 and 60 represent any suitable storage medium for storingdata related to notification data and contextual information. Forexample, notification information data store 58 may store notificationdata received by notification host module 42 and device information datastore 60 may store information about one or more devices associated withparticular users, which may be received from one or more of computingdevices 10.

The notification information stored at data store 58 may be sorted,organized, and/or accessed by notification host module 42 according tovarious attributes associated with the notification information. Forinstance, in addition to including content (e.g., information associatedwith the notification information such as text, video, images, etc.associated with a message, calendar reminder, etc.), each portion ofnotification information received by information server system 40 mayinclude one or more attributes that notification host module 42 uses fordetermining when to output the notification information and/or which ofcomputing devices 10 to route or deliver the notification information.

One attribute included in the notification information may include auser identifier, such as a user name, account name, telephone number,network identifier, e-mail address, etc. that indicates a user recipientassociated with the notification information for which computing devices10 may output an alert based on the notification information and/orotherwise provide access to information associated with the notificationinformation. Notification host module 42 may store received notificationinformation at data store 58 according to the user identifier and mayretrieve notification data from data store 58 by querying notificationdata based on the user identifier.

In some examples, the notification information may include a senderidentifier that indicates an origin of the incoming communication. Forexample, e-mail or instant message notification data may include anattribute that specifies the e-mail address or instant message accountof a user “sender” associated with the incoming communication. In otherwords, the sender identifier may indicate an account name associatedwith a person that typed the e-mail or instant message associated withthe notification information stored at notification information 58.

In some examples, the notification information stored at notificationinformation data store 58 may include an indication of whether or notthe incoming communication associated with the notification informationincludes private information. In order to determine whether the incomingcommunication includes private information, privacy module 44 mayanalyze various attributes of the incoming communication and/or contentof the incoming communication. As one example, content analysis module64 of privacy module 44 may analyze textual content of the incomingcommunication to determine if one or more keywords or phrases indicativeof private information are included within the text of the incomingcommunication. In some examples, privacy module 44 may also analyzeimage content of the incoming communication. For example, privacy module44 may analyze a picture, video, or other image data to determine if theimage content includes objects indicative of private

As another example, user relationship module 66 may determine arelationship between the sender and the recipient of the incomingcommunication. The relationship may be familial, spousal, or otherinterpersonal-type relationship between the second and recipient. Insome instances, the relationship may be determined based on socialnetwork information, stored contact information, user-configuredrelationship information, etc. information. Based on the relationshipbetween the sender and the recipient, user relationship module 66 maydetermine that the incoming communication includes private information.For example, if the sender and recipient are married, the incomingcommunication may be marked as a private communication. As anotherexample, if the sender is a business and the recipient is a customer ofthe business, user relationship module 66 may determine that theincoming communication does not include private information.

Privacy module 44 may analyze one or more different determinations ofwhether the incoming communication includes private information beforemaking a final determination. For example, user relationship module 66may determine that the incoming communication does not include privateinformation based on the relationship between the sender and therecipient while content analysis module 64 determines that the textualcontent of the incoming communication does include private information.Privacy module 44 may analyze both determinations and may applyweightings to the determinations to make a final determination. As oneexample, privacy module 44 may apply a heavier weighting to thedetermination made by content analysis module 64 than the determinationmade by user relationship module 66. As another example, privacy module44 may be configured such that if any analysis of the incomingcommunication results in a determination that the incoming communicationincludes private information, privacy module 44 determines that theincoming communication includes private information, regardless ofwhether the result of any or all other initial determinations indicatethat the incoming communication includes private information.

Privacy module 44 may also determine whether or not one or more ofcomputing devices 10 associated with the recipient of the incomingcommunication is currently designated to display private information. Asone example, privacy module 44 may receive location information for eachof computing devices 10 associated with the recipient from devicelocation module 62. Device location module 62 may request currentlocation information of computing devices 10 associated with therecipient of the incoming communication (e.g., in response toinformation server system 40 receiving the incoming communication) andprovide the current location information to privacy module 44. In someexamples, device location module 62 may associate a location type to acurrent location of one of computing devices 10. For example, ifcomputing device 10A is at a location corresponding to a workplace ofthe recipient, device location module 62 may apply a “work” locationtype to the location of computing device. As another example, ifcomputing device 10A is at a location corresponding to a home of therecipient, device location module 62 may apply a “home” location type tothe location of computing device 10A. As another example, if computingdevice 10A is at a location corresponding to a public business, devicelocation module 62 may apply a “public” location type to the location ofcomputing device 10A. In any of the examples, device location module 62may provide, to privacy module 44, a respective location type inaddition to or instead of a respective current location of one or moreof computing devices 10.

Privacy module 44 may also determine whether one of computing devices 10is currently designated to display private information based at least inpart on a type of the one of computing devices 10. For example, ifcomputing device 10A is a laptop computer, privacy module 44 maydetermine that it is more likely that computing device 10A is currentlybeing viewed by more than one person and determine that computing device10A is not currently designated to display private information. Asanother example, if computing device 10N is a wearable computing device(e.g., a watch, eyeglasses, ring, gloves, etc.), privacy module 44 maydetermine that it is less likely that computing device 10N is currentlybeing viewed by anyone other than the user and determine that computingdevice 10N is currently designated to display private information.

Privacy module 44 may select which one or more of computing devices 10to send the incoming communication based at least in part on which onesof computing device 10 are currently designated to display privateinformation. For example, if computing device 10A is not currentlydesignated to display private information and computing device 10N iscurrently designated to display private information, information serversystem 40 may send at least an indication of the incoming communicationto computing device 10N. In some instances, information server system 40may also send an indication of whether or not privacy module 44determined the particular computing device 10 is currently designated todisplay private information. Information server system 40 may also sendan indication of whether or not the incoming communication includesprivate information. That is, information server system 40 may send anincoming communication, an indication of whether or not the destinationcomputing device 10 is currently designated to display privateinformation (i.e., as determined by privacy module 44), an indication ofwhether or not the incoming communication includes private information,or any combination thereof.

FIG. 3 is a block diagram illustrating a mobile computing device thatdetermines whether to display private information, in accordance withone or more techniques of the present disclosure. Computing device 80 ofFIG. 3 is described below within the context of FIG. 1. FIG. 3illustrates only one particular example of computing device 80, and manyother examples of computing device 80 may be used in other instances andmay include a subset of the components included in example computingdevice 80 or may include additional components not shown in FIG. 3.

As shown in the example of FIG. 3, computing device 80 includes one ormore processors 82, one or more output devices 84, user interface device86 (“UID 86”), one or more communication units 88, one or more inputdevices 90, one or more sensors 92, and one or more storage devices 94.Storage devices 94 of computing device 80 also include UI module 100,privacy module 102, presence detection module 104, and operating system106. Computing device 80 can include additional components that, forclarity, are not shown in FIG. 3. For example, computing device 80 caninclude a battery to provide power to the components of computing device80. Similarly, the components of computing device 80 shown in FIG. 3 maynot be necessary in every example of computing device 80. For example,in some configurations, computing device 80 may not include outputdevices 84.

Communication channels 96 may interconnect each of the components 82,84, 86, 88, 90, 92 and 94 for inter-component communications(physically, communicatively, and/or operatively). In some examples,communication channels 96 may include a system bus, a networkconnection, an inter-process communication data structure, or any othermethod for communicating data.

