Apparatus and method for supporting telephonic synthetic identities

ABSTRACT

A machine has a processor and a memory connected to the processor. The memory stores instructions executed by the processor to match a communication sender number or a communication receiver number associated with a communication to a synthetic identity. A parameter associated with the synthetic identity is selected. Delivery of the communication is coordinated such that the recipient of the communication views the parameter upon receipt of the communication.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims priority to U.S. Provisional Patent ApplicationSer. No. 62/012,244, filed Jun. 13, 2014, the contents of which areincorporated herein by reference.

FIELD OF THE INVENTION

This invention relates generally to telephonic communications. Moreparticularly, this invention relates to techniques for supportingtelephonic synthetic identities.

BACKGROUND OF THE INVENTION

The use of multiple synthetic identities enables a user to both protecttheir real identity as well as compartmentalize their online and offlineactivities. A user may have multiple synthetic identities, each withdifferent identity attributes (e.g., different name, date of birth,telephone, email, delivery address, and so on). The user will selectwhich identity is appropriate in a given situation and which identityattributes are required for that identity. For example, a user maybrowse the web with a real user identity, limiting browsing to newssites. The user may then decide to swap to a different identity (i.e.,browse with a synthetic identity). The user may want to do this becausehe or she does not want social media interaction, which may be politicalin nature, to be linked to a real identity. Later the user might swap toanother synthetic identity, so that the user can purchase goods one-commerce sites without those purchases being linked to any otheridentity.

One of the complexities of using multiple synthetic identities ismanaging telephony communication with these identities. Over the courseof any week a user may act using a real identity and different syntheticidentities. The user will need a different phone number for eachidentity supporting incoming and outgoing messages and voice calls. Thedifficulty for the user is how to manage the communication interactionof multiple identities when a user typically has one mobile phonenumber. It can quickly become very confusing for the user, and errorprone, such that the user may inadvertently disclose a real identity.

One relatively straightforward approach is for the user to purchasemultiple phone numbers, one for their real identity and one for eachsynthetic identity, and swap from one to another. For example, the usercould purchase a separate mobile phone for each identity. The user givesout the phone number based on the interaction context. Unfortunatelythis scenario is not practical as users do not want to carry multiplemobile phones, and normal mobile phone contracts don't allow dynamicadding and deleting of phone services.

Accordingly, there is a need for a better system for managing telephoniccommunication for multiple synthetic identities. In particular, a usershould be able to receive and initiate both messages and voice callsfrom any real or synthetic identity, and be clear at any time whichidentity is in context.

SUMMARY OF THE INVENTION

A machine has a processor and a memory connected to the processor. Thememory stores instructions executed by the processor to match acommunication sender number or a communication receiver numberassociated with a communication to a synthetic identity. A parameterassociated with the synthetic identity is selected. Delivery of thecommunication is coordinated such that the recipient of thecommunication views the parameter upon receipt of the communication.

BRIEF DESCRIPTION OF THE FIGURES

The invention is more fully appreciated in connection with the followingdetailed description taken in conjunction with the accompanyingdrawings, in which:

FIG. 1 illustrates a system configured in accordance with an embodimentof the invention.

FIG. 2 illustrates a system configured in accordance with anotherembodiment of the invention.

FIG. 3 illustrates an interface utilized in accordance with anembodiment of the invention.

FIG. 4 illustrates incoming message signal processing in accordance withan embodiment of the invention.

FIG. 5 illustrates additional incoming message signal processing inaccordance with an embodiment of the invention.

FIG. 6 illustrates outgoing message signal processing in accordance withan embodiment of the invention.

FIG. 7 illustrates a user interface utilized in accordance with anembodiment of the invention.

FIG. 8 illustrates outgoing message signal processing in accordance withan embodiment of the invention.

FIG. 9 illustrates additional outgoing message signal processing inaccordance with an embodiment of the invention.

FIG. 10 illustrates outgoing message signal processing for a differentsynthetic identity.

FIG. 11 illustrates outgoing message signal processing for a differentsynthetic identity.

FIG. 12 illustrates additional outgoing message signal processing for adifferent synthetic identity.

FIG. 13 illustrates a synthetic identity receiving a voice call.

FIG. 14 illustrates a user interface for a synthetic identity receivinga voice call.

