Technologies for managing social relationships of a computing device social group

ABSTRACT

Technologies for managing social relationships of a computing device social group includes exchanging device attributes amongst the members of the computing device social group, determining a social relationship between members, and sharing a social interaction policy based on the social relationship. The social interaction policy and the social relationship are used to define and control interactions of members of the computing device social group.

BACKGROUND

Computing devices are quickly becoming ubiquitous tools for many users.In fact, the number of smart devices owned by a user or with which theuser interacts on a daily basis is ever increasing. With the explosionin numbers of computing devices, many of which are configured tocommunicate with each other, managing the operation, privileges, andactions of one's computing devices is becoming complex and overlydifficult for the average user. Further, the average user may not havethe time or technical know-how to manage the behavior policies of theircomputing devices.

Oftentimes hard-coded or pre-defined policies are relied on by a userdue to the difficulty of managing the array of computing devices and thetime required to perform such maintenance. However, thehard-coded/pre-defined behavior policies of a typical computing devicemay not be suitable for the environment in which the user will use thecomputing device. For example, such behavior policies may not functionwell and/or function in unanticipated ways within the user's homenetwork of computing devices. Additionally, the user may have custompolicies in place, which require the reprogramming of the computingdevice. For example, if an old computing device is replaced with a newermodel, the user would be required to re-instantiate the custom policiesinto the newer model. Such managing of computing devices is burdensomeand often leads to failure to manage the policies, which can result insecurity or privacy concerns.

BRIEF DESCRIPTION OF THE DRAWINGS

The concepts described herein are illustrated by way of example and notby way of limitation in the accompanying figures. For simplicity andclarity of illustration, elements illustrated in the figures are notnecessarily drawn to scale. Where considered appropriate, referencelabels have been repeated among the figures to indicate corresponding oranalogous elements.

FIG. 1 is a simplified diagram of at least one embodiment of a systemfor managing social relationships of computing device social groups;

FIG. 2 is a simplified block diagram of a new member computing deviceand an advisor computing device of a social group of the system of FIG.1;

FIG. 3 is a simplified block diagram of an environment that may beestablished by the new member computing device and/or the advisorcomputing device of FIG. 2;

FIG. 4 is a simplified flow diagram of a method for establishing asocial interaction policy for a new group member that may be executed bythe advisor computing device of FIGS. 2 and 3;

FIG. 5 is a simplified flow diagram of a method for establishing asocial interaction policy that may be executed by the new membercomputing device of FIGS. 2 and 3; and

FIG. 6 is a simplified flow diagram of a method for updating socialrelationships that may be executed by a computing device of a computingdevice social group of FIG. 1.

DETAILED DESCRIPTION OF THE DRAWINGS

While the concepts of the present disclosure are susceptible to variousmodifications and alternative forms, specific embodiments thereof havebeen shown by way of example in the drawings and will be describedherein in detail. It should be understood, however, that there is nointent to limit the concepts of the present disclosure to the particularforms disclosed, but on the contrary, the intention is to cover allmodifications, equivalents, and alternatives consistent with the presentdisclosure and the appended claims.

References in the specification to “one embodiment,” “an embodiment,”“an illustrative embodiment,” etc., indicate that the embodimentdescribed may include a particular feature, structure, orcharacteristic, but every embodiment may or may not necessarily includethat particular feature, structure, or characteristic. Moreover, suchphrases are not necessarily referring to the same embodiment. Further,when a particular feature, structure, or characteristic is described inconnection with an embodiment, it is submitted that it is within theknowledge of one skilled in the art to effect such feature, structure,or characteristic in connection with other embodiments whether or notexplicitly described. Additionally, it should be appreciated that itemsincluded in a list in the form of “at least one A, B, and C” can mean(A); (B); (C): (A and B); (B and C); (A and C); or (A, B, and C).Similarly, items listed in the form of “at least one of A, B, or C” canmean (A); (B); (C): (A and B); (B and C); (A or C); or (A, B, and C).

The disclosed embodiments may be implemented, in some cases, inhardware, firmware, software, or any combination thereof. The disclosedembodiments may also be implemented as instructions carried by or storedon one or more transitory or non-transitory machine-readable (e.g.,computer-readable) storage medium, which may be read and executed by oneor more processors. A machine-readable storage medium may be embodied asany storage device, mechanism, or other physical structure for storingor transmitting information in a form readable by a machine (e.g., avolatile or non-volatile memory, a media disc, or other media device).

In the drawings, some structural or method features may be shown inspecific arrangements and/or orderings. However, it should beappreciated that such specific arrangements and/or orderings may not berequired. Rather, in some embodiments, such features may be arranged ina different manner and/or order than shown in the illustrative figures.Additionally, the inclusion of a structural or method feature in aparticular figure is not meant to imply that such feature is required inall embodiments and, in some embodiments, may not be included or may becombined with other features.

Referring now to FIG. 1, a system 100 for managing social relationshipsbetween computing devices of computing device social groups includes agroup of computing devices 120, each of which belong to an establishedcomputing device social group 102. Additionally, as illustratively shownin FIG. 1, each of the computing devices 120 also belong to a computingdevice social group 104, along with computing devices 130. Each of thecomputing device social groups 102, 104 define a set of correspondingcomputing devices 120, 130 that share common attributes and haveestablished a group social interaction policy amongst themselves. Asdiscussed in more detail below, the group social interaction policydefines how the various computing devices 120, 130 of a particularcomputing device social group 102, 104 interact with each other. Thecommon attributes on which a computing device social group is based maybe embodied as any type of attribute useable to establish commonalitybetween the group members. For example, the attributes may includephysical characteristics such as make, model, or type of the computingdevice, proximity characteristics such as co-location or the length oftime a computing device has been present, activity characteristics suchas the function of the computing device, historical interactions withother group members, or interactions with other computing devices,and/or other characteristics of the individual computing devices.

As discussed above, each computing device social group 102, 104maintains a group social interaction policy that defines rules forinteracting with members of the computing device social group 102, 104(e.g., the social “norms” of the social group). In some embodiments,each member of a computing device social group 102, 104 may maintain acopy of the group social interaction policy, as well as a local socialinteraction policy. The local social interaction policy may be embodiedas a group social interaction policy that has been modified based on theattributes or requirements of the particular computing device 120, 130.

Each member of a computing device social group 102, 104 also maintains asocial relationship with other members of the computing device socialgroup 102, 104. Each social relationship may be defined by variousparameters such as a social relationship trust parameter indicative howamount much trust one member has in another member and a socialrelationship strength parameter indicative of how much one member“likes” another member, which may define actions that the member willperform for the other member as discussed below.

Each computing device social group 102, 104 of the system 100 issubstantially self-maintaining based on a sharing of the group socialinteraction policy as discussed in more detail below. Some of thecomputing devices 120, 130 of a computing device social group 102, 104may be identified as advisor computing devices capable of initializingnew members to the social group 102, 104. In some embodiments, eachcomputing device 120, 130 of a computing device social group 102, 104may act as an advisor computing device; however, in other embodimentsthe advisor computing devices of the particular computing device socialgroup 102, 104 may be pre-determined or based on particular criteria(e.g., the “oldest” member of the group, the member with the greatestamount of knowledge of social interactions, etc.). New members to acomputing device social group 102, 103 may communicate with the advisorcomputing device to obtain copies of the group social interaction policyand build social relationships with the advisor computing device andother members of the computing device social group 102, 103. Forexample, as shown in FIG. 1, a new member computing device 110 is in theprocess of joining the computing device social group 102. To do so, thenew member computing device 110 may interact with an advisor computingdevice 120 of the computing device social group 102 to establish aninitial group social interaction policy and social relationships (see,e.g., FIG. 2). As discussed in more detail below, the social nature ofthe computing device social groups 102, 104 facilitate the sharing ofgroup policies or norms, social relationships, and other data.

