Preventing unauthorized access to secured information using identification techniques

ABSTRACT

A vehicle computing platform may receive driver sensor data indicating whether a driver seat in a vehicle is occupied. The vehicle computing platform may determine, based on the driver sensor data, an identity of a driver of the vehicle. The vehicle computing platform may receive passenger sensor data indicating whether a passenger seat in the vehicle is occupied. The vehicle computing platform may, based on the passenger sensor data indicating that the passenger seat in the vehicle is occupied, obscure information on a screen of the vehicle.

BACKGROUND

Aspects of the disclosure relate to providing information security andpreventing unauthorized access to resources of an information system. Inparticular, one or more aspects of the disclosure relate to preventingunauthorized access to secured information using identificationtechniques.

As vehicles and devices increasingly provide audio or visual displaysfor various users to access, view, and/or modify information, includingclient information, ensuring the safety and security of information madeavailable is increasingly important. In many instances, however, it maybe difficult to ensure the safety and security of such information whilealso optimizing the efficient and effective technical operations of thecomputer systems, vehicles, and/or devices that maintain and/or providesuch information.

SUMMARY

Aspects of the disclosure provide effective, efficient, scalable, andconvenient technical solutions that address and overcome the technicalproblems associated with providing information and preventingunauthorized access to information resources by implementingidentification techniques, as well as information-obscuring techniques.

In accordance with one or more embodiments, a computing platform havingat least one processor and a memory may receive driver sensor dataindicating whether a driver seat in a vehicle is occupied. The computingplatform may determine, based on the driver sensor data, an identity ofa driver of the vehicle. The computing platform may receive passengersensor data indicating whether a passenger seat in the vehicle isoccupied. The computing platform may, based on the passenger sensor dataindicating that the passenger seat in the vehicle is occupied, obscureinformation on a screen of the vehicle.

In some embodiments, the information on the screen of the vehicle isinformation associated with a driver of the vehicle. In someembodiments, the information on the screen of the vehicle is one of atext message to the driver of the vehicle, a voicemail to the driver ofthe vehicle, or a call history of the driver of the vehicle.

In some embodiments, based on the driver sensor data indicating that thedriver seat in the vehicle is not occupied, and the passenger sensordata indicating that the passenger seat in the vehicle is occupied, thecomputing platform may deactivate the screen of the vehicle. In someembodiments, the computing platform may receive driver identificationinformation, and activate a driver profile based on the identity of thedriver of the vehicle.

In some embodiments, the computing platform may receive passengeridentification information. The computing platform may determine anidentity of a passenger of the vehicle based on the passengeridentification information. The computing platform may determine theinformation to be obscured based on the identity of the passenger.

In some embodiments, the computing platform may receive, from a camera,at least one image of the passenger of the vehicle. The passengeridentification information may include the at least one image of thepassenger of the vehicle. Furthermore, determining the identity of thepassenger of the vehicle may include performing face recognition of theat least one image of the passenger of the vehicle to determine theidentity of the passenger.

In some embodiments, the computing platform may receive, from amicrophone, audio that includes speech spoken by the passenger of thevehicle. The passenger identification information may include the audio.Furthermore, determining the identity of the passenger of the vehiclemay include performing voice recognition of the audio to determine theidentity of the passenger.

In some embodiments, the computing platform may, based on the identityof the passenger of the vehicle, determine a privacy mode of a pluralityof privacy modes. The computing platform may activate the privacy mode.The computing platform may determine, based on the privacy mode, theinformation to be obscured.

In some embodiments, the computing platform may, in a case that a firstprivacy mode of the plurality of privacy modes is activated, apply afirst privacy setting to a first application of the vehicle, and apply asecond privacy setting to a second application of the vehicle. In someembodiments, the computing platform may, in a case that a second privacymode of the plurality of privacy modes is activated, apply a thirdprivacy setting to the first application, the third privacy settingbeing different from the first privacy setting, and apply a fourthprivacy setting to the second application, the fourth privacy settingbeing different from the second privacy setting.

In some embodiments, the computing platform may determine a location ofthe vehicle. In some embodiments, the computing platform may select theinformation to be obscured based on the location of the vehicle.

In some embodiments, determining a location of the vehicle may includedetermining that the location of the vehicle indicates that the vehicleis within a predetermined geo-fence of a plurality of predeterminedgeo-fences. In some embodiments, selecting the information to beobscured based on the location of the vehicle may include determiningwhether a profile associated with the predetermined geo-fence indicatesthat the information is to be obscured.

In some embodiments, the computing platform may determine a type of keybeing used for the vehicle. The obscured information may include firstinformation in a case of a first type of key being used for the vehicle.The obscured information may include second information different fromthe first information in a case of a second type of key being used forthe vehicle. In some embodiments, the first type of key may be astandard key. In some embodiments, the second type of key may be alimited-use key.

In some embodiments, the computing platform may receive, from a userdevice associated with a driver of the vehicle, a privacy profile forthe vehicle. In some embodiments, the computing platform may determinethe information to be obscured based on the privacy profile for thevehicle. In some embodiments, the privacy profile for the vehicle may beassociated with a type of the vehicle.

In some embodiments, the computing platform may receive, via amicrophone of the vehicle, an activation phrase. The computing platformmay determine that the activation phrase corresponds to a privacy modeof a plurality of privacy modes. The computing platform may activate theprivacy mode. The activation phrase may be a distress phrase. Theprivacy mode may be a distress mode.

In accordance with one or more embodiments, a computing platform havingat least one processor and a memory may determine a privacy mode of avehicle, the privacy mode based on a first identity of the first vehicleoccupant and a second identity of a second vehicle occupant. Thecomputing platform may receive a request to initiate a communicationbetween the computing platform and a device outside the vehicle. Thecomputing platform may, before initiating the communication, provide anotification to the device outside the vehicle of a status of theprivacy mode of the vehicle.

In some embodiments, receiving the request to initiate the communicationbetween the computing platform and the device outside the vehicle mayinclude receiving a request to initiate a telephone call from the deviceoutside the vehicle. In some embodiments, receiving the request toinitiate the telephone call from the device outside the vehicle mayinclude receiving the telephone call from the device outside thevehicle.

In some embodiments, providing the notification to the device outsidethe vehicle of the status of the privacy mode of the vehicle may includeproviding an audio notification to a caller from the device outside thevehicle. The audio notification may include the status of the privacymode of the vehicle.

In some embodiments, the computing platform may provide notification ofthe first identity of the first vehicle occupant and the second identityof the second vehicle occupant. In some embodiments, the computingplatform may receive information regarding an third identity of a userof the device outside the vehicle. In some embodiments, the computingplatform may, based on the first identity of the first vehicle occupant,the second identity of the second vehicle occupant, and the thirdidentity of the user of the device outside the vehicle, encrypt thetelephone call. In some embodiments, the computing platform may providea notification that the telephone call is encrypted.

In some embodiments, the privacy mode of the vehicle may be a firstprivacy mode during a first time of day, and the privacy mode of thevehicle may be a second privacy mode during a second time of the day.The second privacy mode may be different from the first privacy mode.For example, a co-worker privacy mode may be activated during work hourson weekdays, while a family privacy mode may be activated on nights andweekends.

In accordance with one or more embodiments, a computing platform havingat least one processor and a memory may determine a first privacy modeof a vehicle, the first privacy mode based on a first identity of thefirst vehicle occupant. The computing platform may provide a firstnotification of the first privacy mode of the vehicle. The computingplatform may receive notification of an entry of a second vehicleoccupant to the vehicle. The computing platform may receive informationregarding a second identity of the second vehicle occupant. Thecomputing platform may determine a second privacy mode of the vehicle,the second privacy mode based on the first identity of the first vehicleoccupant and the second identity of the second vehicle occupant, thesecond privacy mode different from the first privacy mode. The computingplatform may provide a second notification of the second privacy mode ofthe vehicle.

In some embodiments, providing the first notification of the firstprivacy mode of the vehicle may include providing a first vibrationalert that corresponds to the second privacy mode of the vehicle. Insome embodiments, providing the second notification of the secondprivacy mode of the vehicle may include providing a second vibrationalert that corresponds to the second privacy mode of the vehicle, thesecond vibration alert different from the first vibration alert.

In some embodiments, the computing platform may cause, via a display ofthe computing platform, a visual indication of a current privacy mode ofthe vehicle. In some embodiments, the visual indication of the currentprivacy mode of the vehicle may include a blinking indicationcorresponding to the current privacy mode of the vehicle.

In some embodiments, the computing platform may receive inputcorresponding to a request to change the current privacy mode of thevehicle to a different privacy mode of the vehicle. In some embodiments,the computing platform may send, to the vehicle, the request to changethe current privacy mode of the vehicle to the different privacy mode.In some embodiments, receiving the input corresponding to the request tochange the current privacy mode of the vehicle to the different privacymode of the vehicle may include receiving, via a touch-screen interface,a tap input corresponding to the request to change the current privacymode of the vehicle to the different privacy mode of the vehicle.