FIG. 15 illustrates signal processing associated with a syntheticidentity receiving a voice call.

FIG. 16 illustrates operations associated with a synthetic identitycalling a party in accordance with an embodiment of the invention.

FIG. 17 illustrates a user interface to facilitate a synthetic identitycalling a party.

FIG. 18 illustrates signal processing associated with a syntheticidentity calling a party.

FIG. 19 illustrates processing associated with one synthetic identitycalling another synthetic identity.

FIG. 20 illustrates signal processing associated with one syntheticidentity calling another synthetic identity.

Like reference numerals refer to corresponding parts throughout theseveral views of the drawings.

DETAILED DESCRIPTION OF THE INVENTION

The telephony based techniques disclosed herein contemplate telephoneapplications in the form of telephone calls and text messages. Considera situation where a user wants to send or receive text messages (e.g.,via Short Message Service (SMS) or Multimedia Message Service (MMS)).The user also wants to call or receive calls. This leads to a number ofrequirements that are satisfied by this invention. In particular, theinvention facilitates a user communicating at any time using a realidentity or a variety of synthetic identities. Each synthetic identityhas its own phone number. The invention makes it clear to the user whichidentity is in context for all communications; this reduces the chancethat the user will become confused and inadvertently disclose anidentity. A user may easily discard the synthetic identity andassociated phone number. Such an action does not impact thecommunications of any other identity.

FIG. 1 illustrates a system 100 configured in accordance with anembodiment of the invention. A synthetic identity management platform102 is operative with a communication cloud 104. The synthetic identitymanagement platform 102 includes one or more processors to executeinstructions stored in an associated memory. The instructions executedby the processor implement the operations described herein. TheSynthetic Identity Management Platform 102 (platform) enables thecreation, management and deletion of the synthetic identities for theuser. This includes creation of identity attributes such as name, dateof birth, credit, shipping address and phone numbers to be used formessages and voice communication. It also provides some coordination ofmessages and voice communication.

The Communications Cloud 104 is a computing resource available over anopen network to facilitate communication applications, such as messagingand telephony applications. A communication cloud resource vendorprovides configurable workflows for controlling communicationapplications through vendor supplied Application Program Interfaces(APIs). The communication applications support communications betweentwo or more parties, where each party may be using a real or a syntheticidentity. Communication cloud resources are used by communicationapplication developers to hide the complexity of telecommunicationcarrier interactions.

A client device 106 runs a synthetic identity telephony application 108.The client device 106 is a mobile device with a processor and associatedmemory to store instructions executed by the processor to implementoperations of the invention. In this example, the client device 106 iscurrently communicating as the synthetic identity called “ShoppingSally” 110. The avatar and name reminds the user of the purpose of thissynthetic identity. Another client device 112 communicates with clientdevice 106 associated with synthetic identity 110.

Consider the scenario of FIG. 2 where client device 112 sends a message(SMS/MMS) to the synthetic identity's phone number. This phone number isa specific number that the Communication Cloud 104 has provisioned forthe Shopping Sally identity 110. Upon receiving the message, theCommunication Cloud 104 communicates with the Synthetic IdentityManagement Platform 102. It sends the message to the Synthetic IdentityManagement Platform 102 and asks for further instructions. The platform102 receives the message and notifies the communication cloud 104 thatthere is no further action required from the Communication Cloud 104.The Synthetic Identity Management Platform 102 then uses the mobile'sPush Notification Service 200 to notify the Synthetic Identity TelephonyApplication 108 that a message is available. The Push NotificationService 200 is a standard service for mobile platforms, which allows aservice to communicate notifications with an application on the user'smobile device. After receiving notification from the Push NotificationService 200, the Synthetic Identity Telephony Application 108 calls intothe Synthetic Identity Management Platform 102 to retrieve the message.

FIG. 3 shows a user interface 300 for the Synthetic Identity TelephonyApplication. The user interface 300 illustrates a received message. Theuser interface 300 provides context of the message (i.e., it specifieswhich Synthetic Identity has received the message). In this case theavatar of Shopping Sally is shown. Additionally, the application showsthe sender of the message (caller ID), which is John Smith. The twopieces of information are vital for the user to be sure of the contextand to know how to respond. Note that a standard telephony applicationon a mobile device is not able to display the two pieces of contextinformation and hence cannot support multiple synthetic identities in apractical way.

