Managing personal privacy settings

ABSTRACT

Various systems and methods for managing user information on mobile devices are described herein. A selection of user information is received from a user operating a user device. A privacy setting for the selection of user information is received from the user, the privacy setting to permit or deny access to the user information to a third-party application. The selection of user information and the privacy setting is transmitted from the user device to a receiving device, where the receiving device is configured to enforce the privacy setting for the third-party application executing on the receiving device.

TECHNICAL FIELD

Embodiments pertain to the use of mobile electronic devices to store andmanage profile information.

BACKGROUND

As an increasing number of people use online services to share contentand connect to other people, people are consequently exposing anincreasing amount of personal information. Thus, there is a need for asystem that provides data privacy for personal information.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a schematic diagram illustrating a system for sharing andmanaging personal information, according to an example embodiment;

FIG. 2 is a block diagram illustrating the provider system, according toan example embodiment;

FIG. 3 is a block diagram illustrating an operations database, accordingto an example embodiment;

FIG. 4 is a flowchart illustrating a method for managing userinformation on mobile devices, according to an example embodiment;

FIG. 5 is a flowchart illustrating a method for managing userinformation, according to an example embodiment; and

FIG. 6 is a block diagram illustrating a machine in the example form ofa computer system, within which a set or sequence of instructions forcausing the machine to perform any one of the methodologies discussedherein may be executed, according to an example embodiment.

DETAILED DESCRIPTION

The present disclosure provides techniques and configurations used formanaging personal data among personal contacts. The management systemdisclosed herein provides security enhancements to ensure data privacy.A person may desire to share personal, social, professional, or otherinformation with another person (e.g., contact). Sharing of suchinformation is commonly performed electronically. For example, theperson may provide an electronic business card, profile, or othercontact information to the recipient. However, once a person shares suchinformation, the information is largely unsecured on the recipient'selectronic device. Applications, programs, or processes on therecipient's device may access the shared information and alter it,disseminate it, or otherwise use it in a way that the sharing person maynot like. An option of not sharing information, while available, is notdesirable because it inhibits social networking, business arrangements,and other aspects. Thus, there is a need to provide a system that allowsa user to share information in a secure manner.

Using the embodiments described herein, a user may indicate informationto share with another person (e.g., another user). A user may accesssuch information on a mobile device or at an installed, relativelystationary device. Mobile devices may include devices such as mobilephones, smartphones, tablet computers, laptop computers, personaldigital assistants, and the like. Installed devices may include devicessuch as kiosks and information centers. Some devices, such as a vehiclenavigation system may be considered an installed mobile device. Any suchdevice used to transmit, receive, store, or otherwise manipulate userinformation is considered a user device for the purposes of thisdisclosure.

As used herein, user information includes information that describes auser's characteristics (e.g., age, gender, height, etc.), personalinformation (e.g., birth place, siblings, parents, home address, etc.),profession (e.g., job, title, location, email address, phone number,work history, etc.), activities (e.g., recreational sports, leisureactivities, etc.), or interests (e.g., religion, travel, food, charity,shopping, literature, etc.). It is understood that this list ofcategories of user information is not meant to be exhaustive and thatother forms of user information are encompassed in this disclosure.Furthermore, the organization of user information may be altered basedon preference, design, or other considerations.

User information may be organized into an information profile. As usedherein, an information profile is a collection of user information,organized by a common attribute of the user information. Examples ofinformation profiles include, but are not limited to, a personalprofile, a professional profile, and a social profile. The personalprofile may include information that is generally private, orclosely-held, information. A user may be highly selective of whom withto share information contained within a personal profile. Theprofessional profile may include information related to the user'sprofession, such as a work email and phone number. The social profilemay include information related to the user's social life, such asinterests and hobbies.

Information profiles may be based on individual data or on otherprofiles, or on a combination of individual data and another profile.For example, a profile for close friends may include some or all of theinformation from a personal profile and a social profile. In addition,the profile for close friends may include some information not found inthe combination of the personal and social profiles.

For each datum of information in an information profile, a user maydesignate a privacy setting. The privacy setting is used to permit ordeny access to the datum of user information at another device (e.g.,the receiving device). The privacy setting may be used at the receivingdevice to control access of third-party applications. Thus while areceiving application at the receiving device, such as a contact list oraddress book application, may access the datum of user information,third-party applications or other foreign applications are eitherpermitted or denied access based on the privacy setting. In thefollowing disclosure, the privacy setting has one of two states:“public” or “private,” where a public setting allows third-partyapplications to access the shared user data, and where a private settingdenies access to third-party applications to the data. It is understoodthat additional or alternative privacy settings may be used in order toachieve alternative embodiments.

In an embodiment, the privacy setting is per datum and is used for therespective datum wherever the datum is represented. For example, theuser's home phone number may be marked as private. In this case, thehome phone number is not shared with third-party applications regardlessof what information profile is used to share the datum (home phonenumber) or whom the datum is initially shared with.