In some embodiments, the computing platform may activate a first mode ofthe computing platform based on the second vehicle occupant having afirst relationship with respect to the first vehicle occupant. In someembodiments, the computing platform may activate a second mode of thecomputing platform based on the second vehicle occupant having a secondrelationship with respect to the first vehicle occupant, the second modeof the computing platform different from the first mode of the computingplatform.

In some embodiments, the computing platform may, if the first mode ofthe computing platform is active, provide a first type of alertcorresponding to the current privacy mode of the vehicle. In someembodiments, the computing platform may, if the second mode of thecomputing platform is active, provide a second type of alertcorresponding to the current privacy mode of the vehicle, the secondtype of alert different from the first type of alert.

In some embodiments, the computing platform may be part of a watch. Insome embodiments, the watch may be configured to communicate wirelesslywith the vehicle.

These features, along with many others, are discussed in greater detailbelow.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is illustrated by way of example and not limitedin the accompanying figures in which like reference numerals indicatesimilar elements and in which:

FIGS. 1A and 1B depict an illustrative computing environment forpreventing unauthorized access to secured information usingidentification techniques in accordance with one or more exampleembodiments;

FIGS. 2A-2F depict an illustrative event sequence for preventingunauthorized access to secured information using identificationtechniques in accordance with one or more example embodiments;

FIGS. 3A and 3B depict an illustrative event sequence for preventingunauthorized access to secured information using identificationtechniques in accordance with one or more example embodiments;

FIGS. 4A-4D depict an illustrative event sequence for preventingunauthorized access to secured information using identificationtechniques in accordance with one or more example embodiments;

FIGS. 5-8 depict example graphical user interfaces for preventingunauthorized access to secured information using identificationtechniques in accordance with one or more example embodiments;

FIGS. 9A and 9B depict an illustrative example of using geolocationtechniques for preventing unauthorized access to secured information inaccordance with one or more example embodiments;

FIG. 10 depicts an illustrative method for preventing unauthorizedaccess to secured information using identification techniques inaccordance with one or more example embodiments;

FIG. 11 depicts an illustrative method for preventing unauthorizedaccess to secured information using identification techniques inaccordance with one or more example embodiments; and

FIG. 12 depicts an illustrative method for preventing unauthorizedaccess to secured information using identification techniques inaccordance with one or more example embodiments.

DETAILED DESCRIPTION

In the following description of various illustrative embodiments,reference is made to the accompanying drawings, which form a parthereof, and in which is shown, by way of illustration, variousembodiments in which aspects of the disclosure may be practiced. It isto be understood that other embodiments may be utilized, and structuraland functional modifications may be made, without departing from thescope of the present disclosure.

It is noted that various connections between elements are discussed inthe following description. It is noted that these connections aregeneral and, unless specified otherwise, may be direct or indirect,wired or wireless, and that the specification is not intended to belimiting in this respect.

Some aspects of the disclosure relate to a system that may provide oneor more privacy modes for a webpage, application, vehicle display, orthe like. The privacy modes may include multiple different views ormodes. For example, a private mode (e.g., home, phone, and the like), apublic-area mode (e.g., automated-teller machine (ATM), and the like),and/or a semi-private mode (e.g., vehicle dashboard with otherpassengers, and the like).

A privacy mode may include a view that can limit what is displayed on aviewable screen. One example of a view may include a private view, whichmay be a view that shows all accounts and details. Another example of aview may include a semi-public view, which may be a view that shows someaccount information, but hides other account information (e.g., balanceinformation). For example, the system might only show basic information.A further example of a view may include a public view, which may be aview that shows minimal information that might only allow a particulartransaction (e.g., a withdrawal).

A user may select a view type at login. The user may predefine aparticular view to be a default view, which may be selected if anotherview type is not selected, for example, at login. A view may be setbased on a location. For example, a home view may be private.

A vehicle's in-dash screen may automatically change to a particular view(e.g., semi-public view) if the vehicle detects other passengers in thevehicle. Similarly, the vehicle may select a particular view based on anidentity of the other passengers in the vehicle (e.g., a spouse of adriver may trigger a different view than a co-worker of the driver).

The system may include a removable device that may interface with avehicle via, for example, an audiovisual port, an onboard diagnosticsystem (OBD) port, another port, BLUETOOTH, WIFI, a hotspot, or thelike. Alternatively or additionally, one or more features may beincluded in an in-dash system, as a component upgrade, software upgrade,or the like.

Alternatively or additionally, one or more features may be included inan application on a remote device, such as a mobile device, tablet,laptop, or the like. One or more features may utilize a mobile devicecamera and/or other input sensor to improve quality of the data receivedby the system.

One or more privacy modes may be established to information that isprovided through a system (e.g., via a screen, an audio system, or thelike). Different mode views may be configured, defined, and/or saved.Some modes may be default modes that may be included with the system(e.g., public, private, family, and the like). For example, a privatemode may be used for information relating to financial transactions,work, company chat, and the like. In another example, a public mode maybe used for information relating to social media, non-private data, andthe like. In a further example, a family mode may be used when onlyfamily members are in a vehicle. A certain mode may be a default mode,used when another mode is not active (e.g., public mode may be thedefault mode).

In some embodiments, the system may perform text-to-speech and/orspeech-to-text translation to identify keywords, private data elements,or the like. For example, the system may support information relay viaside viewing. For example, in some embodiments, when the system is in aparticular privacy mode, some or all information may be displayed on analternate screen or display than a screen or display that might be usedin a different privacy mode. For example, in a private mode (e.g., amode that may be active when a user is alone using the system—e.g., adriver is in a vehicle with no passengers), a main screen or display maybe used. But in a different privacy mode (e.g., a public privacy mode,which may be active when a stranger is in the vehicle—e.g., in a taxiand/or ride-sharing situation), an alternate screen or display (e.g., ascreen on a driver's car door, armrest, corner dashboard, or other area)may be used to display information instead of or in addition to a mainscreen. For example, in a public privacy mode, information may beobscured or obfuscated on a main screen (e.g., “Account balance:hidden”), but the information may be displayed on an alternate screen ordisplay (e.g., showing an actual account balance). Alternatively oradditionally, information may be delivered to a driver or user in aspoken or audio manner instead of or in addition to being displayed,based on a privacy mode. For example, in a public privacy mode, some orall information may be obscured or obfuscated on a main screen, buttext-to-speech translation may be performed on the some or allinformation to provide the information to the driver or user in aprivate manner (e.g., a main screen obscures and/or obfuscates anaccount balance, but a spoken account balance may be played in adriver's or user's headset).

In another example, one or more custom modes may be created, based on auser need. For example, business mode, co-worker mode, hidden mode, orother modes, in some embodiments, might not come pre-programmed in thesystem, but may be created by a user.

In some embodiments, the system may recognize presence of family membersthrough facial recognition, audio recognition, mobile-device detection,or the like.

In some embodiments, the system may support overriding a currentlyactive privacy mode in case of a user need. For example, if a currentprivacy mode is active—and, for example, information on a screen isobscured as a result—a user may provide input to the system to overridethe obscuring of the information and cause the information to bedisplayed.

In some embodiments, modes may have different access. For example, thesystem may perform recognizing phone numbers, content, or search todetermine a mode automatically.

In some embodiments, a system may announce details of a privacy mode toone or more of a user and a recipient. For example, on startup or afteractivation of a particular mode, the system may display an indicationand/or announce names of identified candidates (e.g., driver andpassenger(s) in a vehicle), and/or a privacy mode that has beenactivated based on the identified candidates. In some embodiments, whena call is received, the system may provide a notification to one or moreof the caller and the call recipient that a particular mode is active(e.g., “public mode is active”), so that one or both of the caller andthe call recipient are careful not to say private or confidentialinformation.

One or more privacy modes may be integrated into a system to use or beactivated in one or more ways. For example, a code, keycode, personalidentification number (PIN), gesture, image, sound, facial expression,or other activation or deactivation input may be associated with aparticular privacy mode, so that, when the input is received, the systemmay activate or deactivate the particular privacy mode. Similarly, aparticular mode may be activated or deactivated based on a fingerprintscan, speech and/or voice recognition, an iris scanner, detectedproximity to known or unknown mobile devices, phone numbers, or thelike. For example, a system may have co-workers added to the system, sothat when one or more co-workers enter a company vehicle, a “co-worker”privacy mode may be automatically activated based on detecting the oneor more co-workers in the vehicle.