One or more processors 82 may implement functionality and/or executeinstructions within computing device 80. For example, processors 82 oncomputing device 80 may receive and execute instructions stored bystorage devices 94 that execute the functionality of modules 100, 102,and 104. These instructions executed by processors 82 may causecomputing device 80 to read/write/etc. information, such as one or moredata files stored within storage devices 94 during program execution.Processors 82 may execute instructions of modules 100, 102, 104, and 106to cause UID 86 to output one or more graphical indications of incomingcommunications for display at UID 86 as content of a user interface.That is, modules 100, 102, and 104 may be operable by processors 82 toperform various actions or functions of computing device 80, forinstance, causing UID 86 to a present a graphical user interface at UID86.

One or more communication units 88 of computing device 80 maycommunicate with external devices via one or more wired and/or wirelessnetworks by transmitting and/or receiving network signals on the one ormore networks. Examples of communication unit 88 include a networkinterface card (e.g. such as an Ethernet card), an optical transceiver,a radio frequency transceiver, a GPS receiver, or any other type ofdevice that can send and/or receive information. Other examples ofcommunication units 88 may include short wave radios, cellular dataradios, wireless network radios, as well as universal serial bus (USB)controllers.

One or more output devices 84 of computing device 80 may generateoutput. Examples of output are tactile, audio, and video output. Outputdevices 84 of computing device 80, in one example, includes apresence-sensitive display, sound card, video graphics adapter card,speaker, cathode ray tube (CRT) monitor, liquid crystal display (LCD),or any other type of device for generating output to a human or machine.

One or more input devices 90 of computing device 80 receive input.Examples of input are tactile, audio, and video input. Input devices 90of computing device 80, in one example, includes a presence-sensitivedisplay, touch-sensitive screen, mouse, keyboard, voice responsivesystem, video camera, microphone, or any other type of device fordetecting input from a human or machine.

In some examples, UID 86 of computing device 80 may includefunctionality of input devices 90 and/or output devices 84. In theexample of FIG. 3, UID 86 may be or may include a presence-sensitiveinput device. In some examples, a presence sensitive input device maydetect an object at and/or near a screen. As one example range, apresence-sensitive input device may detect an object, such as a fingeror stylus that is within 2 inches or less of the screen. Thepresence-sensitive input device may determine a location (e.g., an (x,y)coordinate) of a screen at which the object was detected. In anotherexample range, a presence-sensitive input device may detect an objectsix inches or less from the screen and other ranges are also possible.The presence-sensitive input device may determine the location of thescreen selected by a user's finger using capacitive, inductive, and/oroptical recognition techniques. In some examples, presence sensitiveinput device also provides output to a user using tactile, audio, orvideo stimuli as described with respect to output device 84, e.g., at adisplay. In the example of FIG. 3, UID 86 presents a graphical userinterface, such as graphical user interfaces 14 of FIG. 1.

While illustrated as an internal component of computing device 80, UID86 also represents and external component that shares a data path withcomputing device 80 for transmitting and/or receiving input and output.For instance, in one example, UID 86 represents a built-in component ofcomputing device 80 located within and physically connected to theexternal packaging of computing device 80 (e.g., a screen on a mobilephone). In another example, UID 86 represents an external component ofcomputing device 80 located outside and physically separated from thepackaging of computing device 80 (e.g., a monitor, a projector, etc.that shares a wired and/or wireless data path with a tablet computer).

Sensors 92 may be configured to measure the movement of computing device80 and may collect other information associated with computing device80. For instance, sensors 92 may be configured to measure the position,rotation, velocity, and/or acceleration of computing device 80. A userassociated with computing device 80 may interact with computing device80 by wearable computing device 80. Examples of sensors 92 that detectand/or measure movement of computing device 80 may include, but are notlimited to, accelerometers and gyroscopes. Sensors 92 may also include aclasp sensor (e.g., in examples where computing device 80 is a wearablecomputing device having a clasp), a galvanic skin response sensor, andany other type of sensor capable of collecting information related tocomputing device 80.

One or more storage devices 94 within computing device 80 may storeinformation for processing during operation of computing device 80(e.g., computing device 80 may store data that modules 100, 102, and 104may access during execution at computing device 80). In some examples,storage device 48 is a temporary memory, meaning that a primary purposeof storage device 48 is not long-term storage. Storage devices 48 oncomputing device 10 may configured for short-term storage of informationas volatile memory and therefore not retain stored contents if poweredoff. Examples of volatile memories include random access memories (RAM),dynamic random access memories (DRAM), static random access memories(SRAM), and other forms of volatile memories known in the art.

Storage devices 94, in some examples, also include one or morecomputer-readable storage media. Storage devices 94 may be configured tostore larger amounts of information than volatile memory. Storagedevices 94 may further be configured for long-term storage ofinformation as non-volatile memory space and retain information afterpower on/off cycles. Examples of non-volatile memories include magnetichard discs, optical discs, floppy discs, flash memories, or forms ofelectrically programmable memories (EPROM) or electrically erasable andprogrammable (EEPROM) memories. Storage devices 94 may store programinstructions and/or information (e.g., data) associated with modules100, 102, and 104 and operating system 106.

Operating system 106, in some examples, controls the operation ofcomponents of computing device 80. For example, operating system 106, inone example, facilitates the communication of UI module 100, privacymodules 102, and presence detection module 104 with processors 82, oneor more output devices 84, user interface device 86 (“UID 86”), one ormore communication units 88, one or more input devices 90, and one ormore sensors 92. UI module 100, privacy module 102, and presencedetection module 104 may each include program instructions and/or datathat are executable by computing device 80 (e.g., by one or moreprocessors 82). As one example, UI module 6 can include instructionsthat cause computing device 80 to perform one or more of the operationsand actions described in the present disclosure.

UI module 100 may cause UID 86 to output a graphical user interface(e.g., graphical user interfaces 14A, 14N) for display, as a user ofcomputing device 80 views output and/or provides input at UID 86. UImodule 100 and UID 86 may receive one or more indications of input froma user as the user interacts with the graphical user interface, atdifferent times and when the user and computing device 80 are atdifferent locations. UI module 100 and UID 86 may interpret inputsdetected at UID 86 (e.g., as a user provides one or more gestures at oneor more locations of UID 86 at which the graphical user interface isdisplayed) and may relay information about the inputs detected at UID 86to one or more associated platforms, operating systems, applications,and/or services executing at computing device 80, to cause computingdevice 80 to perform functions.

UI module 100 may receive information and instructions from one or moreassociated platforms, operating systems, applications, and/or servicesexecuting at computing device 80 (e.g., privacy module 102, presencedetection module 104, etc.) for generating a graphical user interface.In addition, UI module 100 may act as an intermediary between the one ormore associated platforms, operating systems, applications, and/orservices executing at computing device 80 and various output devices ofcomputing device 80 (e.g., speakers, LED indicators, audio orelectrostatic haptic output device, etc.) to produce output (e.g., agraphic, a flash of light, a sound, a haptic response, etc.) withcomputing device 80.

Computing device 80 may receive, via communication units 88, an incomingmessage (e.g., from information system server 40 of FIG. 2). Prior tooutputting, for display, an indication of the incoming communication(e.g., a graphical indication output by UID 86, an indication output byone of output devices 84, etc.), privacy module 102 may determinewhether or not the incoming communication includes private informationand whether or not computing device 80 is currently designated todisplay private information.