Turning to the figures, FIG. 1 is a schematic diagram illustrating asystem 100 for sharing and managing personal information, according toan example embodiment. FIG. 1 includes mobile devices 102A, 102B, and102C, a client terminal 104, a provider system 106, interconnected via anetwork 108.

The mobile device 102 includes devices such as a smartphone, cellulartelephone, mobile phone, laptop computer, tablet computer, or otherportable networked device. In general, the mobile device 102 is smalland light enough to be considered portable and includes a mechanism toconnect to a network, either over a persistent or intermittentconnection.

The client terminal 104 may be equipped similar to the mobile device 102in that it includes network capabilities and a user interface to receiveinformation from a user and provide information to a user. Examples ofclient terminals include, but are not limited to, information kiosks,automotive navigation systems, desktop computers, and thin clients. Itis understood that either the mobile device 102 or the client terminal104 may be considered a user device for the purposes of this discussion.

The provider system 106 may be configured to receive user informationfrom one mobile device 102 (e.g., mobile device 102A), store the userinformation, and then transmit the user information to another mobiledevice 102 (e.g., mobile device 102B). User information may be managedat a client terminal 104 and either transmitted or received at such aterminal by way of the provider system 106.

The provider system 106 may communicate with internal databases or fileservers to publish or serve files via a web server. The provider system106 may include a web server. The web server may consist of scripts,applications, or library files that provide primary or auxiliaryfunctionality to the web server (e.g., multimedia, file transfer, ordynamic interface functions). The web server, either alone or inconjunction with one or more other computers in the provider system 106,may provide a user-interface. The user-interface may be implementedusing a variety of programming languages or programming methods, such asHTML (HyperText Markup Language), VBScript (Visual Basic® ScriptingEdition), JavaScript™ XML® (Extensible Markup Language), XSLT™(Extensible Stylesheet Language Transformations), AJAX (AsynchronousJavaScript and XML), Java™, JFC (Java™ Foundation Classes), and Swing(an Application Programming Interface for Java™)

The provider system 106 may represent a group of two or more servers,cooperating with each other, provided by way of a pooled, distributed,or redundant computing model. Further, the provider system 106 may beimplemented as a distributed system; for example, one or more elementsof the provider system 106 may be located across a wide-area networkfrom other elements of the provider system 106.

Continuing with discussion of FIG. 1, the network 108 may includelocal-area networks (LAN), wide-area networks (WAN), wireless networks(e.g., 802.11 or cellular network), the Public Switched TelephoneNetwork (PSTN) network, ad hoc networks, personal area networks (e.g.,Bluetooth) or other combinations or permutations of network protocolsand network types. The network 108 may include a single local areanetwork (LAN) or wide-area network (WAN), or combinations of LANs orWANs, such as the Internet. The various devices coupled to the network108 may be coupled to the network 108 via one or more wired or wirelessconnections.

Using the mobile device 102 or client terminal 104, a user may manageuser information. In an embodiment, a user may organize user informationinto one or more information profiles, with each datum of informationhaving an associated privacy setting. The information profile orprofiles may be named for convenience. After creating such profiles, theuser may then associate one or more contacts with a profile. A contactis understood to encompass a person or persons that the user isacquainted with. A contact may include, but is not limited to, a familymember, a business acquaintance, a corporation or business, a colleague,a girlfriend or boyfriend, or a social acquaintance. Once associated,the contact is sent the user information in the information profile withthe corresponding privacy settings for the data in the profile.Information profiles are used to organize information for the sharinguser, but may not be represented to the receiving user. Instead, thereceiving user may simply receive certain information that was shared,but may not have visibility into the information profile under which itwas shared. The information profile structure is largely irrelevant tothe receiving user.

In an embodiment, the profile information is sent by way of the providersystem 106. In an embodiment, the provider system 106 receives theprofile information from the user at a user device (e.g., mobile device102A) and then transmits a push notification to the intended recipientdevice (e.g., mobile device 102B). The push notification is used toindicate that new or updated information is available for download tothe recipient device (e.g., mobile device 102B). After a pushnotification is received at the recipient device, a user at therecipient device may be notified of the new or updated user informationavailable, after which, the user at the recipient device may thentransmit a request to download the user information and correspondingprivacy setting to the recipient device.

Once downloaded to the recipient device, the profile information isstored. In an embodiment, the profile information is stored in a contactdirectory, such as an address book software application residing on therecipient device. Additionally, the privacy settings are stored on therecipient device. The privacy settings may be stored in the contactdirectory or in an auxiliary storage location. An application that islater executed on the recipient device and requests access to the userinformation stored thereon, will only be allowed access to informationflagged “public.” Thus, information marked as private will not be sharedwith applications on the recipient device.