FIG. 4 more particularly characterizes the operations discussed inconnection with FIG. 2. End user device 112 initiates an SMS/MMS message400 to the synthetic identity 110. The communication cloud 104 processesthe message and requests 402 instructions from the synthetic identitymanagement platform 102. In this case, the communication cloud 104 isadvised that no further action 404 is required. The platform 102provides a notification 406 to the push notification service 200. Thepush notification service 200 sends a notification message 408 to thesynthetic identity telephone application 108.

Turning to FIG. 5, the synthetic identity telephone application 108requests the message 500 from the synthetic identity management platform102. The platform 102 then supplies a list 502 of messages. Theapplication 108 then specifies a message 504 to fetch. The platform 102then supplies the specified message 506 to the application 108, whichallows the user 110 to view it, as shown in FIG. 3. Additional messagesmay be fetched in the same manner.

FIG. 6 illustrates a scenario in which the Synthetic Identity (ShoppingSally) 110 sends a message (SMS/MMS) to an end user device 112. TheSynthetic Identity Telephony Application 108 sends a message to theSynthetic Identity Management Platform 102. The Synthetic IdentityManagement Platform 102 sends the message to the Communications Cloud104. The Communication Cloud 104 sends the SMS/MMS to the end user'smobile device 112. This sequence is asynchronous; it requires an out ofbound notification or regular polling to know when a particular step iscompleted. The implementation is different from a “synchronous” sequencewhere the component waits at each step for a completed response. In thesequence the Push Notification Service 200 is used to notify theSynthetic Identity Telephony Application 102 of the current status(e.g., message has been sent to the Communications Cloud 104, messagehas been successfully delivered to the end user 112).

FIG. 7 shows an interface 700 for when a user is sending a message (orin the case shown replying to the original message). The application 108groups messages by Synthetic Identity (Shopping Sally) and also by enduser (John Smith). The user interface 700 enables the user to understandthe context of the received message and helps the user to send thecorrect response. Note that the end user (John Smith) will see themessage originating from the synthetic identity phone number (i.e.,Shopping Sally's phone number). This keeps communication in the rightcontext. The user interface 700 is designed to stop the user frombecoming confused and to remain clear at all times about the identitycontext.

FIG. 8 provides a more detailed characterization of the processing ofFIG. 6. User 110 inputs a message 800 destined for the end user phone112 into the synthetic identity telephony application 108. Theapplication 108 posts the message 802 to the synthetic identitymanagement platform 102. The platform 102 looks up the syntheticidentity telephone number and instructs the communication cloud 104 toinitiate a text to end user phone from the synthetic identity telephonenumber.

Signal 804 between the platform 102 and the application 108 demonstratesthe asynchronous processing associated with this embodiment of theinvention. The application 108 needs to poll the platform 102 or waitfor a push notification from the platform 102 to know the status of themessage. The platform 102 then sends instructions 806 to thecommunication cloud 104. The instructions 806 may specify the syntheticidentity phone number, the end-user phone number and the message. Anacknowledgement 808 is sent from the communication cloud 104 to theplatform 102. A notification 810 is then sent from the platform 102 tothe push notification service 200. The push notification service 200then sends the message 812 to the application 108. This message is asilent notification for the application; the user does not see it.

Turning to FIG. 9, the next operation is for the communication cloud 104to deliver the message 800 to the end-user phone 112. The communicationcloud 104 confirms 802 with the platform 102 that the message isdelivered. The platform 102 sends a notification 804 to the pushnotification service 200, which sends a notification 806 to theapplication 108.

An improvement to this processing can be achieved when the receiver isalso a synthetic identity with a Synthetic Identity TelephonyApplication. In this case the Communications Cloud 104 does not need tobe used, and instead of an SMS/MMS, the receiving Synthetic IdentityTelephony Application is notified of a message and retrieves it directlyfrom the Synthetic Identity Management Platform 102. This is shown inFIG. 10.

FIG. 10 corresponds to FIG. 6, but includes a client device 1000executing a synthetic identity telephone application 1002 to servicesynthetic identity 1004. In this case the Communication Cloud 104 can bebypassed altogether and the Synthetic Identity Management Platform 102coordinates the delivery of the message. Note that the sender does notknow that she is sending to another synthetic identity; it is up to theSynthetic Identity Management Platform 102 to determine this.