Illustratively, each of the computing devices 120 may communicate withother members of the computing device social group 102 via a localnetwork 140 and/or with members of the social group 104 via a localnetwork 142. Additionally, each of the computing devices 120, 130 maycommunicate with remote computing devices 150 over a network 144. Eachof the networks 140, 142, 144 may be embodied as any type ofcommunication network capable of facilitating communications between thecomputing devices 120, 130, 150. As such, the networks 140, 142, 144 mayinclude one or more networks, routers, switches, computers, and/or otherintervening devices. For example, the network 140, 142, 144 may beembodied as or otherwise include one or more local or wide areanetworks, cellular networks, publicly available global networks (e.g.,the Internet), an ad hoc network, a short-range communication network orlink, or any combination thereof.

It should be appreciated that although the illustrative system 100includes only two computing device social groups 102, 104, the system100 may include any number of computing device social groups in otherembodiments. Additionally, each computing device social group of thesystem 100 may include any number of computing devices (e.g., two ormore).

Referring now to FIG. 2, an illustrative new member computing device 110and an illustrative advisor computing device 120 of the computing devicesocial group 102 is shown. Each of the computing devices 110, 120 andother computing devices of the system 100 may be embodied as any type ofcomputing device capable of communicating with other members of acomputing device social group and performing the functions describedherein. For example, each computing device 110, 120 may be embodied asany type of computing device including, but not limited to, a mobile orstationary computer, a smart device, a smart phone, a smart accessory, asmart watch, a smart wallet, a smart tool, smart keys, smart glasses,smart dishware, a smart appliance, a vehicle computer, a head-mounteddisplay unit, a tablet computer, a notebook computer, a laptop computer,a cellular telephone, a handset, a messaging device, a multiprocessorsystem, a processor-based system, a consumer electronic device, and/orany other computing device capable of communicating with other membersof a computing device social group. In some embodiments the computingdevices 110, 120 may be embodied as smart devices having limited or nouser interface through which a user may configured or program thecomputing device 110, 120.

As shown in FIG. 1, the illustrative computing device 110 includes aprocessor 210, an I/O subsystem 212, a memory 214, a data storage 216,and a communication circuit 218. Of course, the computing device 110 mayinclude other or additional components, such as those commonly found ina computer (e.g., various input/output devices), in other embodiments.Additionally, in some embodiments, one or more of the illustrativecomponents may be incorporated in, or otherwise form a portion of,another component. For example, the memory 214, or portions thereof, maybe incorporated in the processor 210 in some embodiments

The processor 210 may be embodied as any type of processor capable ofperforming the functions described herein. For example, the processor210 may be embodied as a single or multi-core processor(s), a single ormulti-socket processor, a digital signal processor, a microcontroller,or other processor or processing/controlling circuit. Similarly, thememory 214 may be embodied as any type of volatile or non-volatilememory or data storage capable of performing the functions describedherein. In operation, the memory 214 may store various data and softwareused during operation of the computing device 110 such as operatingsystems, applications, programs, libraries, and drivers. The memory 214is communicatively coupled to the processor 210 via the I/O subsystem212, which may be embodied as circuitry and/or components to facilitateinput/output operations with the processor 210, the memory 214, andother components of the computing device 110. For example, the I/Osubsystem 212 may be embodied as, or otherwise include, memorycontroller hubs, input/output control hubs, firmware devices,communication links (i.e., point-to-point links, bus links, wires,cables, light guides, printed circuit board traces, etc.) and/or othercomponents and subsystems to facilitate the input/output operations. Insome embodiments, the I/O subsystem 212 may form a portion of asystem-on-a-chip (SoC) and be incorporated, along with the processor210, the memory 214, and other components of the computing device 110,on a single integrated circuit chip.

The data storage 216 may be embodied as any type of device or devicesconfigured for the short-term or long-term storage of data. For example,the data storage 216 may include any one or more memory devices andcircuits, memory cards, hard disk drives, solid-state drives, or otherdata storage devices. Illustratively, the data storage 216 stores deviceattributes 250, which define various characteristics of the computingdevice 110. The device attributes 250 may be embodied as any type ofcharacteristic of the computing device 110 from which an amount oftrustworthiness may be determined. For example, the device attributes250 may define physical characteristics (make, model, type, processorpower, memory capacity, storage capacity, communication bandwidth,etc.), persistency characteristics (e.g., the devices proximity, howlong the device has been in communication with the social group, etc.),historical interaction characteristics (e.g., interactions with membersof the group or other groups), and/or any other characteristic of thecomputing device 110 that maybe used to determine a similarity withother computing devices.

The data storage 216 may also include a local social interaction policy252. As discussed above, the local social interaction policy 252 definesa set of rules controlling the interactions and behavior of thecomputing device 110. Oftentimes, the local social interaction policy252 of a computing device may be similar to or identical to the groupsocial interaction policy 254. However, as discussed above, individualcomputing devices of a computing device social group may modify or addto the group social interaction policy as needed. Additionally, in someembodiments, a new member of a computing device social group may includean initial policy 260, which is used by the computing device 110 tocontrol initial interactions with group members prior to receiving thegroup social interaction policy from an advisor computing device.

The communication circuit 218 may be embodied as any communicationcircuit, device, or collection thereof, capable of enablingcommunications between the computing device 110 and other computingdevices of the computing device social group. To do so, thecommunication circuit 218 may be configured to use any one or morecommunication technology and associated protocols (e.g., Ethernet,Bluetooth®, Wi-Fi®, WiMAX, etc.) to effect such communication.

In some embodiments, the computing device 110 may include one or moresensors 220 for sensing various stimuli and generating sensor dataindicative thereof. If the computing device 110 is a member of acomputing device social group, the computing device 110 may share thesensor data according to the group social interaction policy 254 and thesocial relationship established with the receiving computing device.Additionally, in some embodiments, the computing device 110 may furtherinclude one or more peripheral devices 222. The peripheral devices 222may include any type of peripheral device commonly found in a computerdevice, for example, a display, a hardware keyboard, input/outputdevices, peripheral communication devices, and/or other peripheraldevices.

The advisor computing device 120 may be substantially similar to ordifferent from the computing device 110, but share common attributes asdiscussed above. As shown in FIG. 2, the illustrative computing device120 includes a processor 230, an I/O subsystem 232, a memory 234, a datastorage 236, a communication circuit 238, and may include sensors 240,and peripheral devices 242. Of course, the computing device 110 mayinclude other or additional components, such as those commonly found ina computer (e.g., various input/output devices), in other embodiments.Each of the components of the advisor computing device 120 may besubstantially similar to corresponding components of the computingdevice 110 (e.g., the processor 230 may be similar to the processor 210,etc.), the description of which is equally applicable to the componentsof the advisor computing device 120 and are not repeated herein forclarity of the description.

Similar to the computing device 110, the data storage 236 of the advisorcomputing device 120 includes device attributes 250 and a local socialinteraction policy 252. As discussed above, the device attributes 250 ofthe computing device 120 define various characteristics of the computingdevice 120. Again, the device attributes 250 may be embodied as any typeof characteristic of the computing device 120 from which an amount oftrustworthiness may be determined. For example, the device attributes250 may define physical characteristics, persistency characteristics,historical interaction characteristics, and/or any other characteristicof the computing device 120 that may be used to determine atrustworthiness of the computing device 120.