Consider an example where a user named “Fred” is willing to shareinformation with another user named “Jane.” Fred knows Jane from workand is willing to share professional contact information with her. ThusFred may associate Jane with a “professional information profile” thatincludes some of his personal contact information (e.g, name) andprofessional contact information (e.g., work phone, work email, and worktitle). Fred may further have marked his name and work title as “public”and his work phone and work email as “private.” When Jane receivesFred's contact information, Jane is able to view all of the sharedinformation in her contact database software. Later when Jane installs athird-party application on her mobile device, the application may promptJane for consent to access her stored contact list. If Jane accepts andconsents to the action, Fred's contact information marked private isstill concealed from the third-party application.

When a user updates user information, the updated information istransmitted to the provider system 106 and a push message is thentransmitted to each user device that has the outdated user informationstored thereon. The update may be an update to the data (e.g., a changein phone numbers) or an update to a privacy setting (e.g., toggling asetting from public to private). As in the situation when newinformation is disseminated, a user at the recipient device may receivethe push notification, respond with a request to obtain the new orupdated information, and then receive the new or updated information andcorresponding privacy settings at the recipient device.

Returning to the Fred and Jane example from above, when Fred updates hiswork email address, a notice is sent to Jane indicating the update tothe data. Similarly, if Fred were to toggle the privacy setting on thework phone number from “private” to “public,” Jane would receive anotice. The notice may be a push notification.

Profile management may be performed in a semi-automated fashion. In anembodiment, profiles are dynamically defined based on a relationshiplevel between two people. For example, a relationship level may beenumerated from 1 to 10, with 1 being the closest relationships (e.g,immediate family) and 10 being the remotest relationships (e.g., friendsof friends). Based on the relationship level, a profile of userinformation may be generated. The profile may include personal,professional, health, fitness, hobby, or other information about theuser, depending on the closeness of the relationship. For example, wherea user is a husband, the wife may have nearly all user information aboutthe husband shared to her device. Each piece of user informationincludes its own privacy setting, thus controlling its exposure to otherapplications running on her device. As another example, a person with adistant relationship to a third cousin may, using a dynamic profile,only make available a user's name and home phone number. In general,dynamic profiles allow for more or less exposure of a user's informationbased on the strength of the relationship with the person with whom theinformation is being shared. Such dynamic profiles may be stored on theuser's device and control which information is synched with otherdevices.

FIG. 2 is a block diagram illustrating the provider system 106,according to an example embodiment. The provider system 106 includes acommunication module 200, a user database module 202, and a push module204. The provider system 106 also includes an operations database 206,which may be used to store user information, system status information,and other operational information used to implement the processes andmechanisms disclosed herein.

The communication module 200 is used to receive, from a publisher user,user information and a corresponding privacy setting for the userinformation. The user information and privacy setting may be transmittedbetween the publisher user and the communication module using anencryption mechanism Examples of encryption mechanisms include, but arenot limited to, public-key infrastructure (PKI) mechanisms (e.g.,asymmetric cryptography), private key mechanisms (e.g., symmetriccryptography), and hashing mechanisms (e.g., Message Digest 5 (MD5) andSecure Hashing Algorithm (SHA)). Other specific mechanisms includeHypertext Transfer Protocol Secure (HTTPS) and Pretty Good Privacy(PGP). It is understood that other mechanism to encrypt or securecommunications may be used.

The user database module 202 is used to determine a subscriber user, thesubscriber user being a recipient of the user information and thecorresponding privacy setting. In an embodiment, the user databasemodule 202 accesses a user database to determine one or more users thatare subscribers to the publisher user's information. The user databasemay be incorporated into the operations database 206. In order todetermine the subscriber or subscribers, the user database module 202may access a database table that contains relationships between thepublisher user and one or more subscriber users. The user data module202 may then provide a list of one or more subscriber users to the pushmodule 204, in order to notify the subscriber users of the new orupdated information from the publisher user.

The push module 204 notifies the subscriber user of the userinformation. A push notification mechanism is in contrast to pullmechanisms. A push notification mechanism operates as apublish/subscribe model. One or more users may subscribe to aninformation channel (e.g., the publisher's user information feed) andwhenever new or updated content is available on the information channel,the server (e.g., the provider system 106) will push either theinformation itself or a notification of the information out to thesubscribers. Thus, in an embodiment, the push module 204 notifies thesubscriber user of the new or updated user information and waits until arequest is received from a subscriber user before sending the userinformation and the corresponding privacy setting. In anotherembodiment, the push module 204 pushes the new or updated userinformation and the privacy setting to the subscriber device. The datapush may be performed in the background in a manner that the subscriberuser is unaware of the update. Optionally, the data push may beperformed in a manner that apprises the subscriber user of theoperation, such as by way of a notification window, an informationaldialog box, a banner notification, or some other user interfacemechanism (e.g., alert sounds, vibration, or the like).