The detailed underlying signal processing is shown in FIGS. 11 and 12.User 110 generates a message 1100 utilizing the synthetic identitytelephone application 108. The application 108 posts the message 1102 tothe synthetic identity management platform 102. The platform 102 looksup the synthetic identity phone number of the caller (i.e., syntheticidentity 110 associated with application 108 and device 106). At theplatform 102, the end user phone number is matched to a syntheticidentity. Device tokens for both synthetic identities are looked up andthe message is stored. A first notification 1104 is then sent to thepush notification service 200. This push notification is to tell thesending synthetic identity telephony application that the message hasbeen delivered. Another notification 1106 is sent to the pushnotification service 200. This push notification is to tell thereceiving synthetic identity telephony application that message has beenreceived. A message delivered notification 1108 is then sent to thesending application 108. A notification 1110 is then sent to thereceiving application 1002.

Turning to FIG. 12, in response to the notification 1110, the receivingapplication 1002 requests 1200 the message from the platform 102. Theplatform 102 returns a list of messages 1202 that have not been fetched.The application 1002 sends a message identification 1204 for a messageto be returned. The platform 102 then supplies the message 1206.Additional messages may be fetched in the same manner.

In the scenario of FIG. 13, a party 1302 using device 1300 makes a voicecall to the phone number for synthetic identity 110. In particular, JohnSmith 1302 calls Shopping Sally's phone number. This phone number is aspecific number that the platform 102 has requested from theCommunication Cloud 104 for the Shopping Sally identity. TheCommunication Cloud 104 communicates with the Synthetic IdentityManagement Platform 102. The platform 102 responds with instructions toforward a data call (VoIP) to the user's Synthetic Identity TelephonyApplication 108. It is necessary to establish a VoIP call with theuser's Synthetic Identity Telephony Application 108 so that it canprovide the full context information to the user (i.e., SyntheticIdentity being called and caller). If a standard voice call was made tothe user's standard mobile phone application, then only the caller ID ofthe caller is available.

FIG. 14 shows a user interface 1400 with an avatar that shows that themessage is intended for Shopping Sally. The caller (John Smith) is alsoidentified. This interface allows the user to understand the fullcontext of the incoming call. That is, both the synthetic identity(Shopping Sally) being called and the caller (John Smith) areidentified. This is not possible with standard mobile device phoneapplications.

FIG. 15 more particularly characterizes this processing. End user 1300initiates a voice call 1500, which is received in the communicationcloud 104. The communication cloud 104 requests instructions 1502 fromthe platform 102. The platform 102 generates instructions 1504, whichspecify a VoIP call to a synthetic identity application from the calloriginator. The communication cloud 104 initiates the call 1506 inresponse to these instructions. The call 1506 transpires between thecommunication cloud 104 and the application 108. More particularly, thecommunication cloud 104 coordinates signal paths 1506 and 1500 toestablish a voice call.

FIG. 16 illustrates a scenario in which the synthetic identity (ShoppingSally) 110 using device 106 wants to call the user (John Smith) 1602using device 1600. The Synthetic Identity Telephony Application 108makes a VoIP call to the Communications Cloud 104. A VoIP call isrequired so that the full synthetic identity context can be relayed tothe Communications Cloud 104. The Communication Cloud 104 receives theVoIP call, and communicates with the Synthetic Identity ManagementPlatform 102 for instructions. The Synthetic Identity ManagementPlatform 102 instructs the Communications Cloud 104 to open a Voice callto the party (John Smith). The Communications Cloud 104 initiates thecall.

FIG. 17 shows the user interface 1700 of the Synthetic IdentityTelephony Application when used to call the party (John Smith). The useris working in the context of Shopping Sally as shown by the name andavatar. The synthetic identity can access the Synthetic Identity addressbook or use the dialing function. The party (John Smith) receives a callfrom the synthetic identity number (Shopping Sally). The user interface1700 supplies the working context to avoid confusion.