As shown in FIG. 3, privacy module 102 includes content analysis module108, user account manager module 110, and user relationship module 112.In various instances, content analysis module 108 and user relationshipmodule 112 may perform functions similar to those described with respectto content analysis module 64 and user relationship module 66 ofinformation server system 40 shown in FIG. 2. For example, contentanalysis module 108 may analyze textual content of the incomingcommunication to determine if one or more keywords or phrases indicativeof private information are included within the text of the incomingcommunication. As another example, content analysis module 108 mayanalyze image content of the incoming communication to determine if anyimage of the incoming communication includes private information.

As another example, content analysis module 108 may determine if theincoming communication includes a privacy flag (e.g., a bit set by thesender or messaging service that indicates whether the incomingcommunication includes private information). If the privacy flag is set,content analysis module 108 may determine that the incomingcommunication includes private information and, if the privacy flag isnot set, content analysis module 108 may determine that the incomingcommunication does not include private information. As another example,content analysis module 108 may determine whether or not the incomingcommunication includes private information based on the type of emojiincluded within the incoming communication. In general, emoji is aUnicode symbol for something, such as an emotion or action. In someexamples, based on the emotion and/or action associated with the emjoiincluded in the incoming communication, content analysis module 108 maydetermine whether or not the incoming communication includes privateinformation.

User relationship module 112 may determine a relationship between thesender and the recipient of the incoming communication and, based on therelationship, determine that the incoming communication includes privateinformation. The relationship may be familial, spousal, or otherinterpersonal-type relationship between the second and recipient. Insome instances, the relationship may be determined based on socialnetwork information, stored contact information, user-configuredrelationship information, etc. information. Based on the relationshipbetween the sender and the recipient, user relationship module 66 maydetermine that the incoming communication includes private information.For example, if the sender and recipient are married, the incomingcommunication may be marked as a private communication. As anotherexample, if the sender is a business and the recipient is a customer ofthe business, user relationship module 66 may determine that theincoming communication does not include private information.

User account manager module 110 may determine which user account isactive at computing device 80. In some examples, computing device 80 maybe configured with different user accounts for different users (e.g.,one for each member of a family, a personal account and a work accountfor the same user, etc.). The incoming communication may be directed toa user associated with one of the user accounts. User account managementmodule 110 may determine a user account associated with the incomingcommunication and determine if the currently active user account is theuser account associated with the incoming communication. The currentlyactive user account is the user account that is currently authenticated(e.g., unlocked). In some examples, computing device 80 may be in alocked stated such that no user account is a currently active useraccount. In these examples, user account management module 110 maydetermine that no user account is currently active and provide andprovide such an indication to privacy module 44.

Privacy module 44 may determine whether or not computing device 80should output at least an indication of the incoming communication basednot only on determinations made by text analysis module 108, useraccount manager module 110, and user relationship module 112, but alsobased on determinations made by presence detection module 104. As shownin FIG. 3, presence detection module 104 includes face detection module114 and audio detection module 116. In general, presence detectionmodule 104 may determine whether the user is in control of computingdevice 80, whether the user is currently looking at computing device 80,and whether any other user is likely currently looking at computingdevice 80.

Face detection module 114 may receive image data captured by one ofinput devices 90 (e.g., video data, still image data, etc. captured by acamera) and determine if the image data includes one or moreindividuals. In some examples, face detection module 114 may determineif the image data includes one or more faces. If the image data includesmore than one face, face detection module 114 may determine that someoneother than the user associated with computing device 80 is likelyviewing the display and would like view any private information that maybe output by computing device 80. Accordingly, face detection module114, in these examples, may determine that computing device 80 is notcurrently designated to output private information. In other examples,face detection module 114 may determine that the image data includesonly one face. Responsive to determining that only one face is includedin the image data, face detection module 114 may perform facialrecognition techniques to determine whether the face is the userassociated with computing device 80. If the face is not the userassociated with computing device 80, face detection module 114 maydetermine that computing device 80 is not currently designated to outputprivate information. If the face is the user associated with computingdevice 80, face detection module 114 may determine that computing device80 is currently designated to output private information.

Audio detection module 116 may analyze ambient audio data captured byone of input devices 90 (e.g., a microphone). The audio data may includeaudio level information and/or the captured audio itself. In someexamples, audio detection module 116 may analyze the audio data todetermine if voices associated with more than one user are included inthe audio data. If more than one voice is detected in the audio data,audio detection module 116 may determine that computing device 80 is notcurrently designated to output private information. Audio detectionmodule 116 may also analyze the audio data to determine if a voicecaptured in the audio data is the voice of the user associated withcomputing device 80. For example, audio detection module 116 may performaudio waveform analysis to compare voice captured in the audio data to asample of the user's voice. If audio detection module 116 determinesthat the voice captured in the audio data matches the user's voice,audio detection module 116 may determine that computing device 80 iscurrently designated to output private information.

Presence detection module 104 may also determine if computing device 80is currently within the user's control based on information receivedfrom one or more sensors 92. For example, in instances where computingdevice 80 is a wearable computing device and sensors 92 includes a claspsensor and a sensor that detects motion (e.g., a gyroscope,accelerometer, etc.), presence detection module 104 may determinewhether or not the user is currently wearing computing device 80. As oneexample, if the clasp sensor indicates that the clasp is closed and themotion sensors indicates that computing device 80 has recently moved,presence detection module 104 may determine that the user is currentlywearing computing device 80 and, based on this determination, maydetermine that computing device 80 is currently designated to displayprivate information. As another example, in instances where computingdevice 80 is a smart phone and sensors 92 include at least one sensorthat detection motion, presence detection module 104 may determinewhether or not the user is using the phone. For instance, if the phoneis in a locked stated and the sensor data indicates that the phone ismoving, presence detection module 104 may determine that the user is notcurrently using the phone and may determine that computing device 80 isnot currently designated to output private information. If the phone isin an unlocked stated and is not currently moving or moving in a mannerconsistent with being held by the user, presence detection module 104may determine that the user is currently using the phone and maydetermine that computing device 80 is currently designated to outputprivate information.

In some examples, presence detection module 104 may also determinewhether or not computing device 80 is currently designated to outputprivate information based at least in part on other devices locatedproximate to computing device 80. Other devices may be proximate tocomputing device 80 if the other devices are physically located within athreshold distance of computing device 80 (e.g., within 10 feet, 50feet, etc.), on the same wireless network as computing device 80,reachable via Bluetooth, etc. Presence detection module 104 may identifyother devices on the same network, reachable via Bluetooth, etc. anddetermine whether the devices are associated with the user or otherusers. For example, if there are multiple different devices on the samewireless network as computing device 80 and the different devices arenot associated with the user, presence detection module 104 maydetermine that computing device 80 is not currently designated to outputprivate information. If the different devices are associated with theuser or if presence detection module 104 does not identify any otherdevices as being proximate to computing device 80, presence detectionmodule 104 may determine that computing device 80 is currentlydesignated to output private information.

Privacy module 102 may also receive location information from devicelocation module 118. Device location module 118 may perform functionssimilar to those of device location module 62 shown in FIG. 2. Forexample, device location module 118 may receive location informationfrom one of sensors 92 (e.g., a GPS sensor) and determine the currentlocation of computing device 80. In some examples, device locationmodule 118 may associate a location type to a current location ofcomputing device 80. For example, if computing device 80 is at alocation corresponding to a workplace of the recipient, device locationmodule 118 may apply a “work” location type to the location of computingdevice. As another example, if computing device 80 is at a locationcorresponding to a home of the recipient, device location module 118 mayapply a “home” location type to the location of computing device 80. Asanother example, if computing device 80 is at a location correspondingto a public business, device location module 118 may apply a “public”location type to the location of computing device 80. In any of theexamples, device location module 118 may provide, to privacy module 102,a respective location type in addition to or instead of a respectivecurrent location of one or more of computing devices 80.