The data storage 236 also stores a local social interaction policy 252of the advisor computing device 120. Again, as discussed above, thelocal social interaction policy 252 defines a set of rules controllingthe interactions and behavior of the computing device 120. Because theadvisor computing device 120 is illustratively an active member of thecomputing device social group 102, the advisor computing device 120 alsoincludes a copy of the group social interaction policy 254. The groupsocial interaction policy 254 defines a set of global rules forcontrolling interactions and activity of members of the computing devicesocial group 102. As discussed above, in some embodiments, the localsocial interaction policy 252 of a computing device may be identical to,similar to, or a modified version of the group social interaction policy254. Further, in some embodiments, the advisor computing device 120 alsostores social group data 256 in the data storage 236. The social groupdata 256 is embodied as raw group data that may be indicative of groupinteractions, rules, policies, historical data, or any other type ofdata based on the computing device social group and from which thecomputing device 110 may determine or infer a local social interactionpolicy. For example, in some embodiments, the computing device 110 mayimplement a machine learning algorithm to determine its local socialinteraction policy using the social group data as initial training setdata.

As discussed above, each of the computing devices of a computing devicesocial group establish a social relationship between each other. Asshown in FIG. 2, the new member computing device 110 and the advisorcomputing device 120 have established a social relationship 280.Illustratively, the social relationship 280 includes a trust parameterand a strength parameter. The trust parameter defines how much trust thecomputing device 110 has in the data received from the advisor computingdevice 120 and vice-versa, and the strength parameter defines how muchthe computing device 110 and the advisor computing device 120 “like”each other, which defines the type of actions and/or response eachdevice 110, 120 will perform for each other. Although the socialrelationship 280 is shown in FIG. 2 as a two-way relationship, it shouldbe appreciated that a social relationship between two members of acomputing device social group may be one-way. That is, each member mayhave a social relationship with another member having different trustand strength parameters. Additionally, the social relationship 280between two members of a computing device social group may change,modify, or be updated over time based on various criteria such aschanges in the computing device member's device attributes, activity, orpersistency.

Referring now to FIG. 3, in use, each computing device 110, 120 mayestablish an environment 300. The illustrative environment 300 includesa social relationship management module 302, a social interaction policymanagement module 304, and a social interaction control module 306. Eachof the modules and other components of the environment 300 may beembodied as firmware, software, hardware, or a combination thereof. Forexample the various modules, logic, and other components of theenvironment 300 may form a portion of, or otherwise be established by,the processor 210, 230, the I/O subsystem 212, 232, an SoC, or otherhardware components of the computing device 110, 120. As such, in someembodiments, any one or more of the modules of the environment 300 maybe embodied as a circuit or collection of electrical devices (e.g., asocial relationship management circuit, a social interaction policymanagement circuit, and a social interaction control circuit, etc.).

The social relationship management module 302 includes a relationshiptrust update module 310 and a relationship strength update module 312.As discussed above, the social relationship between two members of acomputing device social group may be defined by various parameters, suchas a trust parameter and a strength parameter. Additionally, the socialrelationship parameters may change over time as discussed above. Assuch, the relationship trust update module 310 is configured toestablish and update the trust parameter of a social relationship of thecomputing device 110, 120. To do so, the relationship trust updatemodule 310 includes an attribute analysis module 320 configured toobtain device attributes of another member of the computing devicesocial group and determine the level of trust in the social relationshipbased on the device attributes.

For example, the attribute analysis module 320 may include a similarityanalysis module 330 that analyzes the device attributes of the othercomputing device 110, 120 to determine an amount of similarity betweenthe two computing device 110, 120. For example, the similarity analysismodule 330 may analyze device attributes indicative of physicalcharacteristics of the other computing device 110, 120 (e.g., are thedevices of the same type, from the same manufacturer, perform similarfunctions, located on the same network, etc.). The determination of thesimilarity analysis module 330 may positively or negatively affect therelationship trust parameter of the social relationship with the othercomputing device 110, 120. For example, a determination that the othercomputing device 110, 120 has the same manufacturer may increase thelevel of trust the computing device 110, 120 has for the other computingdevice 110, 120.

The attribute analysis module 320 may also include a persistencyanalysis module 332 that analyzes device attributes of the othercomputing device 110, 120 to determine an amount of persistency of theother computing device 110, 120. The measured persistency may beembodied as any type of persistency characteristic such physicalproximity (e.g., how long the other computing device 110, 120 has beenclose by to the computing device 110, 120 based on, for example, globalpositioning system data, indoor positioning location data, wirelessreceive signal strength indication, etc.), architectural persistency(e.g., how long have the computing devices 110, 120 been on the samenetwork, shared similar IP addresses, etc.), persistency in dataexchanged between devices, persistency of IP or other address, or otherdata indicative of a persistency characteristic. Again, thedetermination of the persistency analysis module 332 may positively ornegatively affect the relationship trust parameter of the socialrelationship with the other computing device 110, 120.

The attribute analysis module 320 may also include an attestationanalysis module 334, which evaluates any attestations for the othercomputing device 110, 120 received from other members of the computingdevice social group 102. For example, if the other computing device 110,120 is introduced to a computing device 110, 120 by a trusted member ofthe computing device social group 102, the computing device 110, 120 mayestablish a higher level of trust for the other computing device 110,120.

The attribute analysis module 320 may also include a historicalinteraction analysis module 336, which analyzes historical behavior andinteractions of the other computing device 110, 120. Such historicalbehaviors and interactions may include evaluation of data previouslyshared by the other computing device 110, 120 (e.g., was the dataaccurate or useful), has the other computing device 110, 120 repeatedlyabided by or violated the group social interaction policy 254, has theother computing device 110, 120 behaved in a predictable manner (e.g.,has the other computing device 110, 120 behaved according to a mannerpredicated by the computing device 110, 120, etc.). Again, thedetermination of the historical interaction analysis module 336 maypositively or negatively affect the relationship trust parameter of thesocial relationship with the other computing device 110, 120.

Of course, it should be appreciated that the attribute analysis module320 may analyze other types of device attributes, characteristics,qualities, or other data about the other computing device 110, 120 toestablish the trust parameter of a social relationship with the othercomputing device 110, 120. Additionally, as discussed in more detailbelow, the computing device 110, 120 may continually update the trustparameter based on an updated analysis of the device attributes.

As discussed above, the social relationship management module 302 alsoincludes the relationship strength update module 312. The relationshipstrength update module 312 is configured to establish and update astrength parameter of a social relationship of the computing device 110,120. The strength parameter is an indication of how much the computingdevice 110, 120 “likes” or responds to the other computing device 110,120. In practical terms, the strength parameter defines the types andquality of actions the computing device 110, 120 will perform for theother computing device 110, 120. For example, if the other computingdevice 110, 120 requests the computing device 110, 120 to reducebandwidth consumption, the computing device 110, 120 may satisfy thatrequest, to varying degrees, if the strength of the social relationshipbetween the computing device s110, 110 is high. Alternatively, thecomputing device 110, 120 may ignore the request, respond more slowly,or respond with a reduced effect if the strength of the socialrelationship between the computing devices is low. The relationshipstrength update module 312 includes a device attribute analysis module340, similar to the analysis attribute module 320 of the relationshiptrust update module 310. The device attribute analysis module 340analyzes the device attributes of the other computing device 110, 120 todetermine and update the strength parameter of the social relationship.The device attribute analysis module 340 may include similarsub-modules, and perform in a similar manner, as described above for theattribute analysis module 320. For example, the device attributeanalysis module 340 may include a similarity analysis module 330, apersistency analysis module 332, an attestation analysis module 334,and/or a historical interaction analysis module 336.