In another example, if a pre-defined activation phrase is received, thesystem may activate a particular mode and/or take another action. Forexample, a distress phrase may be pre-associated with a distress mode,so if the distress phrase is received, a distress mode may be activated,an emergency number (e.g., 911) may be called, a text message may besent, or the like. The distress mode may, in some embodiments, besimilar to a hidden or listen-only mode, so that the system is notobviously in a distress mode. Thus, if an intruder enters a vehicle, thedriver or passenger may speak a distress word or phrase, which mayactivate a distress mode or call for help, without providing anindication of the distress mode or call for help. In some embodiments,the system may provide an indication of the distress mode that is adisguised indication. For example, a light may blink, a feature may beactivated or deactivated (e.g., the radio may turn on or off, cruisecontrol may be turned on or off, a light or lights may turn on or off,or the like), a non-distress and non-suspicious phrase may be announced(e.g., “speed camera ahead”), or the like. This may provide confirmationto the driver or passenger of the activation of the distress mode,without causing suspicion to the intruder.

A mode may be activated for obscuring information on a screen of avehicle, of an ATM, a cell phone, a smartphone, a laptop, a tablet, adesktop computer, or the like. For example, if a user is using an ATM, aprivacy mode may be activated or deactivated based on determining who isstanding near the ATM (e.g., a primary user, a close bystander, adistant bystander, or the like).

These and other features are described in more detail below.

FIGS. 1A and 1B depict an illustrative computing environment forpreventing unauthorized access to secured information usingidentification techniques in accordance with one or more exampleembodiments. Referring to FIG. 1A, computing environment 100 may includeone or more computing devices. For example, computing environment 100may include a client portal server 120, a client support server 130, anadministrative computing device 140, a vehicle computing platform 110,vehicle sensors 115, camera 125, microphone 135, a first clientcomputing device 160, and a second client computing device 170.

Client portal server 120 may be configured to provide one or more portalinterfaces to one or more client devices. For example, client portalserver 120 may be configured to provide a customer portal, such as anonline banking portal, to one or more customers of an organization, suchas a financial institution, who may use one or more client computingdevices to access the portal, such as vehicle computing platform 110,client computing device 160, and client computing device 170. In someinstances, in addition to being configured to provide an online bankingportal associated with a financial institution to one or more customersof the financial institution and/or their associated computing devices,client portal server 120 also may be configured to provide a mobilebanking portal associated with the financial institution to variouscustomers of the financial institution and/or their associated mobilecomputing devices. Such portals may, for instance, provide customers ofthe financial institution with access to financial account information(e.g., account balance information, account statements, recenttransaction history information, or the like) and/or may providecustomers of the financial institution with menus, controls, and/orother options to schedule and/or execute various transactions (e.g.,online bill pay transactions, person-to-person funds transfertransactions, or the like).

Client support server 130 may be configured to initiate and/or provideone or more client support sessions. For example, client support server130 may include and/or integrate with one or more client support serversand/or devices, such as one or more customer service representativedevices used by one or more customer service representatives of anorganization (which may, e.g., be a financial institution operatingclient portal server 120), to connect one or more customers of theorganization with one or more customer service representatives of theorganization via one or more client support sessions.

Administrative computing device 140 may be configured to provide one ormore interfaces that allow for configuration and management of one ormore other computing devices and/or computer systems included incomputing environment 100.

Vehicle computing platform 110 may be configured to provide informationto and receive commands from a driver or passenger of a vehicle. Vehiclecomputing platform 110 may interface with one or more client computingdevices, including, for example, first client computing device 160and/or second client computing device 170. Vehicle computing platform110 may communicate with and/or provide access to services of one ormore computing devices, including, for example, client portal server120, client support server 130, and administrative computing device 140.Vehicle computing platform 110 may be configured to communicate with oneor more input devices, including vehicle sensors 115, camera 125, andmicrophone 135. One or more input devices in communication with vehiclecomputing platform 110, including vehicle sensors 115, camera 125, andmicrophone 135, may be part of vehicle computing platform 110, part of avehicle, part of a different computing device or platform, and/orstandalone devices or components.

Client computing device 160 may be configured to be used by a firstperson. In some instances, for example, client computing device 160 maybe used by a driver of a vehicle associated with vehicle computingplatform 110, a passenger of the vehicle associated with vehiclecomputing platform 110, or a person outside the vehicle associated withvehicle computing platform 110. Client computing device 160 maycommunicate with one or more computer systems in computing environment100, such that the one or more computer systems provide one or morecommunications to client computing device 160, as illustrated in greaterdetail below. Client computing device 170 may be configured to be usedby a second person (who may, e.g., be different from the first person).In some instances, client computing device 170 may, for example, be usedby a driver of a vehicle associated with vehicle computing platform 110,a passenger of the vehicle associated with vehicle computing platform110, or a person outside the vehicle associated with vehicle computingplatform 110. Client computing device 170 may communicate with one ormore computer systems in computing environment 100, such that the one ormore computer systems provide one or more communications to clientcomputing device 170, as illustrated in greater detail below.

In one or more arrangements, client portal server 120, client supportserver 130, administrative computing device 140, vehicle computingplatform 110, client computing device 160, and client computing device170 may be any type of computing device capable of receiving a userinterface, receiving input via the user interface, and communicating thereceived input to one or more other computing devices. For example,client portal server 120, client support server 130, administrativecomputing device 140, vehicle computing platform 110, client computingdevice 160, and client computing device 170 may, in some instances, beand/or include server computers, desktop computers, laptop computers,tablet computers, in-vehicle computers, smart phones, smart watches, orthe like that may include one or more processors, memories,communication interfaces, storage devices, and/or other components. Asnoted above, and as illustrated in greater detail below, any and/or allof client portal server 120, client support server 130, administrativecomputing device 140, vehicle computing platform 110, client computingdevice 160, and client computing device 170 may, in some instances, bespecial-purpose computing devices configured to perform specificfunctions.

Computing environment 100 also may include one or more computingplatforms. For example, computing environment 100 may include vehiclecomputing platform 110. As illustrated in greater detail below, vehiclecomputing platform 110 may include one or more computing devicesconfigured to perform one or more of the functions described herein. Forexample, vehicle computing platform 110 may include one or morecomputers (e.g., laptop computers, desktop computers, servers, serverblades, in-vehicle computers, or the like).

Computing environment 100 also may include one or more networks, whichmay interconnect one or more of client portal server 120, client supportserver 130, administrative computing device 140, vehicle computingplatform 110, client computing device 160, and client computing device170. For example, computing environment 100 may include public network190 and private network 195. Private network 195 and/or public network190 may include one or more sub-networks (e.g., local area networks(LANs), wide area networks (WANs), or the like). Private network 195 maybe associated with a particular organization (e.g., a corporation,financial institution, educational institution, governmentalinstitution, or the like) and may interconnect one or more computingdevices associated with the organization. For example, client portalserver 120, client support server 130, and administrative computingdevice 140 may be associated with an organization (e.g., a financialinstitution), and private network 195 may be associated with and/oroperated by the organization, and may include one or more networks(e.g., LANs, WANs, virtual private networks (VPNs), or the like) thatinterconnect client portal server 120, client support server 130, andadministrative computing device 140 and one or more other computingdevices and/or computer systems that are used by, operated by, and/orotherwise associated with the organization. Public network 190 mayconnect private network 195 and/or one or more computing devicesconnected thereto (e.g., client portal server 120, client support server130, and administrative computing device 140) with one or more networksand/or computing devices that are not associated with the organization.For example, vehicle computing platform 110, client computing device160, and client computing device 170 might not be associated with anorganization that operates private network 195 (e.g., because vehiclecomputing platform 110, client computing device 160, and clientcomputing device 170 may be owned, operated, and/or serviced by one ormore entities different from the organization that operates privatenetwork 195, such as one or more customers of the organization and/orvendors of the organization, rather than being owned and/or operated bythe organization itself or an employee or affiliate of theorganization), and public network 190 may include one or more networks(e.g., the internet) that connect vehicle computing platform 110, clientcomputing device 160, and client computing device 170 to private network195 and/or one or more computing devices connected thereto (e.g., clientportal server 120, client support server 130, and administrativecomputing device 140).

Referring to FIG. 1B, vehicle computing platform 110 may include one ormore processors 111, memory 112, and communication interface 117. A databus may interconnect processor(s) 111, memory 112, and communicationinterface 117. Communication interface 117 may be a network interfaceconfigured to support communication between vehicle computing platform110 and one or more networks (e.g., private network 195, public network190, or the like). Memory 112 may include one or more program moduleshaving instructions that when executed by processor(s) 111 cause vehiclecomputing platform 110 to perform one or more functions described hereinand/or one or more databases that may store and/or otherwise maintaininformation which may be used by such program modules and/orprocessor(s) 111. In some instances, the one or more program modulesand/or databases may be stored by and/or maintained in different memoryunits of client authentication computing platform 110 and/or bydifferent computing devices that may form and/or otherwise make upvehicle computing platform 110. For example, memory 112 may have, store,and/or include a driver identification module 113, passengeridentification module 114, privacy module 115, and a notification module116. Driver identification module 113 may have instructions that directand/or cause vehicle computing platform 110 to identify a driver of avehicle. Passenger identification module 114 may have instructions thatdirect and/or cause vehicle computing platform 110 to identify one ormore passengers of a vehicle. Privacy module 115 may have instructionsthat direct and/or cause vehicle computing platform 110 to protectprivacy of information associated with the driver of the vehicle and/orthe passenger(s) of the vehicle, for example, by partially or whollyobscuring or revealing a screen or other interface configured to providethe information associated with the driver of the vehicle and/or thepassenger(s) of the vehicle. Notification module 116 may haveinstructions that direct and/or cause vehicle computing platform 110 tocause notification to a driver of a vehicle, a passenger of a vehicle,and/or a person not in the vehicle of a status of a privacy mode of thevehicle.