The foregoing processing is more fully characterized in FIG. 18. User110 initiates a call 1800 using application 108. The application 108requests a VOIP connection 1802 with communication cloud 104. A VoIPcall is initiated 1804 between the communication cloud 104 and theapplication 108. The communication cloud 104 requests instructions 1806from the platform 102 regarding how to handle the call. The platform 102sends information 1808 to the communication cloud 104. The communicationcloud 104 then establishes the call 1810 to the end-user phone 1600. Thecommunication cloud 104 links the two sessions 1804 and 1810.

An alternative to the above sequence can be made when the receiver isalso a synthetic identity with a Synthetic Identity TelephonyApplication. FIG. 19 illustrates this scenario with device 1900 andsynthetic identity telephony application 1902. In this case theCommunications Cloud 104 can use a VoIP call to the receiving SyntheticIdentity Telephony Application 1902.

FIG. 20 illustrates synthetic identity 110 initiating a call request2000 via application 108. The application requests a VoIP connection2002 from the communication cloud 104. A VoIP session 2004 is initiatedbetween the communication cloud 104 and the application 108. Thecommunication cloud 104 requests instructions 2006 from the platform102. The platform 102 looks up the synthetic identity phone number,matches the end-user phone number to the synthetic identity andinstructs 2008 the communication cloud 104 to complete the VoIP call.The communication cloud 104 establishes a VoIP call 2010 with the enduser application 1902 and links sessions 2004 and 2010.

An embodiment of the present invention relates to a computer storageproduct with a non-transitory computer readable storage medium havingcomputer code thereon for performing various computer-implementedoperations. The media and computer code may be those specially designedand constructed for the purposes of the present invention, or they maybe of the kind well known and available to those having skill in thecomputer software arts. Examples of computer-readable media include, butare not limited to: magnetic media, optical media, magneto-optical mediaand hardware devices that are specially configured to store and executeprogram code, such as application-specific integrated circuits(“ASICs”), programmable logic devices (“PLDs”) and ROM and RAM devices.Examples of computer code include machine code, such as produced by acompiler, and files containing higher-level code that are executed by acomputer using an interpreter. For example, an embodiment of theinvention may be implemented using JAVA®, C++, or other object-orientedprogramming language and development tools. Another embodiment of theinvention may be implemented in hardwired circuitry in place of, or incombination with, machine-executable software instructions.

The foregoing description, for purposes of explanation, used specificnomenclature to provide a thorough understanding of the invention.However, it will be apparent to one skilled in the art that specificdetails are not required in order to practice the invention. Thus, theforegoing descriptions of specific embodiments of the invention arepresented for purposes of illustration and description. They are notintended to be exhaustive or to limit the invention to the precise formsdisclosed; obviously, many modifications and variations are possible inview of the above teachings. The embodiments were chosen and describedin order to best explain the principles of the invention and itspractical applications, they thereby enable others skilled in the art tobest utilize the invention and various embodiments with variousmodifications as are suited to the particular use contemplated. It isintended that the following claims and their equivalents define thescope of the invention.

The invention claimed is:
 1. A machine, comprising: a processor; and amemory connected to the processor, the memory storing instructionsexecuted by the processor to: match a communication sender number or acommunication receiver number associated with a communication to asynthetic identity, wherein the synthetic identity is one of a pluralityof synthetic identities associated with a real user, wherein eachsynthetic identity has unique identity attributes, select a parameterassociated with the synthetic identity, wherein the parameter is one ofthe unique identity attributes, and coordinate delivery of thecommunication such that the recipient of the communication views theparameter upon receipt of the communication and thereby views a uniqueidentity attribute of the synthetic identity.
 2. The machine of claim 1wherein the communication is a text message.
 3. The machine of claim 1wherein the communication is a telephone call.
 4. The machine of claim 1wherein the parameter is selected from a synthetic identity name and asynthetic identity telephone number.
 5. The machine of claim 1 whereinthe instructions executed by he processor to coordinate delivery of thecommunication include instructions to supply a user interface thatdisplays the parameter.
 6. The machine of claim 1 wherein theinstructions executed by the processor to coordinate delivery of thecommunication include instructions to coordinate delivery of thecommunication from the machine.
 7. The machine of claim 1 wherein theinstructions executed by the processor to coordinate delivery of thecommunication include instructions to coordinate delivery of thecommunication from a different machine.
 8. The machine of claim 1further comprising instructions executed by the processor to coordinatea message notification to the recipient of the communication.