The relationship trust update module 310 may also include an attributequery response module 314. The attribute query response module 314 isconfigured to respond to attribute requests from other computing device110, 120. To do so, the attribute query response module 314 may retrieveand transmit the device attributes of the computing device 110, 120 fromthe device attribute database 250.

The social interaction policy management module 304 of the environment300 is configured to manage the global and/or local social interactionpolicies 252, 254 stored on the computing device 110, 120. For example,the social interaction policy management module 304 includes a policysharing module 350 to facilitate the sharing of the group socialinteraction policy 254 and/or its own local social interaction policy252. As discussed above, the computing device 110, 120 may act as anadvisor computing device for new members and share the group socialinteraction policy (or portions thereof) based on the device attributesand/or social relationship established with new members.

In some embodiments, the social interaction policy management module 304may also include a social interaction rule generation module 352. Thesocial interaction rule generation module 352 is configured to modify,update, or generate rules included in the group social interactionpolicy 254 and/or the local social interaction policy 252 of thecomputing device 110, 120. For example, as discussed above, thecomputing device 110, 120 may receive raw social group data 256 andutilize the social group data 256 to infer or generate socialinteraction rules using machine learning algorithms or the like. Suchgenerated social interaction rules may be add to the group socialinteraction policy 254 (e.g., by majority vote or via anothermechanism).

The social interaction control module 306 is configured to control theinteractions of the computing device 110, 120 according to its localsocial interaction policy 252, which is identical to or based on thegroup social interaction policy 254. To do so, the social interactioncontrol module 306 may control a communication module 360 of thecomputing device 110, 120 to ensure the computing device 110, 120behaves according to the social interaction policy 252, 254.

Referring now to FIG. 4, in use, an advisor computing device 120 mayexecute a method 400 for establishing a social interaction policy for anew member computing device 110 of the computing device social group102. The method 400 begins with block 402 in which the advisor computingdevice 120 determines whether a new member computing device 110 hasjoined the computing device social group 102. To do so, the advisorcomputing device 120 may receive a request from the new member computingdevice 110, broadcast its services, or otherwise identify a new membercomputing device 110 based on the behavior of the new member computingdevice 110 (e.g., is the new member computing device 110 behavingaccording to the group social interaction policy 254).

If the advisor computing device 120 detects a new group member, themethod 400 advances to block 404 in which the advisor computing device120 establishes an initial social relationship with the new membercomputing device 110. To do so, the advisor computing device 120 mayexchange device attributes with the new member computing device 110 inblock 406. In some embodiments, the advisor computing device 120 mayrequest the new member computing device 110 provide its deviceattributes before providing the device attributes of the advisorcomputing device 120 (e.g., to determine whether the new membercomputing device 110 is acceptable for the computing device social group102). In block 408, the advisor computing device 120 analyses the deviceattributes of the new member computing device 110. As discussed above,the advisor computing device 120 may analyze any device attribute of thenew member computing device 110 useful in establishing an initial trustparameter of the social relationship with the new member computingdevice 110. For example, in block 410, the advisor computing device 120may analyze the device attributes of the new member computing device 110to determine an amount of similarity between the advisor computingdevice 120 and the new member computing device 110. Additionally, inblock 412, the advisor computing device 120 may analyze the deviceattributes of the new member computing device 110 to determine an amountof amount of persistency of the new member computing device 110.Further, in block 414, the advisor computing device 120 may analyze anyattestations for the new member computing device 110 received from othermembers of the computing device social group 102. Regardless of theparticular device attributes analyzed, the advisor computing device 120generates an initial social relationship trust and an initial socialrelationship strength for the social relationship with the new membercomputing device 110 in block 416.

After the advisor computing device 120 has established the initialsocial relationship with the new member computing device 110, the method400 advances to block 418 in which the advisor computing device 120determines a social group interaction policy for the new membercomputing device 110. To do so, in some embodiments, the advisorcomputing device 120 may select the default or existing group socialinteraction policy 254 (i.e., the social group interaction policy 254used by typical group member). Alternatively, in some embodiments, theadvisor computing device 120 may modify the social group interactionpolicy 254 based on the established social relationship with the newmember computing device 110. For example, if the trust parameter of thesocial relationship is weak (e.g., the new member computing device 110is very dissimilar from the advisor computing device 120), the advisorcomputing device 120 may modify the social group interaction policy 254(e.g., by removing group privileges, adding more stringent requirements,etc.). In this way, the advisor computing device 120 may modify theexpected “norms” of the new member computing device 110 based on thetrustworthiness of the new member computing device 110. Overtime, a thenew member computing device 110 builds additional trust, the advisorcomputing device 120 may update the social interaction policy of the newmember computing device 110.

In block 424, the advisor computing device 120 transmits the socialinteraction policy to the new member computing device 110. To do so, inblock 426, the advisor computing device 120 transmits the socialinteraction policy determined in block 418. Alternatively, the advisorcomputing device 120 may transmit its own local social interactionpolicy in block 428. For example, if the advisor computing device 120determines that the new member computing device 110 is very similar tothe advisor computing device 120 (e.g., the same type of device from thesame manufacturer) or has a high level of trust in the new membercomputing device 110, the advisor computing device 120 may transmit itsown local social interaction policy to the new member computing device110. Alternatively or additionally, the advisor computing device 120 maytransmit the social group data in block 430. As discussed above, thesocial group data 256 is embodied as raw group data that may beindicative of group interactions, rules, policies, historical data, orany other type of data based on the computing device social group andfrom which the computing device 110 may determine or infer a localsocial interaction policy (e.g., via use of a machine learningalgorithm). In this way, an advisor computing device 120 may initializea new member computing device 110 of the computing device social group102 with the group social interaction policy to control the behavior ofthe new member.

Referring now to FIG. 5, in use, a new member computing device 110 mayexecute a method 500 for establishing a social interaction policy. Themethod begins with block 502 in which the computing device 110determines whether to join a new social group. If so, the method 500advances to block 504 in which the new member computing device 110identifies an advisor computing device 120 from the group members. Asdiscussed above, each computing device 120 of the computing devicesocial group 102 may be an advisor in some embodiments. In otherembodiments, the advisors of the computing device social group 102 maybroadcast messages introducing themselves as advisors for the computingdevice social group 102. Further, the new member computing device 110may broadcast requests for an advisor.

Regardless, once the new member computing device 110 identifies anadvisor computing device 120, the method 500 advances to block 506 inwhich the computing device 110 establishes an initial socialrelationship with the advisor computing device 120. To do so, thecomputing device 110 may exchange device attributes with the advisorcomputing device 120 in block 408. In block 510, the computing device110 analyses the device attributes of the advisor computing device 120.For example, similar to advisor computing device 120 discussed above,the computing device 110 may analyze the device attributes of theadvisor computing device 120 to determine an amount of similaritybetween computing device 110 and the advisor computing device 120 inblock 512. Additionally, in block 514, the computing device 110 mayanalyze the device attributes of the advisor computing device 120 todetermine an amount of amount of persistency of the advisor computingdevice 120. Further, in block 516, the computing device 110 may analyzeany attestations for the advisor computing device 120 received fromother members of the computing device social group 102. Regardless ofthe particular device attributes analyzed, the computing device 110generates an initial social relationship trust and an initial socialrelationship strength for the social relationship with the advisorcomputing device 120 in block 518.