FIGS. 2A-2F depict an illustrative event sequence for preventingunauthorized access to secured information using identificationtechniques in accordance with one or more example embodiments. Referringto FIG. 2A, at step 201, vehicle computing platform 110 may receivedriver sensor data. For example, vehicle computing platform 110 mayreceive driver sensor data from vehicle sensors 115. Driver sensor datamay indicate whether a driver seat in a vehicle is occupied. Vehiclesensors 115 may include seat-weight sensors, body scanners, lasers,cameras, scales, infrared sensors, microwave sensors, fingerprintscanners, retina scanners, biometric scanners, or other sensors forgathering data about a driver of a vehicle. The information gatheredfrom one or more of vehicle sensors 115 may be associated with thedriver of the vehicle, and therefore may be provided to vehiclecomputing platform 110.

At step 202, vehicle computing platform 110 may receive one or moreimages, which may include images of the driver. For example, vehiclecomputing platform 110 may receive the one or more images from camera125. In some embodiments, vehicle computing platform 110 may,alternatively or additionally, receive images from vehicle sensors 115(receiving from vehicle sensors 115 not illustrated). In someembodiments, the driver identification information may include at leastone image of the driver of the vehicle. At step 203, vehicle computingplatform 110 may perform facial recognition of the driver. For example,vehicle computing platform 110 may analyze one or more of the imagesand/or sensor data of the driver of the vehicle to identify a face orfaces of the driver of the vehicle, and/or to determine the identity ofthe driver.

At step 204, vehicle computing platform 110 may receive audio, which mayinclude speech spoken by the driver. For example, vehicle computingplatform 110 may receive the audio from microphone 135. Referring toFIG. 2B, at step 205, vehicle computing platform 110 may perform voicerecognition of the speech spoken by the driver. Performing voicerecognition of the speech spoken by the driver of the vehicle mayinclude performing voice recognition of the audio to determine theidentity of the driver.

At step 206, vehicle computing platform 110 may receive driveridentification information. For example, a driver may login or otherwiseidentify to vehicle computing platform 110 via an interface of vehiclecomputing platform 110. In some embodiments, vehicle computing platform110 may determine a presence of a mobile device associated with thedriver.

At step 207, vehicle computing platform 110 may determine an identity ofthe driver. Vehicle computing platform 110 may determine an identity ofa driver of the vehicle based on one or more of the driver sensor data,images of the driver, facial recognition of the driver, audio, voicerecognition of the driver, the driver identification information, or thelike.

At step 208, vehicle computing platform 110 may activate a driverprofile associated with the driver. The driver profile may be activatedbased on the identity of the driver of the vehicle. In some embodiments,if vehicle computing platform 110 determines the presence of a mobiledevice associated with the driver, the driver profile—which may beassociated with the mobile device associated with the driver (e.g., thedriver may have associated the mobile device with the profile when theprofile is created)—may be activated

Referring to FIG. 2C, at step 209, vehicle computing platform 110 mayreceive passenger sensor data. For example, vehicle computing platform110 may receive passenger sensor data from vehicle sensors 115.Passenger sensor data may indicate whether a passenger seat in thevehicle is occupied. Vehicle sensors 115 may include seat-weightsensors, body scanners, lasers, cameras, scales, infrared sensors,microwave sensors, fingerprint scanners, retina scanners, biometricscanners, or other sensors for gathering data about one or morepassengers of a vehicle. The information gathered from one or more ofvehicle sensors 115 may be associated with the one or more passengers ofthe vehicle, and therefore may be provided to vehicle computing platform110.

At step 210, vehicle computing platform 110 may receive one or moreimages, which may include images of one or more passengers of thevehicle. For example, vehicle computing platform 110 may receive the oneor more images from camera 125. In some embodiments, vehicle computingplatform 110 may, alternatively or additionally, receive images fromvehicle sensors 115 (receiving from vehicle sensors 115 notillustrated). In some embodiments, the passenger identificationinformation may include at least one image of the passenger of thevehicle. At step 211, vehicle computing platform 110 may perform facialrecognition of the one or more passengers of the vehicle. For example,vehicle computing platform 110 may analyze one or more of the imagesand/or sensor data of the one or more passengers of the vehicle toidentify a face or faces of the one or more passengers of the vehicle,and/or to determine the identity of the one or more passengers.

At step 212, vehicle computing platform 110 may receive audio, which mayinclude speech spoken by one or more passengers of the vehicle. Forexample, vehicle computing platform 110 may receive the audio frommicrophone 135. Referring to FIG. 2D, at step 213, vehicle computingplatform 110 may perform voice recognition of the speech spoken by theone or more passengers of the vehicle. Performing voice recognition ofthe speech spoken by the one or more passengers of the vehicle mayinclude performing voice recognition of the audio to determine theidentity of the passenger.

At step 214, vehicle computing platform 110 may receive passengeridentification information. For example, a passenger may login orotherwise identify to vehicle computing platform 110 via an interface ofvehicle computing platform 110. In some embodiments, vehicle computingplatform 110 may determine a presence of a mobile device associated withthe passenger.

At step 215, vehicle computing platform 110 may determine an identity oridentities of one or more passengers of the vehicle. Vehicle computingplatform 110 may determine an identity of a passenger of the vehiclebased on one or more of the passenger sensor data, images of one or morepassengers, facial recognition of the passengers, audio, voicerecognition of the passengers, the passenger identification information,or the like.

At step 216, vehicle computing platform 110 may activate a passengerprofile or passenger profiles associated with one or more passengers ofthe vehicle. The passenger profile or passenger profiles may beactivated based on the identity or identities of the one or morepassengers of the vehicle. In some embodiments, if vehicle computingplatform 110 determines the presence of a mobile device associated withthe passenger, the passenger profile—which may be associated with themobile device associated with the passenger (e.g., the passenger mayhave associated the mobile device with the profile when the profile iscreated)—may be activated.

Referring to FIG. 2E, at step 217, vehicle computing platform 110 mayreceive an activation phrase. The activation phrase may be received froma microphone (e.g., microphone 135). The activation phrase maycorrespond to a privacy mode of a plurality of privacy modes.

At step 218, vehicle computing platform 110 may determine a location ofthe vehicle. For example, a vehicle may be located near a driver'sand/or passenger's home, near a driver's and/or passenger's work, near astadium, near a school, or the like. A vehicle may be located on aparticular street, within a particular town or city, within a particularcounty or borough, within a particular state or province, within aparticular country, or the like. The vehicle may be within one or morepre-defined geo-fences.

At step 219, vehicle computing platform 110 may determine a type of keybeing used for the vehicle. For example, a type of key for the vehiclemay be a standard key, a limited-use key (e.g., a valet key), or thelike. A privacy mode may be selected based on a type of key being usedfor the vehicle.

At step 220, vehicle computing platform 110 may determine a privacy modeof the vehicle. A privacy mode may cause particular information to beobscured or not obscured. Vehicle computing platform may have one ormore privacy modes (e.g., private, public, semi-private, family,co-worker, stranger, ride-sharing, or the like).

A privacy mode may cause activation or deactivation of a particularprivacy setting. For example, in a case that a first privacy mode of theplurality of privacy modes is activated, vehicle computing platform 110may apply a first privacy setting to a first application of the vehicle,and apply a second privacy setting to a second application of thevehicle. Further, in a case that a second privacy mode of the pluralityof privacy modes is activated, vehicle computing platform 110 may applya third privacy setting to the first application, the third privacysetting being different from the first privacy setting, and apply afourth privacy setting to the second application, the fourth privacysetting being different from the second privacy setting.

A privacy mode of the vehicle may be determined based on one or morefactors discussed above, including driver information, passengerinformation, an activation phrase, a location of the vehicle, a type ofkey in the vehicle, a state of the vehicle, a type of the vehicle (e.g.,a personal car, a taxi, a rental car, a company car, a ride-sharing car,or the like), a person in the vehicle or not in the vehicle, or thelike.

A driver or passenger may select a privacy profile for the vehicle. Theprivacy profile may include one or more settings relating to informationto be obscured on a screen of the vehicle, from being played overspeakers of the vehicle, or the like.

A privacy mode may be determined based on an activation phrase received.For example, if an activation phrase is a distress phrase, the privacymode may be a distress mode. An activation phrase may be a phrase thatis pre-programmed into the system to allow, when the the activationphrase is spoken, for a particular action to be taken (e.g., aparticular privacy mode may be activated, information transmitted, orthe like).