Privacy module 102 may make a final determination as to whether or notthe incoming communication includes private information and whether ornot computing device 80 is currently designated to output privateinformation based on any combination of the determinations made bymodules 104, 108, 110, 112, 114, 116, and 118 as well as any othernon-final determination made by privacy module 102. In general, a“non-final” determination is any determination as to whether or not theincoming communication includes private information and/or whether ornot computing device 80 is currently designated to display privateinformation other than the final determination that ultimately governswhether or not the private information is displayed by computing device80. A final determination is typically made by privacy module 102 basedon any combination of non-final determinations.

Presence detection module 104 may provide various non-finaldeterminations to privacy module 102. As one example, presence detectionmodule 104 may provide, to privacy module 102, each non-finaldetermination made by modules 114, 116, and 118 as well as any non-finaldetermination made by presence detection module 104. As another example,presence detection module 104 may analyze the various non-finaldeterminations and generate a single determination to provide to privacymodule 102.

In making the final determination, privacy module 102 may weight each ofthe non-final determinations in making the file determination. Forexample, privacy module 102 may weight a determination made by presencedetection module 104 that computing device 80 is currently designated tooutput private information more heavily than a determination by textanalysis module 108. As another example, privacy module 102 may weight adetermination by device location module that computing device 80 iscurrently designated to display private information (e.g., based on adetermination that computing device 80 is at a “home” location) lessheavily than a determination by face detection module 114 that thecomputing device is not currently designated to display privateinformation (e.g., based on a determination that someone other than theuser is currently looking at the display of computing device 80).

Privacy module 102 makes a final determination as to whether or not tooutput at least an indication of the incoming communication. Responsiveto determining to output at least an indication of the incomingcommunication, privacy module 102 causes UI module 100 to generate agraphical indication of the incoming communication for display by UID86. Responsive to determining not to output at least an indication ofthe incoming communication, privacy module 102 refrains from causing agraphical indication of the incoming communication to be output bycomputing device 80 and may, in various instances, cause computingdevice 80 to send a message to information server system 40 indicatingthat computing device 80 is not currently designated to output privateinformation and/or that the incoming communication includes privateinformation.

FIG. 4 is a block diagram illustrating an example computing device thatoutputs graphical content for display at a remote device, in accordancewith one or more techniques of the present disclosure. Graphicalcontent, generally, may include any visual information that may beoutput for display, such as text, images, a group of moving images, etc.The example shown in FIG. 4 includes a computing device 130,presence-sensitive display 134, communication unit 140, projector 150,projector screen 152, mobile device 156, and visual display device 160.Although shown for purposes of example in FIGS. 1 and 3 as stand-alonecomputing devices 10 and 80, a computing device such as computing device130 may, generally, be any component or system that includes a processoror other suitable computing environment for executing softwareinstructions and, for example, need not include a presence-sensitivedisplay.

As shown in the example of FIG. 4, computing device 130 may be aprocessor that includes functionality as described with respect toprocessor 82 in FIG. 3. In such examples, computing device 130 may beoperatively coupled to presence-sensitive display 134 by a communicationchannel 132A, which may be a system bus or other suitable connection.Computing device 130 may also be operatively coupled to communicationunit 140, further described below, by a communication channel 132B,which may also be a system bus or other suitable connection. Althoughshown separately as an example in FIG. 4, computing device 130 may beoperatively coupled to presence-sensitive display 134 and communicationunit 140 by any number of one or more communication channels.

In other examples, such as illustrated previously by computing devices10 and 80 in FIGS. 1 and 3, a computing device may refer to a portableor mobile device such as mobile phones (including smart phones),wearable devices (including smart watches) laptop computers, etc. Insome examples, a computing device may be a desktop computers, tabletcomputers, smart television platforms, cameras, personal digitalassistants (PDAs), servers, mainframes, etc.

Presence-sensitive display 134, like UI devices 12 as shown in FIG. 1,may include display device 136 and presence-sensitive input device 138.Display device 136 may, for example, receive data from computing device130 and display the graphical content. In some examples,presence-sensitive input device 138 may determine one or more userinputs (e.g., continuous gestures, multi-touch gestures, single-touchgestures, etc.) at presence-sensitive display 134 using capacitive,inductive, and/or optical recognition techniques and send indications ofsuch user input to computing device 130 using communication channel132A. In some examples, presence-sensitive input device 138 may bephysically positioned on top of display device 136 such that, when auser positions an input unit over a graphical element displayed bydisplay device 136, the location at which presence-sensitive inputdevice 138 corresponds to the location of display device 136 at whichthe graphical element is displayed. In other examples,presence-sensitive input device 138 may be positioned physically apartfrom display device 136, and locations of presence-sensitive inputdevice 138 may correspond to locations of display device 136, such thatinput can be made at presence-sensitive input device 138 for interactingwith graphical elements displayed at corresponding locations of displaydevice 136.

As shown in FIG. 4, computing device 130 may also include and/or beoperatively coupled with communication unit 140. Communication unit 140may include functionality of communication unit 88 as described in FIG.3. Examples of communication unit 140 may include a network interfacecard, an Ethernet card, an optical transceiver, a radio frequencytransceiver, or any other type of device that can send and receiveinformation. Other examples of such communication units may includeBluetooth, 3G, and Wi-Fi radios, Universal Serial Bus (USB) interfaces,etc. Computing device 130 may also include and/or be operatively coupledwith one or more other devices, e.g., input devices, output devices,memory, storage devices, etc. that are not shown in FIG. 4 for purposesof brevity and illustration.

FIG. 4 also illustrates a projector 150 and projector screen 152. Othersuch examples of projection devices may include electronic whiteboards,holographic display devices, and any other suitable devices fordisplaying graphical content. Projector 150 and projector screen 152 mayinclude one or more communication units that enable the respectivedevices to communicate with computing device 130. In some examples, theone or more communication units may enable communication betweenprojector and projector screen 152. Projector 150 may receive data fromcomputing device 130 that includes graphical content. Projector 150, inresponse to receiving the data, may project the graphical content ontoprojector screen 152. In some examples, projector 150 may determine oneor more user inputs (e.g., continuous gestures, multi-touch gestures,single-touch gestures, etc.) at projector screen using opticalrecognition or other suitable techniques and send indications of suchuser input using one or more communication units to computing device130. In such examples, projector screen 152 may be unnecessary, andprojector 150 may project graphical content on any suitable medium anddetect one or more user inputs using optical recognition or other suchsuitable techniques.

Projector screen 152, in some examples, may include a presence-sensitivedisplay 104. Presence-sensitive display 154 may include a subset offunctionality or all of the functionality of UI devices 12 and/or UIdevice 86 as described in this disclosure. In some examples,presence-sensitive display 134 may include additional functionality.Projector screen 152 (e.g., an electronic whiteboard), may receive datafrom computing device 130 and display the graphical content. In someexamples, presence-sensitive display 154 may determine one or more userinputs (e.g., continuous gestures, multi-touch gestures, single-touchgestures, etc.) at projector screen 152 using capacitive, inductive,and/or optical recognition techniques and send indications of such userinput using one or more communication units to computing device 130.

