Method and apparatus for privacy protection in images

ABSTRACT

In accordance with an example embodiment of the present invention, a method is disclosed. The method includes defining a first privacy setting related to a user. Communicating the first privacy setting using a first radio communication network to a server. Storing the first privacy setting related to the user on the server. Applying the first privacy setting when analyzing an image to determine the user in the image. Determining to apply a second privacy setting related to the user. Defining the second privacy setting related to the user and communicating the second privacy setting to another device of a second user using a second radio communication network.

RELATED APPLICATION

This application was originally filed as Patent Cooperation TreatyApplication No. PCT/FI2013/050434 filed Apr. 19, 2013 which claimspriority benefit to Indian Patent Application No. 1657/CHE/2012, filedApr. 27, 2012.

TECHNICAL FIELD

The invention relates to privacy protection in images and, moreparticularly, to privacy protection in images available in socialnetworks.

BACKGROUND

The popularity of social networks coupled with increased functionalityfrom portable electronic devices provides opportunities to share anddistribute information instantly. Accordingly, there is a need toprovide improved devices having increased capabilities which facilitatesa better user experience.

The following abbreviations that may be found in the specificationand/or the drawing figures are defined as follows:

eNB EUTRAN Node B (evolved Node B)

EPC evolved packet core

E-UTRAN evolved UTRAN (LTE)

CDM code division multiplexing

LTE long term evolution

MAC medium access control

MM/MME mobility management/mobility management entity

Node B base station

O&M operations and maintenance

PDCP packet data convergence protocol

PHY physical

RLC radio link control

RRC radio resource control

RRM radio resource management

S GW serving gateway

UE user equipment

UTRAN universal terrestrial radio access network

SUMMARY

Various aspects of examples of the invention are set out in the claims.

According to a one aspect of the present invention, a method isdisclosed. The method includes defining a first privacy setting relatedto a user. Communicating the first privacy setting using a first radiocommunication network to a server. Storing the first privacy settingrelated to the user on the server. Applying the first privacy settingwhen analyzing an image to determine the user in the image. Determiningto apply a second privacy setting related to the user. Defining thesecond privacy setting related to the user and communicating the secondprivacy setting to another device of a second user using a second radiocommunication network.

According to another aspect of the present invention, a method isdisclosed. The method includes analyzing an image to determine a personin the image. Determining a relationship status of the person.Superseding (or overriding) a privacy status of the person based, atleast partially, on the relationship status of the person or anauthorization by the person.

According to another aspect of the present invention, a computer programproduct including a computer-readable medium bearing computer programcode embodied therein for use with a computer is disclosed. The computerprogram code includes code for defining a first privacy setting relatedto a user. Code for communicating the first privacy setting using afirst radio communication network to a server. Code for storing thefirst privacy setting related to the user on the server. Code forapplying the first privacy setting when analyzing an image to determinethe user in the image. Code for determining to apply a second privacysetting related to the user. Code for defining the second privacysetting related to the user and communicating the second privacy settingto another device of a second user using a second radio communicationnetwork.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of example embodiments of the presentinvention, reference is now made to the following descriptions taken inconnection with the accompanying drawings in which:

FIG. 1 a simplified block diagram of various electronic devices that aresuitable for use in practicing the exemplary embodiments of thisinvention;

FIG. 2 is a front view of the electronic device shown in FIG. 1;

FIG. 3 is a rear view of the electronic device shown in FIG. 1;

FIG. 4 is a more particularized block diagram of the electronic deviceshown in FIG. 1;

FIG. 5 is a block diagram of the electronic device and a privacy server;

FIG. 6 is block diagram in accordance with the exemplary embodiments ofthis invention;

FIG. 7 is a block diagram in accordance with the exemplary embodimentsof this invention;

FIG. 8 is a block diagram in accordance with the exemplary embodimentsof this invention;

FIG. 9 is a block diagram in accordance with the exemplary embodimentsof this invention;

FIG. 10 is a block diagram in accordance with the exemplary embodimentsof this invention; and

FIG. 11 is a block diagram in accordance with the exemplary embodimentsof this invention.

DETAILED DESCRIPTION OF THE DRAWINGS

An example embodiment of the present invention and its potentialadvantages are understood by referring to FIGS. 1 through 11 of thedrawings.

Referring to FIG. 1, there is shown a simplified block diagram ofvarious electronic devices and apparatus that are suitable for use inpracticing the exemplary embodiments of this invention. Althoughembodiments of the invention will be described with reference to theexemplary embodiments shown in the drawings, it should be understoodthat the embodiments of the invention can be embodied in many alternateforms of embodiments. In addition, any suitable size, shape or type ofelements or materials could be used.