In block 520, the computing device 110 receives a social interactionpolicy from the advisor computing device 120. For example, the computingdevice 110 may receive the social group interaction policy from theadvisor computing device 120 in block 422 or receive a copy of theadvisor computing device's 120 local social interaction policy in block524. Additionally or alternatively, the computing device 110 may receivethe social group raw data in block 526. In such embodiments, thecomputing device 110 may determine a local social interaction policybased on the social group raw data (e.g., based on a machine learningalgorithm).

Once the new member computing device 110 has established an initialsocial interaction policy, the computing device beings communicatingwith members of the computing device social group 102 and remote groups104 based on its local social interaction policy, which may be the sameas the group social interaction policy or a modification thereof asdiscussed above.

Referring now to FIG. 6, in use, each of the computing devices 110, 120of the computing device social group 102 (or other group) may execute amethod 600 for updating social relationships. The method 600 begins withblock 602 in which the computing device 110, 120 determines whether toupdate a social relationship established with a fellow member of acomputing device social group. If so, the method 600 advances to block604 in which the computing device 110, 120 determines an updated socialrelationship trust parameter. To do so, the computing device 110, 120may obtain updated device attributes from the other member in block 606.In block 608, the computing device 110, 120 analyzes the updated deviceattributes. For example, the computing device 110, 120 may analyze thedevice attributes of the other member to determine an amount ofsimilarity between computing device 110, 120 and the other member inblock 610. Additionally, in block 612, the computing device 110, 120 mayanalyze the device attributes of the other member to determine an amountof persistency of the other member. Further, in block 614, the computingdevice 110, 120 may analyze any attestations for the other memberreceived from additional members of the computing device social group102. Additionally, in block 616, the computing device 110, 120 mayanalyze any historical interactions of the other member. For example,the computing device 110, 120 may analyze interactions of the othermember with members of the computing device social group 102, analyzethe behavior of the other member relative to the group socialinteraction policy, analyze interactions of the other member withmembers of other social groups, and/or other interaction activities ofthe other member. Regardless of the particular device attributesanalyzed, the computing device 110, 120 generates an updated socialrelationship trust and an updated social relationship strength for thesocial relationship with the other member in block 618.

Subsequently, in block 620, the computing device 110, 120 interacts withthe other member based on the updated social relationship (e.g., basedon the updated social relationship trust and strength). For example, inblock 624, the computing device 110, 120 may determine the type of datato share with the other member based on the social relationship in block624. In block 626, the computing device 110, 120 may respond to requestsfrom the other member based on the social relationship with the member(e.g., to perform or not perform the request). Additionally, in block628, the computing device 110, 120 may analyze communications from theother member based on the social relationship with the member.

Accordingly, using the technologies disclosed herein, members of acomputing device social group may establish, update, and maintain socialrelationships amongst themselves. Additionally, the members of thecomputing device social group may establish and manage the norms orexpected social behavior of group members.

EXAMPLES

Illustrative examples of the devices, systems, and methods disclosedherein are provided below. An embodiment of the devices, systems, andmethods may include any one or more, and any combination of, theexamples described below.

Example 1 includes a computing device member of a computing devicesocial group, the computing device member comprising a socialrelationship management module to (i) exchange device attributes withanother computing device member of the computing device social group,wherein the device attributes define at least a physical characteristicof the associated computing device and (ii) determine parameters of asocial relationship with the another computing device member based onthe device attributes of the another computing device member, whereinthe parameters define at least an amount of trust of the anothercomputing device member by the computing device member; and a socialinteraction policy management module to (i) receive a social interactionpolicy from the another computing device member based on the deviceattributes of the computing device member, wherein the socialinteraction policy defines rules for interacting with members of thecomputing device social group, and (ii) determine a local socialinteraction policy based on the social interaction policy received fromthe another computing device and the social relationship establishedwith the another computing device; and a social interaction controlmodule to control interactions with computing device members of thecomputing device social group based on the local social interactionpolicy.

Example 2 includes the subject matter of Example 1, and wherein thedevice attributes are usable to determine an amount of similaritybetween the computing device member and the another computing devicemember.

Example 3 includes the subject matter of any of Examples 1 and 2, andwherein the device attributes comprise an attestation from a differentcomputing device member of the computing device social group for thecomputing device member or the another computing device member.

Example 4 includes the subject matter of any of Examples 1-3, andwherein the device attributes define a temporal persistency of thecomputing device member or the another computing device member with thecomputing device social group.

Example 5 includes the subject matter of any of Examples 1-4, andwherein the device attributes define historical interactions of thecomputing device member or the another computing device member withother computing device members of the computing device social group.

Example 6 includes the subject matter of any of Examples 1-5, andwherein to determine parameters of the social relationship comprises todetermine a strength parameter of the social relationship, wherein thestrength parameter dictates which actions the computing device memberwill perform for the another computing device.

Example 7 includes the subject matter of any of Examples 1-6, andwherein to receive the social interaction policy comprises to receive agroup social interaction policy for the computing device social group;and determine the local social interaction policy based on the receivedgroup social interaction policy.

Example 8 includes the subject matter of any of Examples 1-7, andwherein to receive the social interaction policy comprises to receive,from the another computing device member, a local social interactionpolicy of the another computing device member based on a similarity ofdevice attributes between the another computing device member and thecomputing device member; and determine the local social interactionpolicy based on the local social interaction policy of the anothercomputing device member.

Example 9 includes the subject matter of any of Examples 1-8, andwherein to receive the social interaction policy comprises to receive,from the another computing device member, a social group data indicativeof interactions of members of the computing device social group; anddetermine the local social interaction policy based on the receivedsocial group data.

Example 10 includes the subject matter of any of Examples 1-9, andwherein to control interactions with the computing device members basedon the social interaction policy comprises to determine a type of datato share with a member of the computing device social group based on thelocal social interaction policy.

Example 11 includes the subject matter of any of Examples 1-10, andwherein to control interactions with the computing device members basedon the social interaction policy comprises to respond to requestsreceived from a member of the computing device social group based on thesocial local interaction policy.

Example 12 includes the subject matter of any of Examples 1-11, andwherein the social relationship management module is further todetermine whether to update the social relationship established with theanother computing device member; obtain, in response to a determinationto update the social relationship, updated device attributes of theanother computing device member, wherein the updated device attributesdefine at least a physical characteristic of the another computingdevice; and re-determine the parameters of the social relationship withthe another computing device based on the updated device attributes.

Example 13 includes the subject matter of any of Examples 1-12, andwherein the updated device attributes defines an amount of similaritybetween the computing device member and the another computing devicemember.

Example 14 includes the subject matter of any of Examples 1-13, andwherein the updated device attributes comprise an attestation from adifferent computing device member of the computing device social groupfor the another computing device member.

Example 15 includes the subject matter of any of Examples 1-14, andwherein the updated device attributes define a temporal persistency ofthe another computing device member with the computing device socialgroup.

Example 16 includes the subject matter of any of Examples 1-15, andwherein the updated device attributes define historical interactions ofthe another computing device member with the computing device member.

Example 17 includes the subject matter of any of Examples 1-16, andwherein to re-determine parameters of the social relationship comprisesto re-determine a strength parameter of the social relationship based onat least one of the updated device attributes or historical interactionswith the another computing device member, wherein the strength parameterdictates which actions the computing device member will perform for theanother computing device.

Example 18 includes the subject matter of any of Examples 1-17, andwherein to control interactions with the computing device memberscomprises to control interactions with the another computing devicemember based on the local social interaction policy and the socialrelationship established with the another computing device.