In some embodiments, a privacy mode may cause a viewing angle to beselected or adjusted for a screen of the vehicle. For example, in aprivate viewing mode (e.g., which may be active when the driver is alonein the vehicle), a wide viewing angle may be active for one or morescreens of the vehicle, which may allow for the one or more screens tobe viewed from any angle in the vehicle. In a different privacy mode,however, a different viewing angle may be activated. For example, in aprivacy mode based on other passengers or drivers being in the vehicle(e.g., a public mode, a taxi mode, a co-worker mode, or the like), areduced viewing angle may be activated, which may make one or morescreens of the vehicle difficult to read or otherwise obscured for oneor more people in the vehicle (e.g., the passengers in the vehicle mightnot be able to read the screen as easily as the driver of the vehiclewhen the reduced viewing angle is active).

In some embodiments, based on a privacy mode, data presented on thescreen may be obfuscated or altered (e.g., to display pre-determinedvalues set by a driver, vehicle owner, account owner, or the like). Forexample, data displayed on a screen may be displayed in a non-obfuscatedor non-altered state when a private privacy mode is active (e.g., thedriver or user is alone). But when a different privacy mode (e.g., apublic privacy mode, a taxi privacy mode, a ride-sharing privacy mode,or the like) is active, pre-determined values for one or more fields maybe displayed in place of actual information. For example, if a publicprivacy mode is active, if a text message is received and displayed on ascreen, a false or shortened phone number (e.g., instead of a full phonenumber, just display the first digit, the last digit, a middle digit,asterisks, or the like), a shortened name or nickname (e.g., instead ofa spouse's name, display “Spouse” or “Person 1,” or a nickname), orother pre-determined replacement information may be displayed in one ormore fields of the text message in place of the actual informationrelating to that text message. In this manner, privacy of thetext-message sender may be preserved, and the driver is still able toaccess the text message, even though a passenger is in the vehicle.Similarly, if financial information is being accessed, financialinformation may be obscured or obfuscated by displaying differentinformation than the actual information (e.g., obfuscating an accountbalance, account number, bank name, or the like by displaying pre-setvalues set by a driver or account owner). For example, if an ATM user isusing an ATM, and the ATM is in a non-private privacy mode (e.g.,another person is standing too close to the account owner using theATM), account balance, account number, account address, or other accountinformation may be replaced with “hidden” or another string or number.

In some embodiments, a privacy mode may result in text-to-speech and/orspeech-to-text translation of keywords, private data elements, or thelike. For example, in some embodiments, when the system is in aparticular privacy mode, some or all information may be displayed on analternate screen or display than a screen or display that might be usedin a different privacy mode. For example, in a private mode (e.g., amode that may be active when a user is alone using the system—e.g., adriver is in a vehicle with no passengers), a main screen or display maybe used. But in a different privacy mode (e.g., a public mode, a taximode, a ride-sharing mode, or the like), an alternate screen or display(e.g., a screen on a driver's car door, armrest, corner dashboard, orother area) may be used to display information instead of or in additionto a main screen. For example, in a public mode, information may beobscured or obfuscated on a main screen (e.g., “Account balance:hidden”), but the information may be displayed on an alternate screen ordisplay (e.g., a screen on a driver's car-door armrest may show anactual account balance). In another example, information may bedisplayed on a headgear-type device to support 360 degree view withinformation superimposed on a screen, glass, or display. For example,the system may connect with glasses or a headset that have a heads-updisplay, and may display selected information (e.g., sensitive orprivate information) on a display of the glasses or headset, based on aprivacy mode.

Alternatively or additionally, based on a privacy mode, information maybe delivered to a driver or user in a spoken or audio manner instead ofor in addition to being displayed. For example, in a public mode, someor all information may be obscured or obfuscated on a main screen (e.g.,a main screen obscures and/or obfuscates an account balance), buttext-to-speech translation may be performed on the some or allinformation to provide the information to the driver or user in aprivate manner (e.g., audio of a spoken account balance may be played ina driver's or user's headset).

Referring to FIG. 2F, at step 221, vehicle computing platform 110 mayactivate the privacy mode of the vehicle.

At step 222, vehicle computing platform 110 may obscure information on ascreen of the vehicle. For example, based on the passenger sensor dataindicating that the passenger seat in the vehicle is occupied, vehiclecomputing platform 110 may obscure information on a screen of thevehicle. In some embodiments, vehicle computing platform 110 maydetermine the information to be obscured based on the identity of thepassenger. In some embodiments, the information on the screen of thevehicle may be information associated with a driver of the vehicle. Insome embodiments, the information on the screen of the vehicle mayinclude one or more of a text message to the driver of the vehicle, avoicemail to the driver of the vehicle, and/or a call history of thedriver of the vehicle. In some embodiments, based on the driver sensordata indicating that the driver seat in the vehicle is not occupied, andthe passenger sensor data indicating that the passenger seat in thevehicle is occupied, vehicle computing platform 110 may deactivate thescreen of the vehicle.

In some embodiments, information on a screen of the vehicle may beobscured or displayed based on a type of key being used in the vehicle.Alternatively or additionally, a privacy mode may be selected based on atype of key being used for the vehicle. For example, if a valet key isused, a public privacy mode may be activated, which may cause lessinformation to be displayed on a screen of the vehicle than if astandard key is being used. In some embodiments, a valet mode may beactivated in response to a valet key being used, which may prevent anyinformation from being displayed on a screen of the vehicle while avalet key is being used.

Alternatively or additionally one or more vehicle features may beactivated or deactivated based on a type of key being used in thevehicle. For example, a trunk may be locked or unlocked, a glovecompartment may be locked or unlocked, a remote start feature may beusable or unusable, a car alarm may be set in a particular mode, or thelike.

In some embodiments, information on a screen of the vehicle may beobscured or displayed based on a privacy profile of the vehicle.

FIGS. 3A-3B depict an illustrative event sequence for preventingunauthorized access to secured information using identificationtechniques in accordance with one or more example embodiments.

Referring to FIG. 3A, at step 301, vehicle computing platform 110 maydetermine a privacy mode of a vehicle. The privacy mode may be based ona first identity of the first vehicle occupant and a second identity ofa second vehicle occupant.

At step 302, vehicle computing platform 110 may receive a request toinitiate communication between the vehicle computing platform 110 and adevice inside or outside the vehicle (e.g., client computing device160). For example, vehicle computing platform 110 may receive atelephone call from client computing device 160. In some embodiments,vehicle computing platform 110 may receive a notification that a mobiledevice connected to vehicle computing platform 110 may receive atelephone call from client computing device 160.

At step 303, vehicle computing platform 110 may provide notification ofa status of a privacy mode (e.g., of the vehicle). Vehicle computingplatform 110 may cause an audio, video, text, and/or other message to beprovided to client computing device 160 regarding a privacy mode. Forexample, if a user of client computing device 160 is trying to initiatea telephone call to a driver of the vehicle that includes vehiclecomputing platform 110, vehicle computing platform 110 may provide, tothe user of client computing device 160, a notification of the currentlyactive privacy mode of the vehicle. The notification of the currentlyactive privacy mode of the vehicle may be an audio notification to acaller using the device outside the vehicle, the audio notificationincluding the status of the privacy mode of the vehicle.

In some embodiments, the privacy mode of the vehicle may be a firstprivacy mode during a first time of day, and the privacy mode of thevehicle may be a second privacy mode during a second time of the day.

The notification of the privacy mode of the vehicle may be provided to auser of the client computing device 160, to a driver or passenger of thevehicle, or both. For example, if a user of client computing device 160is trying to call a driver of the vehicle, before voice communication isactivated, client computing device 160 may receive, from vehiclecomputing platform 110, an audio or text notification of a privacy modethat the vehicle is in. For example, if a person at home is trying tocall a spouse in the vehicle, and the vehicle has the spouse and thespouse's co-worker, before the call is activated (e.g., before the callrings, while the call is ringing, immediately after the driver answersthe call, or the like), the spouse may be notified that the vehicle isin the co-worker mode. In this manner, the person at home may know thatthe spouse in the vehicle has a co-worker in the vehicle with thespouse, and therefore may know to conduct the telephone call with thespouse accordingly.

At step 304, vehicle computing platform 110 may provide notification ofone or more identities of one or more vehicle occupants. For example,before initiating communication (e.g., a telephone call) with clientcomputing device 160, vehicle computing platform 110 may provide anotification to the device outside the vehicle of a status of theprivacy mode of the vehicle.

Referring to FIG. 3B, at step 305, vehicle computing platform 110 mayreceive information regarding an identity of a user of client computingdevice 160. For example, if the user of the client computing device 160is outside the vehicle, vehicle computing platform 110 may receiveinformation regarding an identity of the user of the client computingdevice 160 outside the vehicle.