FIG. 3 is a block diagram illustrating an operations database 206,according to an example embodiment. The operations database includes auser table 300, a user information table 302, and a user relationshiptable 304. The user table 300 includes data describing users of theprovider system 106, such as a user identification number, which may beused as a primary key on the user table 300, a user name, and otherinformation to describe and define a user of the system. The userrelationship table 304 includes information relating one or more usersto one another. The user relationship table 304 may be organized toreflect a publisher-subscriber relationship between two users. A usermay be both a publisher and subscriber. Thus, in an embodiment, the userrelationship table 304 includes a publisher_user_id column and asubscriber_user_id column. The publisher_user_id column includes theuser identification number of the user sharing information with one ormore other users, each of which are identified in a separate row with auser identification in the subscriber_user_id column

The user information table 302 includes a user's specific userinformation, such as a home phone number, a home mailing address, aperson email address, a work phone number, a work email address, a dateof birth, food interests, sports interests, reading interests, and thelike. User information may be organized into one or more profiles, asdescribed above. The user information table 302 may include a privacysetting flag on each record in the user information table 302,indicating whether the information in the record is publicallyaccessible by a third-party application on a subscriber's device.

It is understood that the operations database 206 illustrated in FIG. 3is merely one example and that optimizations may be used (e.g., a higherdegree of normalization), which may result in more or fewer tables orinformation in tables, in various embodiments. Additionally, theoperations database 206 may be distributed across two or more servers.

FIG. 4 is a flowchart illustrating a method 400 for managing userinformation on mobile devices, according to an example embodiment. Atblock 402, a selection of user information is received at a user devicefrom a user operating the user device. In an embodiment, the userinformation includes one of: a name, an address, or a phone number. Inan embodiment, the user information stored at the data store isorganized into an information profile, the information profilereflecting an aspect of the user. The information profile may beconfigured to include user aspects such as personal information,professional information, social information, or fitness informationabout the user.

In an embodiment, the aspect of the user includes a personal life andthe information profile includes personal information about the user.Personal information includes a home phone number, a cellular phonenumber, a home address, a date of birth, a social security number, adriver's license number, a health insurance provider, a health insuranceidentification number, a spouse name, a spouse phone number, emergencycontact information, marital status, and the like.

In another embodiment, the aspect of the user includes a professionallife and the information profile includes professional information aboutthe user. Professional information includes a work phone number, a workemail address, a title, a mailing address, and the like.

In another embodiment, the aspect of the user includes a private lifeand the information profile includes social information about the user.Social information may include information such as food interests,travel interests, sports interests, reading lists, charity interests,shopping interests, current shopping needs (e.g., wish lists, birthdaylists, holiday gift lists), and the like.

In another embodiment, the aspect of the user includes healthcharacteristics and the information profile includes fitness informationabout the user. Fitness information may include favorite exercises,resting heart rate, blood pressure, height, weight, cholesterol, or thelike.

At block 404, a privacy setting for the selection of user information isreceived from the user. The privacy setting is implemented to permit ordeny access to the user information to a third-party application.

At block 406, the selection of user information and the privacy settingis transmitted from the user device to a receiving device. The receivingdevice is then configured to enforce the privacy setting for thethird-party application executing on the receiving device. In anembodiment, the receiving device is another user device. In anotherembodiment, the receiving device is an intermediary device, such as theprovider system 106, as described above. In such an embodiment, thereceiving device is an intermediary device configured to store andforward the user information and related privacy setting.

In a further embodiment, the method 400 includes detecting a change tothe user information and in response to detecting the change to the userinformation, transmitting the user information to the receiving device(block 408). In an embodiment, detecting a change is implemented byperiodically polling a data store at the user device to detect thechange to the user information stored at the data store. Changedetection may be implemented, for example, by using a “dirty bit” in adatabase record.

FIG. 5 is a flowchart illustrating a method 500 for managing userinformation, according to an example embodiment. At block 502, userinformation and a privacy setting for the user information is receivedat a user device from a source device. The privacy setting is used topermit or deny access to the user information to a third-partyapplication executing on the user device. In an embodiment, the sourcedevice includes an intermediary device that stores and forwards the userinformation and the privacy setting.

As discussed above, obtaining user information and privacy settings atthe receiving device may be performed by one of two mechanisms: push andpull. Thus, in an embodiment using a pull mechanism, receiving the userinformation is performed by recurrently connecting to the source deviceto determine whether user information is available to download, and thendownloading the user information and the privacy setting. In a furtherembodiment, the method 500 includes accessing stored user information,with the stored user information being previously downloaded and storedat the user device (block 508). The method 500 includes updating, basedon the user information and privacy setting downloaded from the sourcedevice, at least one of the stored user information or correspondingprivacy setting (block 510).

In an embodiment using a push notification, the method operation ofreceiving the user information is performed by receiving a pushnotification from the source device and in response to receiving thepush notification, connecting with the source device, and retrieving theuser information and the privacy setting. In a further embodiment, themethod 500 includes accessing stored user information, with the storeduser information being previously received and stored at the userdevice, and updating, based on the user information and privacy settingreceived from the source device, at least one of the stored userinformation or corresponding privacy setting (block 512).