Example 19 includes the subject matter of any of Examples 1-18, andwherein to control interactions with the another computing device membercomprises to determine a type of data to share with the anothercomputing device member based on the social relationship establishedwith the another computing device member.

Example 20 includes the subject matter of any of Examples 1-19, andwherein to control interactions with the another computing device membercomprises to respond to requests received from the another computingdevice member based on the social relationship established with theanother computing device member.

Example 21 includes a computing device member of a computing devicesocial group, the computing device member comprising a socialrelationship management module to (i) receive device attributes from anew computing device member of the computing device social group,wherein the device attributes define at least a physical characteristicof the new computing device member and (ii) determine parameters of asocial relationship with the new computing device member based on thedevice attributes, wherein the parameters define at least an amount oftrust of the new computing device member by the computing device member;and a social interaction policy management module to (i) determine asocial interaction policy for the new computing device member based onthe social relationship with the new computing device member, whereinthe social interaction policy defines rules for interacting with membersof the computing device social group and (ii) transmit the determinedsocial interaction policy to the new computing device member.

Example 22 includes the subject matter of Example 21, and wherein thedevice attributes defines an amount of similarity between the computingdevice member and the new computing device member.

Example 23 includes the subject matter of any of Examples 21 and 22, andwherein the device attributes comprise an attestation from a differentcomputing device member of the computing device social group for the newcomputing device member.

Example 24 includes the subject matter of any of Examples 21-23, andwherein the updated device attributes define a temporal persistency ofthe new computing device member with the computing device social group.

Example 25 includes the subject matter of any of Examples 21-24, andwherein the updated device attributes define historical interactions ofthe new computing device member with the computing device member.

Example 26 includes the subject matter of any of Examples 21-25, andwherein to determine parameters of the social relationship comprise todetermine a strength parameter of the social relationship, wherein thestrength parameter dictates which actions the computing device memberwill perform for the new computing device.

Example 27 includes the subject matter of any of Examples 21-26, andwherein the social interaction policy comprises a default socialinteraction policy.

Example 28 includes the subject matter of any of Examples 21-27, andwherein to determine the social interaction policy comprises todetermine the social interaction policy from a group social interactionpolicy based on the social relationship with the new computing devicemember.

Example 29 includes the subject matter of any of Examples 21-28, andwherein to determine the social interaction policy comprises todetermine social group data indicative of interactions of members of thecomputing device social group.

Example 30 includes the subject matter of any of Examples 21-29, andwherein social relationship management module is further to determinewhether to update the social relationship established with the newcomputing device member; obtain, in response to a determination toupdate the social relationship, updated device attributes of the newcomputing device member, wherein the updated device attributes define atleast a physical characteristic of the new computing device; andre-determine the parameters of the social relationship with the newcomputing device member based on the updated device attributes.

Example 31 includes the subject matter of any of Examples 21-30, andfurther including a social interaction control module to controlinteractions with the new computing device member based on the socialrelationship with the new computing device member

Example 32 includes the subject matter of any of Examples 21-31, and,wherein to control interactions with the new computing device membercomprises to determine a type of data to share with the new computingdevice member based on the social relationship established with the newcomputing device member.

Example 33 includes the subject matter of any of Examples 21-32, andwherein to control interactions with the new computing device membercomprises to respond to requests received from the new computing devicemember based on the social relationship established with the newcomputing device member.

Example 34 includes a method for managing social relationships of acomputing device social group, the method comprising exchanging, by acomputing device member of the computing device social group, deviceattributes with another computing device member of the computing devicesocial group, wherein the device attributes define at least a physicalcharacteristic of the associated computing device; determining, by thecomputing device member, parameters of a social relationship with theanother computing device member based on the device attributes of theanother computing device member, wherein the parameters define at leastan amount of trust of the another computing device member by thecomputing device member; receiving, by the computing device member, asocial interaction policy from the another computing device member basedon the device attributes of the computing device member, wherein thesocial interaction policy defines rules for interacting with members ofthe computing device social group; determining, by the computing devicemember, a local social interaction policy based on the socialinteraction policy received from the another computing device and thesocial relationship established with the another computing device;interacting, by the computing device member, with computing devicemembers of the computing device social group based on the local socialinteraction policy.

Example 35 includes the subject matter of Example 34, and wherein thedevice attributes are usable to determine an amount of similaritybetween the computing device member and the another computing devicemember.

Example 36 includes the subject matter of any of Examples 34 and 35, andwherein the device attributes comprise an attestation from a differentcomputing device member of the computing device social group for thecomputing device member or the another computing device member.

Example 37 includes the subject matter of any of Examples 34-36, andwherein the device attributes define a temporal persistency of thecomputing device member or the another computing device member with thecomputing device social group.

Example 38 includes the subject matter of any of Examples 34-37, andwherein the device attributes define historical interactions of thecomputing device member or the another computing device member withother computing device members of the computing device social group.

Example 39 includes the subject matter of any of Examples 34-38, andwherein determining parameters of the social relationship includesdetermining a strength parameter of the social relationship, wherein thestrength parameter dictates which actions the computing device memberwill perform for the another computing device.

Example 40 includes the subject matter of any of Examples 34-39, andwherein receiving the social interaction policy comprises receiving,from the another computing device member, a group social interactionpolicy for the computing device social group; and determining the localsocial interaction policy based on the received group social interactionpolicy.

Example 41 includes the subject matter of any of Examples 34-40, andwherein receiving the social interaction policy comprises receiving,from the another computing device member, a local social interactionpolicy of the another computing device member based on a similarity ofdevice attributes between the another computing device member and thecomputing device member; and determining the local social interactionpolicy based on the local social interaction policy of the anothercomputing device member.

Example 42 includes the subject matter of any of Examples 34-41, andwherein receiving the social interaction policy comprises receiving,from the another computing device member, a social group data indicativeof interactions of members of the computing device social group; anddetermining the local social interaction policy based on the receivedsocial group data.

Example 43 includes the subject matter of any of Examples 34-42, andwherein interacting with the computing device members based on thesocial interaction policy comprises determining a type of data to sharewith a member of the computing device social group based on the localsocial interaction policy.

Example 44 includes the subject matter of any of Examples 34-43, andwherein interacting with the computing device members based on thesocial interaction policy comprises responding to requests received froma member of the computing device social group based on the social localinteraction policy.

Example 45 includes the subject matter of any of Examples 34-44, andfurther including determining, by the computing device member, whetherto update the social relationship established with the another computingdevice member; obtaining, by the computing device member and in responseto a determination to update the social relationship, updated deviceattributes of the another computing device member, wherein the updateddevice attributes define at least a physical characteristic of theanother computing device; and re-determining the parameters of thesocial relationship with the another computing device based on theupdated device attributes.

Example 46 includes the subject matter of any of Examples 34-45, andwherein the updated device attributes defines an amount of similaritybetween the computing device member and the another computing devicemember.

Example 47 includes the subject matter of any of Examples 34-46, andwherein the updated device attributes comprise an attestation from adifferent computing device member of the computing device social groupfor the another computing device member.

Example 48 includes the subject matter of any of Examples 34-47, andwherein the updated device attributes define a temporal persistency ofthe another computing device member with the computing device socialgroup.

Example 49 includes the subject matter of any of Examples 34-48, andwherein the updated device attributes define historical interactions ofthe another computing device member with the computing device member.