At step 306, vehicle computing platform 110 may cause activation of anencryption of communication between vehicle computing platform 110 andclient computing device 160. For example, vehicle computing platform 110may, based on the first identity of the first vehicle occupant, thesecond identity of the second vehicle occupant, and/or the thirdidentity of the user of the device outside the vehicle, encrypt thetelephone call.

At step 307, vehicle computing platform 110 may provide notification ofencryption. For example, vehicle computing platform 110 may providenotification to client computing device 160 that a telephone callbetween client computing device 160 and vehicle computing platform 110(or a device connected to vehicle computing platform 110) is encrypted.

At step 308, vehicle computing platform 110 may initiate communicationbetween vehicle computing platform 110 and client computing device 160.For example, if the communication between vehicle computing platform 110and client computing device 160 is a telephone call between clientcomputing device 160 and vehicle computing platform 110 (or a deviceconnected to vehicle computing platform 110), after providingnotifications regarding a privacy mode of the vehicle, whether the callis encrypted, an identity or identities of the driver and/orpassenger(s) of the vehicle, and/or other information, the caller may beconnected to the vehicle computing platform 110 (or a device connectedto vehicle computing platform 110) to conduct the telephone call withthe call recipient.

FIGS. 4A-4D depict an illustrative event sequence for preventingunauthorized access to secured information using identificationtechniques in accordance with one or more example embodiments. Referringto FIG. 4A, at step 401, client computing device 170 (e.g., asmartphone, watch, other wearable device, or the like, which may beconfigured to communicate wirelessly with vehicle computing platform110) may receive information regarding a first person from vehiclecomputing platform 110. For example, similar to the above discussionwith regard to receiving information about and determining an identityof a driver or passenger, client computing device 170 may receiveinformation that may be used for determining an identity of a driver orpassenger, and/or client computing device 170 may receive informationregarding a determined identity of a driver or passenger.

At step 402, client computing device 170 may determine an identity ofthe first person. For example, client computing device 170 maydetermine, based on the received information regarding the first person,the identity of the first person (e.g., a driver or passenger).

At step 403, client computing device 170 may receive informationregarding a first privacy mode. For example, client computing device 170may determine a first privacy mode of a vehicle, the first privacy modebased on a first identity of the first vehicle occupant.

At step 404, client computing device 170 may provide notification of thefirst privacy mode. For example, client computing device 170 may providea first vibration alert that corresponds to the first privacy mode ofthe vehicle. Alternatively or additionally, client computing device 170may cause, via a display or other visual indicator of client computingdevice 170 and/or vehicle computing platform 110, a visual indication ofa current privacy mode (e.g., the first privacy mode) of the vehicle.For example, the visual indication may include a blinking indicationcorresponding to the current privacy mode (e.g., the first privacy mode)of the vehicle.

Referring to FIG. 4B, at step 405, vehicle computing platform 110 and/orclient computing device 170 may receive information (e.g., anotification) regarding entry of a second person (e.g., a second vehicleoccupant) to the vehicle. For example, if a second person entered thevehicle (e.g., a new passenger enters the vehicle with the driver),vehicle computing platform 110 and/or client computing device 170 mayreceive information from vehicle sensors 115 about the second person.

At step 406, client computing device 170 may receive informationregarding the second person. For example, client computing device 170may receive information regarding an identity of the second vehicleoccupant. For example, similar to the above discussion with regard toreceiving information about and determining an identity of a driver orpassenger, client computing device 170 may receive information that maybe used for determining an identity of a driver or passenger, and/orclient computing device 170 may receive information regarding adetermined identity of a driver or passenger.

At step 407, client computing device 170 may determine an identity ofthe second person. For example, client computing device 170 maydetermine the identity of the second person based on the receivedinformation regarding the identity of the second vehicle occupant.

At step 408, client computing device 170 may receive informationregarding the second privacy mode. For example, client computing device170 may receive, from vehicle computing platform 110, an indication ofwhat the current privacy mode of the vehicle is.

At step 409, client computing device 170 may provide notification of thesecond privacy mode. For example, client computing device 170 mayprovide a second vibration alert that corresponds to the second privacymode of the vehicle, the second vibration alert different from the firstvibration alert. Alternatively or additionally, client computing device170 may cause, via a display or other visual indicator of clientcomputing device 170 and/or vehicle computing platform 110, a visualindication of a current privacy mode (e.g., the second privacy mode) ofthe vehicle. For example, the visual indication may include a blinkingindication corresponding to the current privacy mode (e.g., the secondprivacy mode) of the vehicle.

Regarding FIG. 4C, at step 410, vehicle computing platform 110 mayprovide an indication of the privacy mode. Client computing device 170may determine a second privacy mode of the vehicle, the second privacymode based on the first identity of the first vehicle occupant and thesecond identity of the second vehicle occupant, the second privacy modedifferent from the first privacy mode.

At step 411, client computing device 170 may provide a notification(e.g., an alert) corresponding to the active privacy mode. For example,client computing device 170 may provide a vibration alert thatcorresponds to the currently active privacy mode of the vehicle. Thevibration alert may uniquely correspond to the currently active privacymode of the vehicle. Alternatively or additionally, client computingdevice 170 may cause, via a display or other visual indicator of clientcomputing device 170 and/or vehicle computing platform 110, a visualindication of a current privacy mode of the vehicle. For example, thevisual indication may include a blinking indication corresponding to thecurrent privacy mode of the vehicle.

At step 412, client computing device 170 may receive a request to changethe privacy mode. For example, client computing device 170 may receiveinput corresponding to a request to change the current privacy mode ofthe vehicle to a different privacy mode of the vehicle. Receiving theinput corresponding to the request to change the current privacy mode ofthe vehicle to the different privacy mode of the vehicle may includereceiving, via a touch-screen interface, a tap input corresponding tothe request to change the current privacy mode of the vehicle to thedifferent privacy mode of the vehicle. A particular tap sequence may beassociated with a particular privacy mode (e.g., one tap on the screento change to a first privacy mode, two taps on the screen to change to asecond privacy mode, and the like).

At step 413, client computing device 170 may send a request to changeprivacy mode. For example, client computing device 170 may send, to thevehicle (e.g., to vehicle computing platform 110), the request to changethe current privacy mode of the vehicle to the different privacy mode(e.g., the privacy mode requested at step 412).

Referring to FIG. 4D, at step 414, client computing device 170 maydetermine a relationship between a first person in the vehicle and asecond person in the vehicle. For example, if the first person and thesecond person are co-workers, client computing device 170 may determinethat the first person and the second person are co-workers. Clientcomputing device 170 based on the determined identity of the firstperson and the determined identity of the second person. Based on thedetermined identity, client computing device 170 may determine and/orreceive information regarding a profile of the person with thedetermined identity. The profile may store relationship informationbetween different persons. For example, if a user is a parent with aspouse, information regarding the user's children and spouse may bestored in the user's profile. Alternatively or additionally, otherrelationships may be stored in the user's profile (e.g., co-workers,friends, extended family, and the like). Therefore, by determining theidentities of the people in the vehicle, client computing device 170 mayaccess pre-stored information regarding relationships between the peoplein the vehicle.

At step 415, client computing device 170 may send a request to activatea mode based on the relationship. Client computing device 170 may send arequest to the vehicle (e.g., to vehicle computing platform 110) toactivate (e.g., change or maintain) a particular privacy mode. Forexample, if the people in the vehicle are in a family relationship(e.g., a driver and passenger are spouses), client computing device 170may send a request to activate a family privacy mode. In anotherexample, if the people in the vehicle are co-workers, client computingdevice 170 may send a request to activate a co-worker privacy mode. In afurther example, if the people in the vehicle are strangers or do nothave a defined or determinable relationship (e.g., a taxi driver andpassenger), client computing device 170 may send a request to activate apublic mode.

At step 416, client computing device 170 may provide an alert regardinga current privacy mode of the vehicle. For example, if the privacy modewas changed (e.g., in response to the request to change the privacymode), client computing device 170 may provide an alert regarding thechanged privacy mode. For example, client computing device 170 mayprovide a vibration alert that corresponds to the currently activeprivacy mode of the vehicle. The vibration alert may uniquely correspondto the currently active privacy mode of the vehicle. Alternatively oradditionally, client computing device 170 may cause, via a display orother visual indicator of client computing device 170 and/or vehiclecomputing platform 110, a visual indication of a current privacy mode ofthe vehicle. For example, the visual indication may include a blinkingindication corresponding to the current privacy mode of the vehicle.

FIG. 5 depicts an illustrative example graphical user interface forpreventing unauthorized access to secured information usingidentification techniques in accordance with one or more exampleembodiments. For example, vehicle computing platform 110 may displayand/or otherwise present a graphical user interface similar to graphicaluser interface 500, which is illustrated in FIG. 5. As seen in FIG. 5,graphical user interface 500 may be a screen that is shown thatindicates an active privacy mode of a vehicle. Information that mightotherwise be displayed on graphical user interface 500 may be obscuredand/or not shown, based on the active privacy mode of the vehicle. Forexample, graphical user interface 500 may include informationidentifying a particular privacy mode (e.g., public mode, semi-publicmode, private mode, personal mode, family mode, work mode, driving mode,stopped mode, parked mode, and the like). As depicted in graphical userinterface 500, the vehicle may display a message that indicates theactive mode (e.g., “Public Mode Active”). In addition, graphical userinterface 500 may include one or more controls and/or other elements(not shown) enabling a user of graphical user interface 500 and/orvehicle computing platform 110 to view more details about the privacymode, activate or de-activate a privacy mode, change a privacy mode,change settings, or the like.