In another push-based embodiment, the user information and privacysetting are pushed by the source device to the user device. The datapush may be performed in the background to avoid interrupting the user'sactivity. The data push may be performed at routine times, such as oncea day, or on demand, such as when the user information is updated at thesource device.

At block 504, the user information and privacy setting is stored at theuser device. The user information and privacy setting may be stored inan address book or contact database on the user device.

At block 506, a request to access the user information from athird-party application is managed based on the privacy setting.

In a further embodiment, the third-party application is executed on theuser device. The privacy setting is checked for the user information andthe third-party application is allowed or denied access to the userinformation based on the privacy setting.

In a further embodiment, during an attempt to install the third-partyapplication is on the user device, the privacy setting for the userinformation is checked, and or denying the third-party application isallowed to install based on the privacy setting.

Embodiments may be implemented in one or a combination of hardware,firmware, and software. Embodiments may also be implemented asinstructions stored on a computer-readable storage device, which may beread and executed by at least one processor to perform the operationsdescribed herein. A computer-readable storage device may include anynon-transitory mechanism for storing information in a form readable by amachine (e.g., a computer). For example, a computer-readable storagedevice may include read-only memory (ROM), random-access memory (RAM),magnetic disk storage media, optical storage media, flash-memorydevices, and other storage devices and media.

FIG. 6 is a block diagram illustrating a machine in the example form ofa computer system 600, within which a set or sequence of instructionsfor causing the machine to perform any one of the methodologiesdiscussed herein may be executed, according to an example embodiment. Inalternative embodiments, the machine operates as a standalone device ormay be connected (e.g., networked) to other machines. In a networkeddeployment, the machine may operate in the capacity of either a serveror a client machine in server-client network environments, or it may actas a peer machine in peer-to-peer (or distributed) network environments.The machine may be a personal computer (PC), a tablet PC, a set-top box(STB), a Personal Digital Assistant (PDA), a mobile telephone, a webappliance, a network router, switch or bridge, or any machine capable ofexecuting instructions (sequential or otherwise) that specify actions tobe taken by that machine. Further, while only a single machine isillustrated, the term “machine” shall also be taken to include anycollection of machines that individually or jointly execute a set (ormultiple sets) of instructions to perform any one or more of themethodologies discussed herein.

Example computer system 600 includes at least one processor 602 (e.g., acentral processing unit (CPU), a graphics processing unit (GPU) or both,processor cores, compute nodes, etc.), a main memory 604 and a staticmemory 606, which communicate with each other via a link 608 (e.g, bus).The computer system 600 may further include a video display unit 610, analphanumeric input device 612 (e.g., a keyboard), and a user interface(UI) navigation device 614 (e.g., a mouse). In one embodiment, the videodisplay unit 610, input device 612 and UI navigation device 614 areincorporated into a touch screen display. The computer system 600 mayadditionally include a storage device 616 (e.g., a drive unit), a signalgeneration device 618 (e.g., a speaker), a network interface device 620,and one or more sensors (not shown), such as a global positioning system(GPS) sensor, compass, accelerometer, or other sensor.

The storage device 616 includes a machine-readable medium 622 on whichis stored one or more sets of data structures and instructions 624(e.g., software) embodying or utilized by any one or more of themethodologies or functions described herein. The instructions 624 mayalso reside, completely or at least partially, within the main memory604, static memory 606, and/or within the processor 602 during executionthereof by the computer system 600, with the main memory 604, staticmemory 606, and the processor 602 also constituting machine-readablemedia.

While the machine-readable medium 622 is illustrated in an exampleembodiment to be a single medium, the term “machine-readable medium” mayinclude a single medium or multiple media (e.g., a centralized ordistributed database, and/or associated caches and servers) that storethe one or more instructions 624. The term “machine-readable medium”shall also be taken to include any tangible medium that is capable ofstoring, encoding or carrying instructions for execution by the machineand that cause the machine to perform any one or more of themethodologies of the present disclosure or that is capable of storing,encoding or carrying data structures utilized by or associated with suchinstructions. The term “machine-readable medium” shall accordingly betaken to include, but not be limited to, solid-state memories, andoptical and magnetic media. Specific examples of machine-readable mediainclude non-volatile memory, including, by way of example, semiconductormemory devices (e.g., Electrically Programmable Read-Only Memory(EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM))and flash memory devices; magnetic disks such as internal hard disks andremovable disks; magneto-optical disks; and CD-ROM and DVD-ROM disks.

The instructions 624 may further be transmitted or received over acommunications network 626 using a transmission medium via the networkinterface device 620 utilizing any one of a number of well-knowntransfer protocols (e.g., HTTP). Examples of communication networksinclude a local area network (LAN), a wide area network (WAN), theInternet, mobile telephone networks, Plain Old Telephone (POTS)networks, and wireless data networks (e.g., Wi-Fi, 3G, and 4G LTE/LTE-Aor WiMAX networks). The term “transmission medium” shall be taken toinclude any intangible medium that is capable of storing, encoding, orcarrying instructions for execution by the machine, and includes digitalor analog communications signals or other intangible medium tofacilitate communication of such software.