Example 50 includes the subject matter of any of Examples 34-49, andwherein re-determining parameters of the social relationship includesdetermining a strength parameter of the social relationship based on atleast one of the updated device attributes or historical interactionswith the another computing device member, wherein the strength parameterdictates which actions the computing device member will perform for theanother computing device.

Example 51 includes the subject matter of any of Examples 34-50, andwherein interacting with computing device members of the computingdevice social group comprises interacting with the another computingdevice member based on the local social interaction policy and thesocial relationship established with the another computing device.

Example 52 includes the subject matter of any of Examples 34-51, andwherein interacting with the another computing device member comprisesdetermining a type of data to share with the another computing devicemember based on the social relationship established with the anothercomputing device member.

Example 53 includes the subject matter of any of Examples 34-52, andwherein interacting with the another computing device member comprisesresponding to requests received from the another computing device memberbased on the social relationship established with the another computingdevice member.

Example 54 includes a method for managing social relationships with amember of a computing device social group, the method comprisingreceiving, by a computing device member of the computing device socialgroup, device attributes of a new computing device member of thecomputing device social group, wherein the device attributes define atleast a physical characteristic of the new computing device member;determining, by the computing device member, parameters of a socialrelationship with the new computing device member based on the deviceattributes, wherein the parameters define at least an amount of trust ofthe new computing device member by the computing device member;determining, by the computing device member, a social interaction policyfor the new computing device member based on the social relationshipwith the new computing device member, wherein the social interactionpolicy defines rules for interacting with members of the computingdevice social group; and transmitting the determined social interactionpolicy to the new computing device member.

Example 55 includes the subject matter of Example 54, and wherein thedevice attributes defines an amount of similarity between the computingdevice member and the new computing device member.

Example 56 includes the subject matter of any of Examples 54 and 55, andwherein the device attributes comprise an attestation from a differentcomputing device member of the computing device social group for the newcomputing device member.

Example 57 includes the subject matter of any of Examples 54-56, andwherein the updated device attributes define a temporal persistency ofthe new computing device member with the computing device social group.

Example 58 includes the subject matter of any of Examples 54-57, andwherein the updated device attributes define historical interactions ofthe new computing device member with the computing device member.

Example 59 includes the subject matter of any of Examples 54-58, andwherein determining parameters of the social relationship includesdetermining a strength parameter of the social relationship, wherein thestrength parameter dictates which actions the computing device memberwill perform for the new computing device.

Example 60 includes the subject matter of any of Examples 54-59, andwherein determining the social interaction policy comprises determininga default social interaction policy.

Example 61 includes the subject matter of any of Examples 54-60, andwherein determining the social interaction policy comprises determiningthe social interaction policy from a group social interaction policybased on the social relationship with the new computing device member.

Example 62 includes the subject matter of any of Examples 54-61, andwherein determining the social interaction policy comprises determiningsocial group data indicative of interactions of members of the computingdevice social group.

Example 63 includes the subject matter of any of Examples 54-62, andfurther including determining, by the computing device member, whetherto update the social relationship established with the new computingdevice member; obtaining, by the computing device member and in responseto a determination to update the social relationship, updated deviceattributes of the new computing device member, wherein the updateddevice attributes define at least a physical characteristic of the newcomputing device; and re-determining the parameters of the socialrelationship with the new computing device member based on the updateddevice attributes.

Example 64 includes the subject matter of any of Examples 54-63, andfurther including interacting with the new computing device member basedon the social relationship with the new computing device member

Example 65 includes the subject matter of any of Examples 54-64, andwherein interacting with the new computing device member comprisesdetermining a type of data to share with the new computing device memberbased on the social relationship established with the new computingdevice member.

Example 66 includes the subject matter of any of Examples 54-65, andwherein interacting with the new computing device member comprisesresponding to requests received from the new computing device memberbased on the social relationship established with the new computingdevice member.

Example 67 includes one or more computer-readable storage mediacomprising a plurality of instructions stored thereon that, in responseto execution, cause a computing device to perform the method of any ofExamples 34-66.

Example 68 includes a computing device member of a computing devicesocial group, the computing device comprising means for performing themethod of any of Examples 34-66.