FIG. 4 also illustrates mobile device 156 and visual display device 160.Mobile device 156 and visual display device 160 may each includecomputing and connectivity capabilities. Examples of mobile device 156may include e-reader devices, convertible notebook devices, hybrid slatedevices, wearable devices, etc. Examples of visual display device 160may include other semi-stationary devices such as televisions, computermonitors, etc. As shown in FIG. 4, mobile device 156 may include apresence-sensitive display 158. Visual display device 160 may include apresence-sensitive display 162. Presence-sensitive displays 158, 162 mayinclude a subset of functionality or all of the functionality of UIdevices 12 and/or UI device 86 as described in this disclosure. In someexamples, presence-sensitive displays 158, 162 may include additionalfunctionality. In any case, presence-sensitive display 162, for example,may receive data from computing device 80 and display the graphicalcontent. In some examples, presence-sensitive display 162 may determineone or more user inputs (e.g., continuous gestures, multi-touchgestures, single-touch gestures, etc.) at projector screen usingcapacitive, inductive, and/or optical recognition techniques and sendindications of such user input using one or more communication units tocomputing device 130.

As described above, in some examples, computing device 130 may outputgraphical content for display at presence-sensitive display 134 that iscoupled to computing device 130 by a system bus or other suitablecommunication channel. Computing device 130 may also output graphicalcontent for display at one or more remote devices, such as projector150, projector screen 152, mobile device 156, and visual display device160. For instance, computing device 130 may execute one or moreinstructions to generate and/or modify graphical content in accordancewith techniques of the present disclosure. Computing device 130 mayoutput the data that includes the graphical content to a communicationunit of computing device 130, such as communication unit 140.Communication unit 140 may send the data to one or more of the remotedevices, such as projector 150, projector screen 152, mobile device 156,and/or visual display device 160. In this way, computing device 130 mayoutput the graphical content for display at one or more of the remotedevices. In some examples, one or more of the remote devices may outputthe graphical content at a presence-sensitive display that is includedin and/or operatively coupled to the respective remote devices.

In some examples, computing device 130 may not output graphical contentat presence-sensitive display 134 that is operatively coupled tocomputing device 130. In other examples, computing device 130 may outputgraphical content for display at both a presence-sensitive display 134that is coupled to computing device 130 by communication channel 132A,and at one or more remote devices. In such examples, the graphicalcontent may be displayed substantially contemporaneously at eachrespective device. For instance, some delay may be introduced by thecommunication latency to send the data that includes the graphicalcontent to the remote device. In some examples, graphical contentgenerated by computing device 130 and output for display atpresence-sensitive display 134 may be different than graphical contentdisplay output for display at one or more remote devices.

Computing device 130 may send and receive data using any suitablecommunication techniques. For example, computing device 130 may beoperatively coupled to external network 144 using network link 142A.Each of the remote devices illustrated in FIG. 4 may be operativelycoupled to network external network 144 by one of respective networklinks 142B, 142C, and 142D. External network 144 may include networkhubs, network switches, network routers, etc., that are operativelyinter-coupled thereby providing for the exchange of information betweencomputing device 130 and the remote devices illustrated in FIG. 4. Insome examples, network links 142A-142D may be Ethernet, ATM or othernetwork connections. Such connections may be wireless and/or wiredconnections.

In some examples, computing device 130 may be operatively coupled to oneor more of the remote devices included in FIG. 4 using direct devicecommunication 148. Direct device communication 148 may includecommunications through which computing device 130 sends and receivesdata directly with a remote device, using wired or wirelesscommunication. That is, in some examples of direct device communication148, data sent by computing device 130 may not be forwarded by one ormore additional devices before being received at the remote device, andvice-versa. Examples of direct device communication 138 may includeBluetooth, Near-Field Communication, Universal Serial Bus, Wi-Fi,infrared, etc. One or more of the remote devices illustrated in FIG. 4may be operatively coupled with computing device 130 by communicationlinks 146A-146D. In some examples, communication links 146A-146D may beconnections using Bluetooth, Near-Field Communication, Universal SerialBus, infrared, etc. Such connections may be wireless and/or wiredconnections.

In accordance with techniques of the disclosure, computing device 130may be operatively coupled to visual display device 160 using externalnetwork 144. Computing device 130 may determine that only the user iscurrently viewing visual display device 160 and/or that the incomingcommunication does not include private information and, in response,output a graphical indication of an incoming communication for displayat presence-sensitive display 162. For instance, computing device 130may send data that includes a representation of the graphical indicationto communication unit 140. Communication unit 140 may send the data thatincludes the representation of the graphical indication to visualdisplay device 160 using external network 144. Visual display device160, in response to receiving the data using external network 94, maycause presence-sensitive display 162 to output the graphical indication.

FIG. 5 is a flow diagram illustrating example operations of a computingdevice to manage the display of private information, in accordance withone or more techniques of the present disclosure. The techniques of FIG.5 may be performed by one or more processors of a computing device, suchas computing devices 10, 80, and 130 illustrated in FIGS. 1, 3, and 4.For purposes of illustration, the techniques of FIG. 5 are describedwithin the context of computing system 1 of FIG. 1, information serversystem 40 of FIG. 2, and computing device 80 and 130 of FIGS. 3 and 4,although computing devices having different configurations may performthe techniques of FIG. 5.

In accordance with one or more techniques of the disclosure, computingdevice 10A may receive an indication of an incoming communication (170).The incoming communication may be received from, for example, acomponent of computing device 10A, an external server (e.g., informationserver system 40), or another one of computing devices 10 (e.g.,computing device 10N). Privacy module 24A of computing device 10A maydetermine whether or not the incoming communication includes privateinformation (172). As discussed above, privacy module 24A may determinethat the incoming communication includes private information based on,for example, one or more predefined privacy settings, the sender of theincoming communication, and the content of the incoming communication,among other things. If the incoming communication does not includeprivate information (“NO” branch of 172), computing device 10A may beconfigured to output at least an indication of the incomingcommunication (176).

In examples where the incoming communication includes privateinformation (“YES” branch of 172), privacy module 24A may determinewhether or not computing device 10A is currently designated to displayprivate information (174). Privacy module 24A may determine whether ornot computing device 10A is currently designated to display privateinformation based at least in part on whether one or more individualsother than the user associated with computing device 10A are currentlyview a display of computing device 10A (e.g., as determined by presencedetection module 22A), whether the user is currently using computingdevice 10A, whether computing device 10A is currently being used for apresentation based on the current location of computing device 10A(e.g., at the user's workplace), the currently active application (e.g.,presentation software), the current configuration of computing device10A (e.g., connected to an external display device, such as aprojector), etc. as well as any combination thereof.

Responsive to determining that computing device 10A is currentlydesignated to display private information (“YES” branch of 174),computing device 10A outputs at least an indication of the incomingcommunication (176). Responsive to determining that computing device 10Ais not currently designated to display private information (“NO” branchof 174), in some examples, computing device 10A may determine if thereare other computing devices associated with the same user that isassociated with computing device 10A (178), while, in other examples,information server system 40 determines may determine if there are othercomputing devices associated with the same user that is associated withcomputing device 10A (178). In either example, if no other computingdevices are associated with the user, computing device refrains fromoutputting at least an indication of the incoming communication (182).