Examples, as described herein, can include, or can operate on, logic ora number of components, modules, or mechanisms. Modules are tangibleentities capable of performing specified operations and can beconfigured or arranged in a certain manner. In an example, circuits canbe arranged (e.g., internally or with respect to external entities suchas other circuits) in a specified manner as a module. In an example, thewhole or part of one or more computer systems (e.g., a standalone,client or server computer system) or one or more hardware processors canbe configured by firmware or software (e.g., instructions, anapplication portion, or an application) as a module that operates toperform specified operations. In an example, the software can reside (1)on a non-transitory machine-readable medium or (2) in a transmissionsignal. In an example, the software, when executed by the underlyinghardware of the module, causes the hardware to perform the specifiedoperations.

Accordingly, the term “module” is understood to encompass a tangibleentity, be that an entity that is physically constructed, specificallyconfigured (e.g., hardwired), or temporarily (e.g., transitorily)configured (e.g., programmed) to operate in a specified manner or toperform part or all of any operation described herein. Consideringexamples in which modules are temporarily configured, one instantiationof a module may not exist simultaneously with another instantiation ofthe same or different module. For example, where the modules comprise ageneral-purpose hardware processor configured using software, thegeneral-purpose hardware processor can be configured as respectivedifferent modules at different times. Accordingly, software canconfigure a hardware processor, for example, to constitute a particularmodule at one instance of time and to constitute a different module at adifferent instance of time.

Additional examples of the presently described method, system, anddevice embodiments include the following, non-limiting configurations.Each of the following non-limiting examples may stand on its own, or maybe combined in any permutation or combination with any one or more ofthe other examples provided below or throughout the present disclosure.The preceding description and the drawings sufficiently illustratespecific embodiments to enable those skilled in the art to practicethem. Other embodiments may incorporate structural, logical, electrical,process, and other changes. Portions and features of some embodimentsmay be included in, or substituted for, those of other embodiments.

ADDITIONAL NOTES & EXAMPLES

Example 1 may include subject matter (such as a method, means forperforming acts, machine readable medium including instructions that,when performed by a machine cause the machine to performs acts, or anapparatus configured to perform) comprising receiving at a user devicefrom a user operating the user device, a selection of user information,receiving from the user, a privacy setting for the selection of userinformation, the privacy setting to permit or deny access to the userinformation to a third-party application, and transmitting from the userdevice to a receiving device, the selection of user information and theprivacy setting, wherein the receiving device is configured to enforcethe privacy setting for the third-party application executing on thereceiving device.

Example 2 can include, or can optionally be combined with the subjectmatter of Example 1 where optionally the receiving device is anotheruser device.

Example 3 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 1 through 2 to optionallyinclude transmitting the selection of user information and the privacysetting to the receiving device by transmitting the selection of userinformation and the privacy setting to an intermediary device configuredto store and forward the user information and related privacy setting tothe receiving device.

Example 4 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 1 through 3 where the userinformation optionally includes one of: a name, an address, or a phonenumber.

Example 5 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 1 through 4 to optionallyinclude detecting a change to the user information and in response todetecting the change to the user information, transmitting the userinformation to the receiving device.

Example 6 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 1 through 5 to optionallyinclude detecting a change to the user information by periodicallypolling a data store at the user device to detect the change to the userinformation stored at the data store.

Example 7 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 1 through 6 to optionallyinclude the user information stored at the data store organized into aninformation profile, the information profile reflecting an aspect of theuser.

Example 8 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 1 through 7 to optionallyinclude the aspect of the user including professional life and whereinthe information profile includes professional information about theuser.

Example 9 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 1 through 8 to optionallyinclude the aspect of the user includes a private life and theinformation profile includes social information about the user.

Example 10 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 1 through 9 to optionallyinclude the aspect of the user includes health characteristics and theinformation profile includes fitness information about the user.

Example 11 may include subject matter (such as a method, means forperforming acts, machine readable medium including instructions that,when performed by a machine cause the machine to performs acts, or anapparatus configured to perform) comprising receiving at a user devicefrom a source device, user information and a privacy setting for theuser information, the privacy setting used to permit or deny access tothe user information to a third-party application executing on the userdevice, storing the user information and privacy setting at the userdevice, and managing a request to access the user information from thethird-party application based on the privacy setting.

Example 12 can include, or can optionally be combined with the subjectmatter of Example 11 where optionally the source device comprises anintermediary device that stores and forwards the user information andthe privacy setting.

Example 13 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 11 through 12 to optionallyinclude receiving user information and the privacy setting byrecurrently connecting to the source device to determine whether userinformation is available to download, and downloading the userinformation and the privacy setting.

Example 14 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 11 through 13 to optionallyinclude accessing stored user information, the stored user informationbeing previously downloaded and stored at the user device, and updatingat least one of the stored user information or corresponding privacysetting, based on the user information and privacy setting downloadedfrom the source device.