The invention claimed is:
 1. A computing device member of a computingdevice social group, the computing device member comprising: aprocessor; and a memory coupled to the processor and having storedtherein a plurality of instructions that, when executed, cause thecomputing device member to: exchange device attributes with anothercomputing device member of the computing device social group, whereinthe device attributes define at least a physical characteristic of theassociated computing device, determine parameters of a socialrelationship with the another computing device member based on thedevice attributes of the another computing device member, wherein theparameters include a trust parameter indicative of an amount of trust ofthe another computing device member by the computing device member,receive a social interaction policy from the another computing devicemember that is based on the device attributes of the computing devicemember, wherein the social interaction policy defines rules forinteracting with computing devices that are already members of thecomputing device social group, determine a local social interactionpolicy based on the social interaction policy received from the anothercomputing device member and the social relationship established with theanother computing device member, wherein the local social interactionpolicy is different from the social interaction policy by at least asingle rule, control interactions with computing device members of thecomputing device social group based on the local social interactionpolicy and the trust parameter; determine whether to update the socialrelationship established with the another computing device member;analyze, in response to a determination to update the socialrelationship, historical interactions with the another computing devicemember to determine a behavior of the another computing device member asa function of compliance with one or more rules defined by the socialinteraction policy; and adjust the trust parameter of the socialrelationship with the another computing device based on the behavior. 2.The computing device member of claim 1, wherein the device attributes(i) are usable to determine an amount of similarity between thecomputing device member and the another computing device member, (ii)comprise an attestation from a different computing device member of thecomputing device social group for the computing device member or theanother computing device member, (iii) define a temporal persistency ofthe computing device member or the another computing device member withthe computing device social group, or (iv) define historicalinteractions of the computing device member or the another computingdevice member with other computing device members of the computingdevice social group.
 3. The computing device member of claim 1, whereinto determine parameters of the social relationship comprises todetermine a strength parameter of the social relationship, wherein thestrength parameter dictates which actions the computing device memberwill perform for the another computing device.
 4. The computing devicemember of claim 1, wherein to receive the social interaction policycomprises to: receive, from the another computing device member, a localsocial interaction policy of the another computing device member basedon a similarity of device attributes between the another computingdevice member and the computing device member; and determine the localsocial interaction policy based on the local social interaction policyof the another computing device member.
 5. The computing device memberof claim 1, wherein to receive the social interaction policy comprisesto: receive, from the another computing device member, a social groupdata indicative of interactions of members of the computing devicesocial group; and determine the local social interaction policy based onthe received social group data.
 6. The computing device member of claim1, wherein the plurality of instructions, when executed, further causethe computing device to: determine whether to update the socialrelationship established with the another computing device member;obtain, in response to a determination to update the socialrelationship, updated device attributes of the another computing devicemember, wherein the updated device attributes define at least a physicalcharacteristic of the another computing device; and re-determine theparameters of the social relationship with the another computing devicebased on the updated device attributes.
 7. The computing device memberof claim 1, wherein to determine the parameters of the socialrelationship with the another computing device member based on thedevice attributes of the another computing device member comprises todetermine the parameters of the social networking relationship with theanother computing device member based on the physical characteristic ofthe another computing device member.
 8. The computing device member ofclaim 1, wherein to determine the local social interaction policycomprises to modify the social interaction policy based on the socialrelationship established with the another computing device.
 9. Acomputing device member of a computing device social group, thecomputing device member comprising: a processor; and a memory coupled tothe processor and having stored therein a plurality of instructionsthat, when executed, cause the computing device member to: receivedevice attributes from a new computing device member of the computingdevice social group, wherein the device attributes define at least aphysical characteristic of the new computing device member, determineparameters of a social relationship with the new computing device memberthat is based on the device attributes, wherein the parameters include atrust parameter indicative of an amount of trust of the new computingdevice member by the computing device member, determine a socialinteraction policy for the new computing device member based on thesocial relationship with the new computing device member, wherein thesocial interaction policy defines rules for interacting with computingdevices that are already members of the computing device social group,wherein the local social interaction policy is different from the socialinteraction policy by at least a single rule, transmit the determinedsocial interaction policy to the new computing device member and thetrust parameter; determine whether to update the social relationshipestablished with the new computing device member; analyze, in responseto a determination to update the social relationship, historicalinteractions with the new computing device member to determine abehavior of the new computing device member as a function of compliancewith one or more rules defined by the social interaction policy; andadjust the trust parameter of the social relationship with the newcomputing device based on the behavior.
 10. The computing device memberof claim 9, wherein the device attributes (i) defines an amount ofsimilarity between the computing device member and the new computingdevice member, (ii) comprise an attestation from a different computingdevice member of the computing device social group for the new computingdevice member, (iii) define a temporal persistency of the new computingdevice member with the computing device social group, or (iv) definehistorical interactions of the new computing device member with thecomputing device member.
 11. The computing device member of claim 9,wherein the plurality of instructions, when executed, further cause thecomputing device to: determine whether to update the social relationshipestablished with the new computing device member; obtain, in response toa determination to update the social relationship, updated deviceattributes of the new computing device member, wherein the updateddevice attributes define at least a physical characteristic of the newcomputing device; and re-determine the parameters of the socialrelationship with the new computing device member based on the updateddevice attributes.
 12. The computing device member of claim 9, whereinthe plurality of instructions, when executed, further cause thecomputing device to control interactions with the new computing devicemember based on the social relationship with the new computing devicemember.
 13. One or more non-transitory, computer-readable storage mediacomprising a plurality of instructions stored thereon that, in responseto execution, cause a computing device of a computing device socialgroup to: exchange device attributes with another computing devicemember of the computing device social group, wherein the deviceattributes define at least a physical characteristic of the associatedcomputing device; determine parameters of a social relationship with theanother computing device member based on the device attributes of theanother computing device member, wherein the parameters includes a trustparameter indicative of an amount of trust of the another computingdevice member by the computing device member; receive a socialinteraction policy from the another computing device member that isbased on the device attributes of the computing device member, whereinthe social interaction policy defines rules for interacting withcomputing devices that are already members of the computing devicesocial group; determine a local social interaction policy based on thesocial interaction policy received from the another computing devicemember and the social relationship established with the anothercomputing device member, wherein the local social interaction policy isdifferent from the social interaction policy by at least a single rule;interact with computing device members of the computing device socialgroup based on the local social interaction policy and the trustparameter; determine whether to update the social relationshipestablished with the another computing device member; analyze, inresponse to a determination to update the social relationship,historical interactions with the another computing device member todetermine a behavior of the another computing device member as afunction of compliance with one or more rules defined by the socialinteraction policy; and adjust the trust parameter of the socialrelationship with the another computing device based on the behavior.14. The one or more non-transitory, computer-readable storage media ofclaim 13, wherein the device attributes (i) are usable to determine anamount of similarity between the computing device member and the anothercomputing device member, (ii) comprise an attestation from a differentcomputing device member of the computing device social group for thecomputing device member or the another computing device member, (iii)define a temporal persistency of the computing device member or theanother computing device member with the computing device social group,or (iv) define historical interactions of the computing device member orthe another computing device member with other computing device membersof the computing device social group.
 15. The one or morenon-transitory, computer-readable storage media of claim 13, wherein todetermine parameters of the social relationship includes to determine astrength parameter of the social relationship, wherein the strengthparameter dictates which actions the computing device member willperform for the another computing device.
 16. The one or morenon-transitory, computer-readable storage media of claim 13, wherein toreceive the social interaction policy comprises to: receive, from theanother computing device member, a group social interaction policy forthe computing device social group; and determine the local socialinteraction policy based on the received group social interactionpolicy.
 17. The one or more non-transitory, computer-readable storagemedia of claim 13, wherein to receive the social interaction policycomprises to: receive, from the another computing device member, a localsocial interaction policy of the another computing device member basedon a similarity of device attributes between the another computingdevice member and the computing device member; and determine the localsocial interaction policy based on the local social interaction policyof the another computing device member.
 18. The one or morenon-transitory, computer-readable storage media of claim 13, wherein toreceive the social interaction policy comprises to: receive, from theanother computing device member, a social group data indicative ofinteractions of members of the computing device social group; anddetermine the local social interaction policy based on the receivedsocial group data.
 19. The one or more non-transitory, computer-readablestorage media of claim 13, wherein to interact with the computing devicemembers based on the social interaction policy comprises to determine atype of data to share with a member of the computing device social groupbased on the local social interaction policy.
 20. The one or morenon-transitory, computer-readable storage media of claim 13, wherein tointeract with the computing device members based on the socialinteraction policy comprises to respond to requests received from amember of the computing device social group based on the social localinteraction policy.
 21. The one or more non-transitory,computer-readable storage media of claim 13, wherein the plurality ofinstructions further cause the computing device to: determine whether toupdate the social relationship established with the another computingdevice member; obtain, in response to a determination to update thesocial relationship, updated device attributes of the another computingdevice member, wherein the updated device attributes define at least aphysical characteristic of the another computing device; andre-determine the parameters of the social relationship with the anothercomputing device based on the updated device attributes.
 22. One or morenon-transitory, computer-readable storage media comprising a pluralityof instructions stored thereon that, in response to execution, cause acomputing device of a computing device social group to: receive deviceattributes of a new computing device member of the computing devicesocial group, wherein the device attributes define at least a physicalcharacteristic of the new computing device member; determine parametersof a social relationship with the new computing device member that isbased on the device attributes, wherein the parameters define at leastan amount of trust of the new computing device member by the computingdevice member; determine a social interaction policy for the newcomputing device member based on the social relationship with the newcomputing device member, wherein the social interaction policy definesrules for interacting with computing devices that are already members ofthe computing device social group, wherein the local social interactionpolicy is different from the social interaction policy by at least asingle rule; transmit the determined social interaction policy to thenew computing device member and the amount of trust; determine whetherto update the social relationship established with the new computingdevice member; analyze, in response to a determination to update thesocial relationship, historical interactions with the new computingdevice member to determine a behavior of the new computing device memberas a function of compliance with one or more rules defined by the socialinteraction policy; and adjust the trust parameter of the socialrelationship with the new computing device based on the behavior. 23.The one or more non-transitory, computer-readable storage media of claim22, wherein the device attributes (i) are usable to determine an amountof similarity between the computing device member and the anothercomputing device member, (ii) comprise an attestation from a differentcomputing device member of the computing device social group for thecomputing device member or the another computing device member, (iii)define a temporal persistency of the computing device member or theanother computing device member with the computing device social group,or (iv) define historical interactions of the computing device member orthe another computing device member with other computing device membersof the computing device social group.
 24. The one or morenon-transitory, computer-readable storage media of claim 22, wherein theplurality of instructions further cause the computing device to:determine whether to update the social relationship established with thenew computing device member; obtain, in response to a determination toupdate the social relationship, updated device attributes of the newcomputing device member, wherein the updated device attributes define atleast a physical characteristic of the new computing device; andre-determine the parameters of the social relationship with the newcomputing device member based on the updated device attributes.