In FIG. 1 a wireless network 1 is adapted for communication over awireless link 11 with an apparatus, such as a mobile communicationdevice which may be referred to as a user equipment (UE) 10, via anetwork access node, such as a Node B (base station), and morespecifically an eNB 12. The eNB 12 may be, for example, part of theoverall architecture of a E-UTRAN system. The EUTRAN system generallyincludes eNBs, providing the E-UTRA user plane (PDCP/RLC/MAC/PHY) andcontrol plane (RRC) protocol terminations towards the UE. The eNBs maybe interconnected with each other by means of an X2 interface. The eNBsare also generally connected by means of an S1 interface to an EPC, morespecifically to a MME (Mobility Management Entity) by means of a S1 MMEinterface and to a Serving Gateway (SGW) by means of a S1 interface. TheS1 interface supports a many to many relationship between MMEs/ServingGateways and eNBs.

The eNB generally hosts the following functions: functions for RadioResource Management: Radio Bearer Control, Radio Admission Control,Connection Mobility Control, Dynamic allocation of resources to UEs inboth uplink and downlink (scheduling); IP header compression andencryption of the user data stream; selection of a MME at UE attachment;routing of User Plane data towards the Serving Gateway; scheduling andtransmission of paging messages (originated from the MME); schedulingand transmission of broadcast information (originated from the MME orO&M); and a measurement and measurement reporting configuration formobility and scheduling.

The network 1 may include a network control element (NCE) 14 that mayinclude the MME/S GW functionality, and which provides connectivity witha network 1, such as a telephone network and/or a data communicationsnetwork (e.g., the internet). The UE 10 includes electronic circuitrysuch as a controller, such as a computer or a data processor (DP) 10A, acomputer-readable memory medium embodied as a memory (MEM) 10B thatstores a program of computer instructions (PROG) 10C, and a suitableradio frequency (RF) transceiver 10D for bidirectional wirelesscommunications with the eNB 12 via one or more antennas. The eNB 12 alsoincludes a controller, such as a computer or a data processor (DP) 12A,a computer-readable memory medium embodied as a memory (MEM) 12B thatstores a program of computer instructions (PROG) 12C, and a suitable RFtransceiver 12D for communication with the UE 10 via one or moreantennas. The eNB 12 is coupled via a data/control path 13 to the NCE14. The path 13 may be implemented as the S1 interface. The eNB 12 mayalso be coupled to another eNB via data/control path 15, which may beimplemented as the X2 interface. While the UE 10 and eNB 12 have beendescribed above in connection with a transceiver, one skilled in the artwill appreciate that embodiments of the invention are not necessarily solimited and that various embodiments may comprise a separate receiverand transmitter instead of a transceiver.

At least one of the PROGs 10C and 12C is assumed to include programinstructions that, when executed by the associated DP, enable the deviceto operate in accordance with the exemplary embodiments of thisinvention, as will be discussed below in greater detail.

That is, the exemplary embodiments of this invention may be implementedat least in part by computer software executable by the DP 10A of the UE10 and/or by the DP 12A of the eNB 12, or by hardware, or by acombination of software and hardware (and firmware).

For the purposes of describing the exemplary embodiments of thisinvention the UE 10 may be assumed to also include a Privacy ProtectionSystem (PPS) 10E, and the eNB 12 may include a Privacy Protection System(PPS) 12E.

In general, the various embodiments of the UE 10 can include, but arenot limited to, cellular telephones, personal digital assistants (PDAs)having wireless communication capabilities, portable computers havingwireless communication capabilities, image capture devices such asdigital cameras having wireless communication capabilities, gamingdevices having wireless communication capabilities, music storage andplayback appliances having wireless communication capabilities, Internetappliances permitting wireless Internet access and browsing, as well asportable units or terminals that incorporate combinations of suchfunctions.

The computer readable MEMs 10B and 12B may be of any type suitable tothe local technical environment and may be implemented using anysuitable data storage technology, such as semiconductor based memorydevices, flash memory, magnetic memory devices and systems, opticalmemory devices and systems, fixed memory and removable memory. The DPs10A and 12A may be of any type suitable to the local technicalenvironment, and may include one or more of general purpose computers,special purpose computers, microprocessors, digital signal processors(DSPs) and processors based on a multicore processor architecture, asnon-limiting examples.

Referring to FIG. 2, there is shown a front view of the electronicdevice (or user equipment [UE]) 10. The device 10 generally comprises ahousing 52, a graphical display interface 20, and a user interface 22illustrated as a keypad but understood as also encompassing touch-screentechnology at the graphical display interface 20 and voice-recognitiontechnology received at the microphone 24. A power actuator 26 controlsthe device being turned on and off by the user. The exemplary UE 10 mayhave a forward facing camera 28 (for example for video calls) and/or arearward facing camera 29 (for example for capturing images and videofor local storage, see FIG. 3). The cameras 28, 29 are controlled by ashutter actuator 30 and optionally by a zoom actuator 32 which mayalternatively function as a volume adjustment for the speaker(s) 34 whenthe cameras 28, 29 are not in an active mode.