FIG. 6 depicts an illustrative example graphical user interface forpreventing unauthorized access to secured information usingidentification techniques in accordance with one or more exampleembodiments. For example, vehicle computing platform 110 may displayand/or otherwise present a graphical user interface similar to graphicaluser interface 600, which is illustrated in FIG. 6. As seen in FIG. 6,graphical user interface 600 may be a screen that is shown that allowsfor selection of a driver profile. One or more driver profiles may bestored by vehicle computing platform 110. A driver profile may storeinformation about a driver of the vehicle. For example, a driver profilemay store identifying information (e.g., biometric information, ausername, password, activation phrase, height, weight, images of thedriver for use in facial recognition, audio information about the driverfor use in voice recognition, and the like). A driver profile mayinclude relationship information about the driver (e.g., informationabout the driver's family members, friends, co-workers, and the like). Adriver profile may include driver preferences (e.g., a default privacymode, information about what privacy mode to activate in whatcircumstance, what information to obscure or not obscure when in aparticular privacy mode, and the like).

In addition, graphical user interface 600 may include one or morecontrols and/or other elements (not shown) enabling a user of graphicaluser interface 600 and/or vehicle computing platform 110 to create a newdriver profile, update an existing driver profile, delete a driverprofile, and the like.

FIG. 7 depicts an illustrative example graphical user interface forpreventing unauthorized access to secured information usingidentification techniques in accordance with one or more exampleembodiments. For example, vehicle computing platform 110 may displayand/or otherwise present a graphical user interface similar to graphicaluser interface 700, which is illustrated in FIG. 7. As seen in FIG. 7,graphical user interface 700 may be a screen that is shown that allowsfor selection of a profile. One or more profiles may be stored by acomputing system implementing features described herein. For example, anATM may implement privacy profiles to protect information displayed to auser of the ATM. A profile may store information about a user of thesystem. For example, a profile may store identifying information (e.g.,biometric information, a username, password, activation phrase, height,weight, images of the user for use in facial recognition, audioinformation about the user for use in voice recognition, and the like).A user profile may include relationship information about the user(e.g., information about the user's family members, friends, co-workers,and the like). A user profile may include user preferences (e.g., adefault privacy mode, information about what privacy mode to activate inwhat circumstance, what information to obscure or not obscure when in aparticular privacy mode, and the like). Thus, when using the system(e.g., an ATM), a particular privacy mode may be activated based on userpreferences stored in the particular profile. For example, if a useruses an ATM alone or with a family member standing next to the user, theATM—based on a private profile or family profile causing activation of aprivate mode or family mode—might not obscure any information on thescreen of the ATM. But if the user uses an ATM with a co-worker standingnear the user, the ATM—based on a co-worker mode being activated—mayobscure some information on the screen of the ATM.

In addition, graphical user interface 700 may include one or morecontrols and/or other elements (not shown) enabling a user of graphicaluser interface 700 and/or vehicle computing platform 110 to create a newprofile, update an existing profile, delete a profile, and the like.

FIG. 8 depicts an illustrative example graphical user interface forpreventing unauthorized access to secured information usingidentification techniques in accordance with one or more exampleembodiments. For example, vehicle computing platform 110 may displayand/or otherwise present a graphical user interface similar to graphicaluser interface 800, which is illustrated in FIG. 8. As seen in FIG. 8,graphical user interface 800 may be a screen that is shown that allowsfor viewing and/or responding to messages. For example, graphical userinterface 800 may show text or multimedia messages received on acomputing device connected to vehicle computing platform 110. Based on aprivacy mode that is active in the vehicle, more or less information maybe displayed on the screen. For example, if the vehicle is in privatemode, the entire content of the text message may be displayed. But ifthe vehicle is in public mode (e.g., based on a stranger riding in thevehicle, such as with a taxi or ride-sharing service), the screen mightnot show any information about the message, might only show that amessage was received without showing the text of the message, or theinformation may otherwise be obscured.

In addition, graphical user interface 800 may include one or morecontrols and/or other elements enabling a user of graphical userinterface 800 and/or vehicle computing platform 110 to respond to amessage.

FIGS. 9A and 9B depict an illustrative example of using geolocationtechniques for preventing unauthorized access to secured information inaccordance with one or more example embodiments. For example, the systemmay, in some embodiments, determine a location of the vehicle, andselect the information to be obscured on a screen of the vehicle basedon the location of the vehicle.

Referring to FIG. 9A, geo-fence 904, geo-fence 906, and geo-fence 908may be established. A geo-fence (e.g., geo-fence 904, geo-fence 906,geo-fence 908) may be a geographic area that is defined with aparticular application or system. A particular privacy mode or privacymodes may be associated with one or more geo-fences. For example,geo-fence 904 may be associated with a family privacy mode, whilegeo-fence 908 may be associated with a work privacy mode. Somegeo-fences might not be associated with a particular privacy mode.

The system may determine a location of the vehicle (e.g., vehicle 902).For example, determining a location of the vehicle may includedetermining that the location of the vehicle indicates that the vehicleis within a predetermined geo-fence of a plurality of predeterminedgeo-fences.

A default privacy mode may be selected and/or applied to a vehicle(e.g., a vehicle 902, which may include a vehicle computing platform,such as vehicle computing platform 110) based on a particular geo-fence.For example, when vehicle 902 is in geo-fence 904, the default privacymode associated with geo-fence 904 may be activated for vehicle 902.Furthermore, in some embodiments, selecting the information to beobscured based on the location of the vehicle may include determiningwhether a profile associated with the predetermined geo-fence indicatesthat the information is to be obscured.

Referring to FIG. 9B, when vehicle 902 is in geo-fence 906, the defaultprivacy mode associated with geo-fence 906 may be activated for vehicle902. The default privacy mode associated with geo-fence 906 may be thesame as or different from the default privacy mode associated withgeo-fence 904. Thus, the privacy mode of a vehicle may automaticallychange based on a location of the vehicle.

FIG. 10 depicts an illustrative method for preventing unauthorizedaccess to secured information using identification techniques inaccordance with one or more example embodiments. Referring to FIG. 10,at step 1005, a computing platform having at least one processor, amemory, and a communication interface may receive driver sensor dataindicating whether a driver seat in a vehicle is occupied. At step 1010,the computing platform may determine, based on the driver sensor data,an identity of a driver of the vehicle. At step 1015, the computingplatform may receive passenger sensor data indicating whether apassenger seat in the vehicle is occupied. At step 1020, the computingplatform may, based on the passenger sensor data indicating that thepassenger seat in the vehicle is occupied, obscure information on ascreen of the vehicle.

FIG. 11 depicts an illustrative method for preventing unauthorizedaccess to secured information using identification techniques inaccordance with one or more example embodiments. Referring to FIG. 11,at step 1105, a computing platform having at least one processor, amemory, and a communication interface may determine a privacy mode of avehicle, the privacy mode based on a first identity of the first vehicleoccupant and a second identity of a second vehicle occupant. At step1110, the computing platform may receive a request to initiate acommunication between the computing platform and a device outside thevehicle. At step 1115, the computing platform may, before initiating thecommunication, provide a notification to the device outside the vehicleof a status of the privacy mode of the vehicle.

FIG. 12 depicts an illustrative method for preventing unauthorizedaccess to secured information using identification techniques inaccordance with one or more example embodiments. Referring to FIG. 12,at step 1205, a computing platform having at least one processor, amemory, and a communication interface may determine a first privacy modeof a vehicle, the first privacy mode based on a first identity of thefirst vehicle occupant. At step 1210, the computing platform may providea first notification of the first privacy mode of the vehicle. At step1215, the computing platform may receive notification of an entry of asecond vehicle occupant to the vehicle. At step 1220, the computingplatform may receive information regarding a second identity of thesecond vehicle occupant. At step 1225, the computing platform maydetermine a second privacy mode of the vehicle, the second privacy modebased on the first identity of the first vehicle occupant and the secondidentity of the second vehicle occupant, the second privacy modedifferent from the first privacy mode. At step 1230, the computingplatform may provide a second notification of the second privacy mode ofthe vehicle.