In instances where there are other computing devices associated with theuser (e.g., computing device 10N) (“YES” branch of 178), computingdevice 10A and/or information server system 40 identifies an additionalcomputing device associated with the user (180). In some examples,information server system 40 determines whether the identified computingdevice (e.g., computing device 10N) is currently designated to displayprivate information (174). In some examples, the identified computingdevice receives an indication of the incoming communication anddetermines whether or not it is currently designated to display privateinformation (174). Typically, the process continues until either atleast an indication of the incoming communication is output by acomputing device or until it is determined that there are no computingdevices associated with the user that are currently designated todisplay private information.

Example 1

A method comprising: determining, by a computing device, whether thecomputing device is currently designated to display private informationby at least determining whether one or more individuals other than auser to whom the incoming communication is directed are likely to viewthe indication of the incoming communication if the indication of theincoming communication is output by the computing device; receiving, bythe computing device, an incoming communication; determining that theincoming communication includes particular private information; if thecomputing device is currently designated to display private information,outputting, by the computing device and for display, an indication ofthe incoming communication; and if the computing device is not currentlydesignated to display private information, refraining from outputting,by the computing device and for display, the indication of the incomingcommunication.

Example 2

The method of example 1, wherein the computing device is a firstcomputing device associated with a user, the method further comprising:responsive to determining that the first computing device is notcurrently designated to display private information: determining that asecond computing device associated with the user is currently designatedto display private information; and providing, by the first computingdevice and to the second computing device, the indication of theincoming communication to the second computing device.

Example 3

The method of any of examples 1-2, wherein the determining whether oneor more individuals other than a user to whom the incoming communicationis directed are likely to view the indication of the incomingcommunication if the indication of the incoming communication is outputby the computing device is based at least in part on a current locationof the computing device.

Example 4

The method of any of example 3, determining, based at least in part onthe current location of the computing device, whether one or moreindividuals other than a user to whom the incoming communication isdirected are likely to view the indication of the incoming communicationif the indication of the incoming communication is output by thecomputing device comprises: responsive to determining that the currentlocation type corresponds to a public location type, determining thatthe computing device is not currently designated to output privateinformation; and responsive to determining that the current locationcorresponds to a home location type, determining that the computingdevice is currently designated to output private information.

Example 5

The method of any of examples 1-4, wherein determining whether one ormore individuals other than a user to whom the incoming communication isdirected are likely to view the indication of the incoming communicationif the indication of the incoming communication is output by thecomputing device comprises: determining, by the computing device, acurrently active user account of the computing device; responsive todetermining that the user to whom the incoming communication is directedis associated with the currently active user account, determining thatthe computing device is currently designated to display privateinformation; and responsive to determining that the user to whom theincoming communication is directed is not associated with the currentlyactive user account, determining that the computing device is notcurrently designated to display private information.

Example 6

The method of any of examples 1-5, wherein determining whether one ormore individuals other than a user to whom the incoming communication isdirected are likely to view the indication of the incoming communicationif the indication of the incoming communication is output by thecomputing device comprises: determining, by the computing device,whether the computing device is currently being worn; responsive todetermining that the computing device is currently being worn,determining that the computing device is currently designated to displayprivate information; and responsive to determining that the computingdevice is not currently being worn, determining that the computingdevice is not currently designated to display private information.

Example 7

The method of any of examples 1-6, wherein determining whether one ormore individuals other than a user to whom the incoming communication isdirected are likely to view the indication of the incoming communicationif the indication of the incoming communication is output by thecomputing device comprises: determining, by the computing device,whether one or more other devices are located proximate to the computingdevice; responsive to determining that no other devices are locatedproximate to the computing device, determining that the computing deviceis currently designated to display private information; and responsiveto determining that the one or more other devices are located proximateto the computing device: responsive to determining that none of the oneor more other devices is associated with the user to whom the incomingcommunication is directed, determining that the computing device iscurrently designated to display private information; and responsive todetermining that at least one of the one or more other devices isassociated with a user other than the user to whom the incomingcommunication is directed, determining that the computing device is notcurrently designated to display private information.

Example 8

The method of any of examples 1-7, wherein determining whether one ormore individuals other than a user to whom the incoming communication isdirected are likely to view the indication of the incoming communicationif the indication of the incoming communication is output by thecomputing device comprises: capturing, by the computing device, audiodata; determining, by the computing device, whether the audio dataincludes one or more voices associated with individuals other than auser associated with the computing device; responsive to determiningthat the audio data includes the one or more voices, determining thatthe computing device is not currently designated to display privateinformation; and responsive to determining that the audio data does notinclude the one or more voices, determining that the computing device iscurrently designated to display private information.

Example 9

The method of any of examples 1-8, wherein determining whether one ormore individuals other than a user to whom the incoming communication isdirected are likely to view the indication of the incoming communicationif the indication of the incoming communication is output by thecomputing device comprises: capturing, by the computing device, visualdata; determining, by the computing device, whether the visual dataincludes at least one face other than a face of a user associated withthe computing device; responsive to determining that the visual dataincludes the at least one face other than the face of the userassociated with the computing device, determining that the computingdevice is not currently designated to display private information; andresponsive to determining that the visual data does not include the atleast one face other than the face of the user associated with thecomputing device, determining that the computing device is currentlydesignated to display private information.

Example 10

The method of any of examples 1-9, wherein determining that the incomingcommunication includes content that is private information comprises:identifying, by the computing device, one or more objects included inimage data of the incoming communication; and determining, based on theone or more objects, that the incoming communication includes privateinformation.

Example 11

The method of any of examples 1-10, wherein determining that theincoming communication includes content that is private information isbased on one or more of a sender of the incoming communication, a typeof relationship between a user associated with the computing device andthe sender of the incoming communication, content of the incomingcommunication, and a privacy flag included in the incomingcommunication.

Example 12

A computing device comprising: one or more processors; and at least onemodule executable by the one or more processors to: determine whetherthe computing device is currently designated to display privateinformation by at least determining whether one or more individualsother than a user to whom the incoming communication is directed arelikely to view the indication of the incoming communication if theindication of the incoming communication is output by the computingdevice; receive an incoming communication; determine that the incomingcommunication includes content that is private information; if thecomputing device is currently designated to display private information,output, for display, an indication of the incoming communication; and ifthe computing device is not currently designated to display privateinformation, refrain from outputting, for display, the indication of theincoming communication.

Example 13

The computing device of example 12, wherein the computing device is afirst computing device associated with a user, and wherein the at leastone module is further executable by the one or more processors to:responsive to determining that the first computing device is notcurrently designated to display private information: determine that asecond computing device associated with the user is currently designatedto display private information; and provide, to the second computingdevice, the indication of the incoming communication to the secondcomputing device.

Example 14

The computing device of any of examples 12-13, wherein the at least onemodule is further executable by the one or more processors to: determinea current location of the computing device; and determine, based atleast in part on the current location, whether the one or moreindividuals other than the user to whom the incoming communication isdirected are likely to view the indication of the incoming communicationif the indication of the incoming communication is output by thecomputing device.

Example 15

The computing device of example 14, wherein the at least one module isfurther operably by the one or more processors to: responsive todetermining that the current location type corresponds to a publiclocation type, determine that the computing device is not currentlydesignated to output private information; and responsive to determiningthat the current location corresponds to a home location type, determinethat the computing device is currently designated to output privateinformation.