Example 15 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 11 through 14 to optionallyinclude receiving user information and the privacy setting by receivinga push notification from the source device and in response to receivingthe push notification, connecting with the source device and retrievingthe user information and the privacy setting.

Example 16 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 11 through 15 to optionallyinclude accessing stored user information, the stored user informationbeing previously received and stored at the user device, and updating atleast one of the stored user information or corresponding privacysetting, based on the user information and privacy setting received fromthe source device.

Example 17 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 11 through 16 to optionallyinclude executing the third-party application on the user device,checking the privacy setting for the user information, and allowing ordenying access to the user information for the third-party applicationbased on the privacy setting.

Example 18 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 11 through 17 to optionallyinclude attempting to install the third-party application on the userdevice, checking the privacy setting for the user information, andallowing or denying the third-party application to install based on theprivacy setting.

Example 19 may include subject matter (such as a device, apparatus, orcomputing device) comprising a communication module to receive, from apublisher user, user information and a corresponding privacy setting forthe user information, the privacy setting indicating whether athird-party application on a device operated by a subscriber user is tohave access to the user information, a user database module to determinea subscriber user, the subscriber user being a recipient of the userinformation and the corresponding privacy setting, and a push module tonotify the subscriber user of the user information.

Example 20 can include, or can optionally be combined with the subjectmatter of Example 19 where the user information optionally comprises atleast one of: a name, an address, or a phone number.

Example 21 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 19 through 20 to optionallyinclude the user database module configured to access a user database,the user database including: at least one database table to define arelationship between the publisher user and the subscriber user, and atleast one database table to define a privacy setting for a datum of userinformation of the publisher user.

Example 22 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 19 through 21 to optionallyinclude the communication module configured to receive a request for theuser information from a device of the subscriber user, the request inresponse to the push notification and transmit the user information andthe corresponding privacy setting to the device of the subscriber user.

Example 23 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 19 through 22 to optionallyinclude the communication module configured to receive a request for theuser information from a device of the subscriber user, the request inresponse to the push notification and synchronize user information andcorresponding privacy settings between the device of the subscriber userand the system.

Example 24 may include subject matter (such as a device, apparatus, orcomputing device) comprising a provider computer system and atransmitting user device and a receiving user device connected to theprovider computer system, where the transmitting user device isconfigured to receive from a user operating the transmitting userdevice, user information and a privacy setting for the user information,the privacy setting to permit or deny access to the user information toa third-party application and transmit the user information and theprivacy setting to the provider computer system, and where the providersystem is configured to receive the user information and the privacysetting from the transmitting user device and transmit the userinformation and the privacy setting to the receiving user device, andwhere the receiving user device is configured to receive the userinformation and the privacy setting for the user information, store theuser information and privacy setting at the receiving user device, andmanage a request to access the user information based on the privacysetting, the request from a third-party application installed on thereceiving user device.

Example 25 can include, or can optionally be combined with the subjectmatter of Example 24 where the transmitting user device comprises asmartphone.

Example 26 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 24 through 25 to optionallyinclude the provider system is configured to transmit the userinformation and the privacy setting to the receiving user device bytransmitting a push notification to the receiving user device, receivinga response from the receiving user device, the response requesting theuser information and the privacy setting be sent to the receiving userdevice, and transmitting the user information and privacy setting to thereceiving user device.

Example 27 can include, or can optionally be combined with the subjectmatter of one or any combination of Examples 24 through 26 to optionallyinclude the push notification being triggered by receipt of the userinformation and the privacy setting from the transmitting user device.

The Abstract is provided to comply with 37 C.F.R. Section 1.72(b)requiring an abstract that will allow the reader to ascertain the natureand gist of the technical disclosure. It is submitted with theunderstanding that it will not be used to limit or interpret the scopeor meaning of the claims. The following claims are hereby incorporatedinto the detailed description, with each claim standing on its own as aseparate embodiment.