One or more aspects of the disclosure may be embodied in computer-usabledata or computer-executable instructions, such as in one or more programmodules, executed by one or more computers or other devices to performthe operations described herein. Generally, program modules includeroutines, programs, objects, components, data structures, and the likethat perform particular tasks or implement particular abstract datatypes when executed by one or more processors in a computer or otherdata processing device. The computer-executable instructions may bestored as computer-readable instructions on a computer-readable mediumsuch as a hard disk, optical disk, removable storage media, solid-statememory, RAM, and the like. The functionality of the program modules maybe combined or distributed as desired in various embodiments. Inaddition, the functionality may be embodied in whole or in part infirmware or hardware equivalents, such as integrated circuits,application-specific integrated circuits (ASICs), field programmablegate arrays (FPGA), and the like. Particular data structures may be usedto more effectively implement one or more aspects of the disclosure, andsuch data structures are contemplated to be within the scope of computerexecutable instructions and computer-usable data described herein.

Various aspects described herein may be embodied as a method, anapparatus, or as one or more computer-readable media storingcomputer-executable instructions. Accordingly, those aspects may takethe form of an entirely hardware embodiment, an entirely softwareembodiment, an entirely firmware embodiment, or an embodiment combiningsoftware, hardware, and firmware aspects in any combination. Inaddition, various signals representing data or events as describedherein may be transferred between a source and a destination in the formof light or electromagnetic waves traveling through signal-conductingmedia such as metal wires, optical fibers, or wireless transmissionmedia (e.g., air or space). In general, the one or morecomputer-readable media may be and/or include one or more non-transitorycomputer-readable media.

As described herein, the various methods and acts may be operativeacross one or more computing servers and one or more networks. Thefunctionality may be distributed in any manner, or may be located in asingle computing device (e.g., a server, a client computer, and thelike). For example, in alternative embodiments, one or more of thecomputing platforms discussed above may be combined into a singlecomputing platform, and the various functions of each computing platformmay be performed by the single computing platform. In such arrangements,any and/or all of the above-discussed communications between computingplatforms may correspond to data being accessed, moved, modified,updated, and/or otherwise used by the single computing platform.Additionally or alternatively, one or more of the computing platformsdiscussed above may be implemented in one or more virtual machines thatare provided by one or more physical computing devices. In sucharrangements, the various functions of each computing platform may beperformed by the one or more virtual machines, and any and/or all of theabove-discussed communications between computing platforms maycorrespond to data being accessed, moved, modified, updated, and/orotherwise used by the one or more virtual machines.

Aspects of the disclosure have been described in terms of illustrativeembodiments thereof. Numerous other embodiments, modifications, andvariations within the scope and spirit of the appended claims will occurto persons of ordinary skill in the art from a review of thisdisclosure. For example, one or more of the steps depicted in theillustrative figures may be performed in other than the recited order,and one or more depicted steps may be optional in accordance withaspects of the disclosure.

What is claimed is:
 1. A computing platform, comprising: at least oneprocessor; a communication interface communicatively coupled to the atleast one processor; and memory storing computer-readable instructionsthat, when executed by the at least one processor, cause the computingplatform to: receive driver sensor data indicating whether a driver seatin a vehicle is occupied; determine, based on the driver sensor data, anidentity of a driver of the vehicle; receive passenger sensor dataindicating whether a passenger seat in the vehicle is occupied; based onthe passenger sensor data indicating that the passenger seat in thevehicle is occupied, obscure information on a screen of the vehicle. 2.The computing platform of claim 1, wherein the information on the screenof the vehicle is information associated with a driver of the vehicle.3. The computing platform of claim 2, wherein the information on thescreen of the vehicle comprises one of a text message to the driver ofthe vehicle, a voicemail to the driver of the vehicle, or a call historyof the driver of the vehicle.
 4. The computing platform of claim 1,wherein the memory stores additional computer-readable instructionsthat, when executed by the at least one processor, cause the computingplatform to: based on the driver sensor data indicating that the driverseat in the vehicle is not occupied, and the passenger sensor dataindicating that the passenger seat in the vehicle is occupied,deactivate the screen of the vehicle.
 5. The computing platform of claim1, wherein the memory stores additional computer-readable instructionsthat, when executed by the at least one processor, cause the computingplatform to: receive driver identification information; and activate adriver profile based on the identity of the driver of the vehicle. 6.The computing platform of claim 5, wherein the memory stores additionalcomputer-readable instructions that, when executed by the at least oneprocessor, cause the computing platform to: receive passengeridentification information; determine an identity of a passenger of thevehicle based on the passenger identification information; determine theinformation to be obscured based on the identity of the passenger. 7.The computing platform of claim 6, wherein the memory stores additionalcomputer-readable instructions that, when executed by the at least oneprocessor, cause the computing platform to: receive, from a camera, atleast one image of the passenger of the vehicle, wherein the passengeridentification information comprises the at least one image of thepassenger of the vehicle, and wherein determining the identity of thepassenger of the vehicle comprises performing facial recognition of theat least one image of the passenger of the vehicle to determine theidentity of the passenger.
 8. The computing platform of claim 6, whereinthe memory stores additional computer-readable instructions that, whenexecuted by the at least one processor, cause the computing platform to:receive, from a microphone, audio that includes speech spoken by thepassenger of the vehicle, wherein the passenger identificationinformation comprises the audio, and wherein determining the identity ofthe passenger of the vehicle comprises performing voice recognition ofthe audio to determine the identity of the passenger.
 9. The computingplatform of claim 6, wherein the memory stores additionalcomputer-readable instructions that, when executed by the at least oneprocessor, cause the computing platform to: based on the identity of thepassenger of the vehicle, determine a privacy mode of a plurality ofprivacy modes; activate the privacy mode; and determine, based on theprivacy mode, the information to be obscured.
 10. The computing platformof claim 9, wherein the memory stores additional computer-readableinstructions that, when executed by the at least one processor, causethe computing platform to: in a case that a first privacy mode of theplurality of privacy modes is activated, apply a first privacy settingto a first application of the vehicle, and apply a second privacysetting to a second application of the vehicle; in a case that a secondprivacy mode of the plurality of privacy modes is activated, apply athird privacy setting to the first application, the third privacysetting being different from the first privacy setting, and apply afourth privacy setting to the second application, the fourth privacysetting being different from the second privacy setting.
 11. Thecomputing platform of claim 1, wherein the memory stores additionalcomputer-readable instructions that, when executed by the at least oneprocessor, cause the computing platform to: determine a location of thevehicle; and select the information to be obscured based on the locationof the vehicle.
 12. The computing platform of claim 11, whereindetermining a location of the vehicle comprises determining that thelocation of the vehicle indicates that the vehicle is within apredetermined geo-fence of a plurality of predetermined geo-fences, andwherein selecting the information to be obscured based on the locationof the vehicle comprises determining whether a profile associated withthe predetermined geo-fence indicates that the information is to beobscured.
 13. The computing platform of claim 1, wherein the memorystores additional computer-readable instructions that, when executed bythe at least one processor, cause the computing platform to: determine atype of key being used for the vehicle, wherein the obscured informationcomprises first information in a case of a first type of key being usedfor the vehicle, and wherein the obscured information comprises secondinformation different from the first information in a case of a secondtype of key being used for the vehicle.
 14. The computing platform ofclaim 13, wherein the first type of key is a standard key, and whereinthe second type of key is a limited-use key.
 15. The computing platformof claim 1, wherein the memory stores additional computer-readableinstructions that, when executed by the at least one processor, causethe computing platform to: receive, from a user device associated with adriver of the vehicle, a privacy profile for the vehicle; and determinethe information to be obscured based on the privacy profile for thevehicle.
 16. The computing platform of claim 15, wherein the privacyprofile for the vehicle is associated with a type of the vehicle. 17.The computing platform of claim 1, wherein the memory stores additionalcomputer-readable instructions that, when executed by the at least oneprocessor, cause the computing platform to: receive, via a microphone ofthe vehicle, an activation phrase; determine that the activation phrasecorresponds to a privacy mode of a plurality of privacy modes; andactivate the privacy mode.
 18. The computing platform of claim 17,wherein the activation phrase is a distress phrase, and the privacy modeis a distress mode.
 19. A method, comprising: at a computing platformcomprising at least one processor, memory, and a communicationinterface: receiving, by the at least one processor, driver sensor dataindicating whether a driver seat in a vehicle is occupied; determining,by the at least one processor, based on the driver sensor data, anidentity of a driver of the vehicle; receiving, by the at least oneprocessor, passenger sensor data indicating whether a passenger seat inthe vehicle is occupied; based on the passenger sensor data indicatingthat the passenger seat in the vehicle is occupied, obscuring, by the atleast one processor, information on a screen of the vehicle.
 20. One ormore non-transitory computer-readable media storing instructions that,when executed by a computing platform comprising at least one processor,memory, and a communication interface, cause the computing platform to:receive driver sensor data indicating whether a driver seat in a vehicleis occupied; determine, based on the driver sensor data, an identity ofa driver of the vehicle; receive passenger sensor data indicatingwhether a passenger seat in the vehicle is occupied; based on thepassenger sensor data indicating that the passenger seat in the vehicleis occupied, obscure information on a screen of the vehicle.