Example 16

The computing device of any of examples 12-15, wherein the at least onemodule is further executable by the one or more processors to determinea currently active user account of the computing device; responsive todetermining that the user to whom the incoming communication is directedis associated with the currently active user account, determining thatthe computing device is currently designated to display privateinformation; and responsive to determining that the user to whom theincoming communication is directed is not associated with the currentlyactive user account, determining that the computing device is notcurrently designated to display private information.

Example 17

The computing device of any of examples 12-16, wherein the at least onemodule is further executable by the one or more processors to: determinewhether the computing device is currently being worn; responsive todetermining that the computing device is currently being worn, determinethat the computing device is currently designated to display privateinformation; and responsive to determining that the computing device isnot currently being worn, determine that the computing device is notcurrently designated to display private information.

Example 18

The computing device of any of examples 12-17, wherein the at least onemodule is further operably by the one or more processors to: determinewhether one or more other devices are located proximate to the computingdevice; responsive to determining that no other devices are locatedproximate to the computing device, determine that the computing deviceis currently designated to display private information; and responsiveto determining that the one or more other devices are located proximateto the computing device: responsive to determining that none of the oneor more other devices is associated with the user to whom the incomingcommunication is directed, determine that the computing device iscurrently designated to display private information; and responsive todetermining that at least one of the one or more other devices isassociated with a user other than the user to whom the incomingcommunication is directed, determine that the computing device is notcurrently designated to display private information.

Example 19

The computing device of any of examples 12-18, wherein the at least onemodule is further operably by the one or more processors to: captureaudio data; determine whether the audio data includes one or more voicesassociated with individuals other than a user associated with thecomputing device; responsive to determining that the audio data includesthe one or more voices, determine that the computing device is notcurrently designated to display private information; and responsive todetermining that the audio data does not include the one or more voices,determine that the computing device is currently designated to displayprivate information.

Example 20

The computing device of any of examples 12-19, wherein the at least onemodule is further operably by the one or more processors to: capturevisual data; determine whether the visual data includes at least oneface other than a face of a user associated with the computing device;responsive to determining that the visual data includes the at least oneface other than the face of the user associated with the computingdevice, determine that the computing device is not currently designatedto display private information; and responsive to determining that thevisual data does not include the at least one face other than the faceof the user associated with the computing device, determine that thecomputing device is currently designated to display private information.

Example 21

The computing device of any of examples 12-20, wherein the at least onemodule is further operably by the one or more processors to: identifyone or more objects included in image data of the incomingcommunication; and determine, based on the one or more objects, whetherthe incoming communication includes private information.

Example 22

The computing device of any of examples 12-21, wherein the at least onemodule is further operably by the one or more processors to: determinewhether the incoming communication includes private information based atleast in part on one or more of a sender of the incoming communication,a type of relationship between a user associated with the computingdevice and the sender of the incoming communication, content of theincoming communication, and a privacy flag included in the incomingcommunication.

Example 23

A computing device comprising means for performing the method recited byany of examples 1-11.

Example 24

A computer-readable storage medium comprising instructions that, whenexecuted, configure one or more processors of a computing system to:determine whether the computing device is currently designated todisplay private information by at least determining whether one or moreindividuals other than a user to whom the incoming communication isdirected are likely to view the indication of the incoming communicationif the indication of the incoming communication is output by thecomputing device; receive an incoming communication; determine that theincoming communication includes content that is private information; ifthe computing device is currently designated to display privateinformation, output, for display, an indication of the incomingcommunication; and if the computing device is not currently designatedto display private information, refrain from outputting, for display,the indication of the incoming communication.

Example 25

A computer-readable storage medium comprising instructions that, whenexecuted, cause one or more processors of a computing device to performthe method recited by any of examples 1-11.

The techniques described in this disclosure may be implemented, at leastin part, in hardware, software, firmware, or any combination thereof.For example, various aspects of the described techniques may beimplemented within one or more processors, including one or moremicroprocessors, digital signal processors (DSPs), application specificintegrated circuits (ASICs), field programmable gate arrays (FPGAs), orany other equivalent integrated or discrete logic circuitry, as well asany combinations of such components. The term “processor” or “processingcircuitry” may generally refer to any of the foregoing logic circuitry,alone or in combination with other logic circuitry, or any otherequivalent circuitry. A control unit including hardware may also performone or more of the techniques of this disclosure.

Such hardware, software, and firmware may be implemented within the samedevice or within separate devices to support the various techniquesdescribed in this disclosure. In addition, any of the described units,modules or components may be implemented together or separately asdiscrete but interoperable logic devices. Depiction of differentfeatures as modules or units is intended to highlight differentfunctional aspects and does not necessarily imply that such modules orunits must be realized by separate hardware, firmware, or softwarecomponents. Rather, functionality associated with one or more modules orunits may be performed by separate hardware, firmware, or softwarecomponents, or integrated within common or separate hardware, firmware,or software components.

The techniques described in this disclosure may also be embodied orencoded in an article of manufacture including a computer-readablestorage medium encoded with instructions. Instructions embedded orencoded in an article of manufacture including a computer-readablestorage medium encoded, may cause one or more programmable processors,or other processors, to implement one or more of the techniquesdescribed herein, such as when instructions included or encoded in thecomputer-readable storage medium are executed by the one or moreprocessors. Computer readable storage media may include random accessmemory (RAM), read only memory (ROM), programmable read only memory(PROM), erasable programmable read only memory (EPROM), electronicallyerasable programmable read only memory (EEPROM), flash memory, a harddisk, a compact disc ROM (CD-ROM), a floppy disk, a cassette, magneticmedia, optical media, or other computer readable media. In someexamples, an article of manufacture may include one or morecomputer-readable storage media.

In some examples, a computer-readable storage medium may include anon-transitory medium. The term “non-transitory” may indicate that thestorage medium is not embodied in a carrier wave or a propagated signal.In certain examples, a non-transitory storage medium may store data thatcan, over time, change (e.g., in RAM or cache).

Various examples of the invention have been described. These and otherexamples are within the scope of the following claims.