While various exemplary embodiments of the invention have been describedabove in connection with the graphical display interface 20 and the userinterface 22, one skilled in the art will appreciate that exemplaryembodiments of the invention are not necessarily so limited and thatsome embodiments may comprise only the display interface 20 (without theuser interface 22) wherein the display 20 forms a touch screen userinput section.

Referring now also to the sectional view of FIG. 4, there are seenmultiple transmit/receive antennas 36 that are typically used forcellular communication. The antennas 36 may be multi-band for use withother radios in the UE. The operable ground plane for the antennas 36 isshown by shading as spanning the entire space enclosed by the UE housingthough in some embodiments the ground plane may be limited to a smallerarea, such as disposed on a printed wiring board on which the power chip38 is formed. The power chip 38 controls power amplification on thechannels being transmitted and/or across the antennas that transmitsimultaneously where spatial diversity is used, and amplifies thereceived signals. The power chip 38 outputs the amplified receivedsignal to the radio-frequency (RF) chip 40 which demodulates anddownconverts the signal for baseband processing. The baseband (BB) chip42 detects the signal which is then converted to a bit-stream andfinally decoded. Similar processing occurs in reverse for signalsgenerated in the apparatus 10 and transmitted from it.

Signals to and from the cameras 28, 29 pass through an image/videoprocessor 44 which encodes and decodes the various image frames. Aseparate audio processor 46 may also be present controlling signals toand from the speakers 34 and the microphone 24. The graphical displayinterface 20 is refreshed from a frame memory 48 as controlled by a userinterface chip 50 which may process signals to and from the displayinterface 20 and/or additionally process user inputs from the keypad 22and elsewhere.

Certain embodiments of the UE 10 may also include one or more secondaryradios such as a wireless local area network radio WLAN 37 and aBluetooth® radio 39, which may incorporate an antenna on-chip or becoupled to an off-chip antenna. Certain embodiments may also include anear field communications (NFC) chip 51 configured for connecting withanother device. Throughout the apparatus are various memories such asrandom access memory RAM 43, read only memory ROM 45, and in someembodiments removable memory such as the illustrated memory card 47. Thevarious programs 10C are stored in one or more of these memories. All ofthese components within the UE 10 are normally powered by a portablepower supply such as a battery 49.

The aforesaid processors 38, 40, 42, 44, 46, 50, if embodied as separateentities in a UE 10 or eNB 12, may operate in a slave relationship tothe main processor 10A, 12A, which may then be in a master relationshipto them. It should be noted that various exemplary embodiments of theinvention may be disposed across various chips and memories as shown ordisposed within another processor that combines some of the functionsdescribed above for FIG. 4. Any or all of these various processors ofFIG. 4 access one or more of the various memories, which may be on-chipwith the processor or separate therefrom. Similar function-specificcomponents that are directed toward communications over a networkbroader than a piconet (e.g., components 36, 38, 40, 42-45 and 47) mayalso be disposed in exemplary embodiments of the access node 12, whichmay have an array of tower-mounted antennas rather than the two shown atFIG. 4.

Note that the various chips (e.g., 38, 40, 42, etc.) that were describedabove may be combined into a fewer number than described and, in a mostcompact case, may all be embodied physically within a single chip.

Referring now also to FIG. 5 there is shown a privacy server 60. Theprivacy server 60 is configured to be connected to the device 10 via anetwork 62, such as the internet. The connection between the network 62and the device 10 may be provided through a link 64. According to someembodiments of the invention, the link may include a wireless link, suchas the wireless link 11. According to some embodiments of the invention,the link may include a wireless link configured to be connected to awireless data network, such as a Wi-Fi network, for example. Accordingto some embodiments of the invention, the link may include a wired link,such as through a direct cable connection, configured to be connected tothe internet. The server 60 includes a processor 66 and a memory 68similar to the processor 10A and the memory 10B. The privacy server mayfurther include any suitable type of features as known in the art.

Based on the foregoing it should be apparent that the exemplaryembodiments of this invention provide a method, apparatus and computerprogram(s) to provide a privacy protection system that can providesettings for a social network and also use face recognition technologyto identify faces in images uploaded on to the social network.

According to various exemplary embodiments of the invention, the privacyprotection system provides for the privacy protection of an individual,wherein, for example, a person's willingness to be photographed ischecked or verified before data is uploaded to a social network.