What is claimed is:
 1. At least one non-transitory machine-readablestorage medium for managing user information comprising a plurality ofinstructions that in response to being executed on a computing device,cause the computing device to: receive at a user device from a sourcedevice, user information and a privacy setting for the user information,the user information related to that of a remote user, and the privacysetting used to permit or deny access to the user information to athird-party application executing on the user device, wherein the userinformation and privacy setting are stored in a data store at the sourcedevice and organized into an information profile reflecting an aspect ofthe remote user, and wherein the information profile is associated witha user of the user device; store the user information and privacysetting at the user device; attempt to install the third-partyapplication on the user device; check the privacy setting for the userinformation; allow or deny the third-party application to install basedon the privacy setting:, and manage a request to access the userinformation from the third-party application based on the privacysetting.
 2. The at least one non-transitory machine-readable storagemedium of claim 1, wherein the source device comprises an intermediarydevice that stores and forwards the user information and the privacysetting.
 3. The at least one non-transitory machine-readable storagemedium of claim 1, wherein the instructions to receive user informationand the privacy setting further comprise instructions to: recurrentlyconnect to the source device to determine whether user information isavailable to download; and download the user information and the privacysetting.
 4. The at least one non-transitory machine-readable storagemedium of claim 3, further comprising instructions to: access storeduser information, the stored user information being previouslydownloaded and stored at the user device; and update at least one of thestored user information or corresponding privacy setting, based on theuser information and privacy setting downloaded from the source device.5. The at least one non-transitory machine-readable storage medium ofclaim 1, wherein the instructions to receive user information and theprivacy setting comprise instructions to: receive a push notificationfrom the source device; and in response to receiving the pushnotification, connect with the source device and retrieve the userinformation and the privacy setting.
 6. The at least one non-transitorymachine-readable storage medium of claim 5, further comprisinginstructions to: access stored user information, the stored userinformation being previously received and stored at the user device; andupdate at least one of the stored user information or correspondingprivacy setting, based on the user information and privacy settingreceived from the source device.
 7. The at least one non-transitorymachine-readable storage medium of claim 1, further comprisinginstructions to: execute the third-party application on the user device;check the privacy setting for the user information; and allow or denyaccess to the user information for the third-party application based onthe privacy setting.
 8. A system for managing user information, thesystem comprising: a processor; and a memory including a plurality ofinstructions that in response to being executed on the processor, causethe processor to: receive at a user device from a source device, userinformation and a privacy setting for the user information, the userinformation related to that of a remote user, and the privacy settingused to permit or deny access to the user information to a third-partyapplication executing on the user device, wherein the user informationand privacy setting are stored in a data store at the source device andorganized into an information profile reflecting an aspect of the remoteuser, and wherein the information profile is associated with a user ofthe user device; store the user information and privacy setting at theuser device; attempt to install the third-party application on the userdevice; check the privacy setting for the user information; allow ordeny the third-party application to install based on the privacysetting; and manage a request to access the user information from thethird-party application based on the privacy setting.
 9. The system ofclaim 8, wherein the source device comprises an intermediary device thatstores and forwards the user information and the privacy setting. 10.The system of claim 8, wherein the instructions to receive userinformation and the privacy setting further comprise instructions to:recurrently connect to the source device to determine whether userinformation is available to download; and download the user informationand the privacy setting.
 11. The system of claim 10, further comprisinginstructions to: access stored user information, the stored userinformation being previously downloaded and stored at the user device;and update at least one of the stored user information or correspondingprivacy setting, based on the user information and privacy settingdownloaded from the source device.
 12. The system of claim 8, whereinthe instructions to receive user information and the privacy settingcomprise instructions to: receive a push notification from the sourcedevice; and in response to receiving the push notification, connect withthe source device and retrieve the user information and the privacysetting.
 13. The system of claim 12, further comprising instructions to:access stored user information, the stored user information beingpreviously received and stored at the user device; and update at leastone of the stored user information or corresponding privacy setting,based on the user information and privacy setting received from thesource device.
 14. The system of claim 8, further comprisinginstructions to: execute the third-party application on the user device;check the privacy setting for the user information; and allow or denyaccess to the user information for the third-party application based onthe privacy setting.
 15. A method for managing user information, themethod comprising: receiving at a user device from a source device, userinformation and a privacy setting for the user information, the userinformation related to that of a remote user, and the privacy settingused to permit or deny access to the user information to a third-partyapplication executing on the user device, wherein the user informationand privacy setting are stored in a data store at the source device andorganized into an information profile reflecting an aspect of the remoteuser, and wherein the information profile is associated with a user ofthe user device; storing the user information and privacy setting at theuser device; attempting to install the third-party application on theuser device; checking the privacy setting for the user information;allowing or denying the third-party application to install based on theprivacy setting; and managing a request to access the user informationfrom the third-party application based on the privacy setting.
 16. Themethod of claim 15, wherein the source device comprises an intermediarydevice that stores and forwards the user information and the privacysetting.
 17. The method of claim 15, wherein receiving user informationand the privacy setting further comprises: recurrently connecting to thesource device to determine whether user information is available todownload; and downloading the user information and the privacy setting.18. The method of claim 17, further comprising: accessing stored userinformation, the stored user information being previously downloaded andstored at the user device; and updating at least one of the stored userinformation or corresponding privacy setting, based on the userinformation and privacy setting downloaded from the source device. 19.The method of claim 15, wherein receiving user information and theprivacy setting comprises: receiving a push notification from the sourcedevice; and in response to receiving the push notification, connectingwith the source device and retrieve the user information and the privacysetting.
 20. The method of claim 19, further comprising: accessingstored user information, the stored user information being previouslyreceived and stored at the user device; and updating at least one of thestored user information or corresponding privacy setting, based on theuser information and privacy setting received from the source device.21. The method of claim 15, further comprising: executing thethird-party application on the user device; checking the privacy settingfor the user information; and allowing or denying access to the userinformation for the third-party application based on the privacysetting.