What is claimed is:
 1. A method comprising: receiving, by a computingdevice, an incoming communication; determining that the incomingcommunication includes private information; determining, by a computingdevice, whether the computing device is currently designated to displayprivate information by at least: responsive to determining that no otherdevices are located proximate to the computing device, determining thatthe computing device is currently designated to display privateinformation; responsive to determining that the one or more otherdevices are located proximate to the computing device: responsive todetermining that the one or more other devices are associated with theuser to whom the incoming communication is directed, determining thatthe computing device is currently designated to display privateinformation; and responsive to determining that at least one of the oneor more other devices is associated with a user other than the user towhom the incoming communication is directed, determining that thecomputing device is not currently designated to display privateinformation; if the computing device is currently designated to displayprivate information, outputting, by the computing device and fordisplay, the indication of the incoming communication; and if thecomputing device is not currently designated to display privateinformation, refraining from outputting, by the computing device and fordisplay, the indication of the incoming communication.
 2. The method ofclaim 1, wherein the computing device is a first computing deviceassociated with a user, the method further comprising: responsive todetermining that the first computing device is not currently designatedto display private information: determining that a second computingdevice associated with the user is currently designated to displayprivate information; and providing, by the first computing device and tothe second computing device, the indication of the incomingcommunication.
 3. The method of claim 1, wherein the determining whetherone or more other devices are located proximate to the computing deviceis based at least in part on a current location of the computing device.4. The method of claim 3, wherein determining, based at least in part onthe current location of the computing device, whether one or more otherdevices are located proximate to the computing device comprises:responsive to determining that the current location type corresponds toa public location type, determining that the computing device is notcurrently designated to output private information; and responsive todetermining that the current location corresponds to a home locationtype, determining that the computing device is currently designated tooutput private information.
 5. The method of claim 1, whereindetermining whether the computing device is currently designated todisplay private information further comprises: determining, by thecomputing device, a currently active user account of the computingdevice; responsive to determining that the user to whom the incomingcommunication is directed is associated with the currently active useraccount, determining that the computing device is currently designatedto display private information; and responsive to determining that theuser to whom the incoming communication is directed is not associatedwith the currently active user account, determining that the computingdevice is not currently designated to display private information. 6.The method of claim 1, wherein determining whether the computing deviceis currently designated to display private information furthercomprises: determining, by the computing device, whether the computingdevice is currently being worn; responsive to determining that thecomputing device is currently being worn, determining that the computingdevice is currently designated to display private information; andresponsive to determining that the computing device is not currentlybeing worn, determining that the computing device is not currentlydesignated to display private information.
 7. The method of claim 1,wherein determining whether the computing device is currently designatedto display private information further comprises: capturing, by thecomputing device, audio data; determining, by the computing device,whether the audio data includes one or more voices associated withindividuals other than a user associated with the computing device;responsive to determining that the audio data includes the one or morevoices, determining that the computing device is not currentlydesignated to display private information; and responsive to determiningthat the audio data does not include the one or more voices, determiningthat the computing device is currently designated to display privateinformation.
 8. The method of claim 1, wherein determining whether thecomputing device is currently designated to display private informationfurther comprises: capturing, by the computing device, visual data;determining, by the computing device, whether the visual data includesat least one face other than a face of a user associated with thecomputing device; responsive to determining that the visual dataincludes the at least one face other than the face of the userassociated with the computing device, determining that the computingdevice is not currently designated to display private information; andresponsive to determining that the visual data does not include the atleast one face other than the face of the user associated with thecomputing device, determining that the computing device is currentlydesignated to display private information.
 9. The method of claim 1,wherein determining that the incoming communication includes contentthat is private information comprises: identifying, by the computingdevice, one or more objects included in image data of the incomingcommunication; and determining, based on the one or more objects, thatthe incoming communication includes private information.
 10. The methodof claim 1, wherein the determining that the incoming communicationincludes private information is based on one or more of a sender of theincoming communication, a type of relationship between a user associatedwith the computing device and the sender of the incoming communication,content of the incoming communication, and a privacy flag included inthe incoming communication.
 11. A computing device comprising: one ormore processors; and at least one module operable by the one or moreprocessors to: receive an incoming communication; determine that theincoming communication includes content that is private information;determine whether the computing device is currently designated todisplay private information by at least; responsive to determining thatno other devices are located proximate to the computing device,determine that the computing device is currently designated to displayprivate information; responsive to determining that the one or moreother devices are located proximate to the computing device: responsiveto determining that the one or more other devices are associated withthe user to whom the incoming communication is directed, determine thatthe computing device is currently designated to display privateinformation; and responsive to determining that at least one of the oneor more other devices is associated with a user other than the user towhom the incoming communication is directed, determine that thecomputing device is not currently designated to display privateinformation; if the computing device is currently designated to displayprivate information, output, for display, the indication of the incomingcommunication; and if the computing device is not currently designatedto display private information, refrain from outputting, for display,the indication of the incoming communication.
 12. The computing deviceof claim 11, wherein the computing device is a first computing deviceassociated with a user, and wherein the at least one module is furtheroperably by the one or more processors to: responsive to determiningthat the first computing device is not currently designated to displayprivate information: determine that a second computing device associatedwith the user is currently designated to display private information;and provide, to the second computing device, the indication of theincoming communication.
 13. The computing device of claim 11, whereinthe at least one module is further operably by the one or moreprocessors to: determine a current location of the computing device; anddetermine, based at least in part on the current location, whether theone or more other devices are located proximate to the computing device.14. The computing device of claim 13, wherein the at least one module isfurther operably by the one or more processors to: responsive todetermining that the current location type corresponds to a publiclocation type, determine that the computing device is not currentlydesignated to output private information; and responsive to determiningthat the current location corresponds to a home location type, determinethat the computing device is currently designated to output privateinformation.
 15. The computing device of claim 11, wherein the at leastone module is further operably by the one or more processors to:determine a currently active user account of the computing device;responsive to determining that the user to whom the incomingcommunication is directed is associated with the currently active useraccount, determining that the computing device is currently designatedto display private information; and responsive to determining that theuser to whom the incoming communication is directed is not associatedwith the currently active user account, determining that the computingdevice is not currently designated to display private information. 16.The computing device of claim 11, wherein the at least one module isfurther operably by the one or more processors to: determine whether thecomputing device is currently being worn; responsive to determining thatthe computing device is currently being worn, determine that thecomputing device is currently designated to display private information;and responsive to determining that the computing device is not currentlybeing worn, determine that the computing device is not currentlydesignated to display private information.
 17. The computing device ofclaim 11, wherein the at least one module is further operably by the oneor more processors to: capture audio data; determine whether the audiodata includes one or more voices associated with individuals other thana user associated with the computing device; responsive to determiningthat the audio data includes the one or more voices, determine that thecomputing device is not currently designated to display privateinformation; and responsive to determining that the audio data does notinclude the one or more voices, determine that the computing device iscurrently designated to display private information.
 18. The computingdevice of claim 11, wherein the at least one module is further operablyby the one or more processors to: capture visual data; determine whetherthe visual data includes at least one face other than a face of a userassociated with the computing device; responsive to determining that thevisual data includes the at least one face other than the face of theuser associated with the computing device, determine that the computingdevice is not currently designated to display private information; andresponsive to determining that the visual data does not include the atleast one face other than the face of the user associated with thecomputing device, determine that the computing device is currentlydesignated to display private information.
 19. The computing device ofclaim 11, wherein the at least one module is further operably by the oneor more processors to: identify one or more objects included in imagedata of the incoming communication; and determine, based on the one ormore objects, whether the incoming communication includes privateinformation.
 20. The computing device of claim 11, wherein the at leastone module is further operably by the one or more processors to:determine whether the incoming communication includes privateinformation based at least in part on one or more of a sender of theincoming communication, a type of relationship between a user associatedwith the computing device and the sender of the incoming communication,content of the incoming communication, and a privacy flag included inthe incoming communication.
 21. A computer-readable storage mediumcomprising instructions that, when executed, configure one or moreprocessors of a computing system to: receive an incoming communication;determine that the incoming communication includes content that isprivate information; determine whether the computing device is currentlydesignated to display private information by at least: responsive todetermining that no other devices are located proximate to the computingdevice, determining that the computing device is currently designated todisplay private information; responsive to determining that the one ormore other devices are located proximate to the computing device:responsive to determining that the one or more other devices areassociated with the user to whom the incoming communication is directed,determining that the computing device is currently designated to displayprivate information; and responsive to determining that at least one ofthe one or more other devices is associated with a user other than theuser to whom the incoming communication is directed, determining thatthe computing device is not currently designated to display privateinformation; if the computing device is currently designated to displayprivate information, output, for display, the indication of the incomingcommunication; and if the computing device is not currently designatedto display private information, refrain from outputting, for display,the indication of the incoming communication.