The privacy protection system allows for a user of a social network toprovide privacy protection in images by giving the user an option of notappearing on photographs. Referring now also to FIG. 6, the privacyprotection system provides the user with an option of not appearing onphotographs (at block 102). The options given to the user may be, forexample: a) Appear on Friend's Photographs Yes/No; b) Appear onStranger's Photographs Yes/No. The option provides for the user toselect a privacy status that will be reflected in the social network.For example, a ‘friend’ may be a person on the user's list of knownpersons, and a ‘stranger’ may be a person that is not on the list of theuser's known persons. However, it should be noted that according tovarious exemplary embodiments, the privacy status may be provided forother lists of people on the social network, such as a ‘work friends’list, or a ‘family friends’ list, for example. In the above example, adefault could be set in the privacy protection system that the ‘Appearon Friend's Photographs’ privacy status could be set to ‘Yes’, and the‘Appear on Stranger's Photographs’ privacy status could be set to ‘No’.However, in alternate embodiments, any default settings may be provided.With the privacy status set, the user may or may not appear in afriend's/stranger's photograph according to the chosen option (Yes/No).

At block 104, the user preference of the privacy status is transmittedto all devices belonging to ‘friends’ of the user. According to someembodiments of the invention, the privacy protection system transmitsthe user preference from the user's device to the friends' devices.

In some other embodiments of the invention, the privacy protectionsystem transmits the user preference from the user's device to thesocial network, and the ‘friends’ devices are updated with thecorresponding user preference when a connection to the social network isestablished.

At block 106, if a ‘friend’ of the user takes a photograph of the user,and the user setting in a) was ‘No’, then the user's face in the imageis blurred or masked (or obscured) to become unrecognizable. The‘blurring’ may be provided locally on the ‘friends’ device when thepicture is taken, for example when the privacy protection systemtransmits the user preference from the user's device to the friendsdevices. Or the ‘blurring’ may be provided when the ‘friend’ uploads thepicture or image to the social network, as the user preference of theprivacy status is available on the social network. Otherwise, if the‘friend’ of the user takes a photograph of the user, and the usersetting in a) was ‘Yes’, then the face would be visible on thephotograph.

At block 108, if a ‘stranger’ takes the user's photograph, then the faceis automatically blurred on the device. According to some embodiments ofthe invention, the automatic blurring may be provided, for example whenthe user gives permission to the ‘stranger’ for taking his photograph.According to some embodiments of the invention, this permission could bedone by a ‘NFC shake’. Where the user can give permission for takinghis/her photograph to a stranger for a specified time period using ashort-mid range radio communication, such as near field communication(NFC) tags, for example, for transmitting face vectors of the user. Forexample, devices are brought close together, and the ‘stranger's’ deviceis updated with face vectors of the user. This will give the ‘stranger’the opportunity to take photographs of the user for a specified time.According to some embodiments, the time could be specified by the userin the privacy status setting. Alternatively, the ‘permission’ could beprovided through social networking site. For example, if the usersearches for the ‘stranger's’ profile, and allows the stranger to takephotographs/images of the user, where face vectors are transmitted withthe specified time.

According to various exemplary embodiments of the invention, the privacyserver 60 stores a list of the friends or contacts for the user of thedevice 10. The privacy server 60 may further include the privacystatus/setting of images for each of the friends or contacts on thelist. Furthermore, the privacy server 60 may further comprise the facevectors (or face feature vectors) for each of the friends or contacts onthe list. The privacy protection system is configured to communicatewith the privacy server in order to provide a synchronization of thefriends/contact list, the privacy setting, and/or the face vectorsbetween the device 10 and the server 60. For example, when one of thefriends/contacts on the list changes the privacy setting, the change isreflected on the privacy server 60 and then updated on the device 10after a synchronization is performed. Alternatively, if a face isrecognized in an image, then the device 10 can communicate with theserver 60 to verify the privacy status of the person. Additionally, ifthe user of the device 10 adds a contact on the device 10, then this isupdated on the server 60 when a synchronization is performed and theserver 60 further sends the privacy setting and/or the face featurevector to the device 10.

Additionally, it should be noted that the face recognition can also beperformed with embodiments where the device 10 is a personal computer ora laptop computer where, for example, software (such as Zune software)can be used to recognize the face of the person in the image. Once theface is recognized the privacy status of the person is verified on withthe profile information on the device. Additionally, the privacy server60 is configured to perform similar functionality wherein the facerecognition is performed on the privacy server 60 and then the device isupdated when a synchronization is performed.

According to various exemplary embodiments of the invention, theconnection and synchronization between the privacy protection system andthe privacy server allow for superseding (or overriding), temporarily orfor a certain duration, the privacy setting so that the user of thedevice may take an image of the person that will not be modified (suchas by blurring, for example).

While various embodiments have been described above in connection with‘face vectors’, one skilled in the art will appreciate that the variousembodiments are not necessarily so limited and that any other suitableface recognition method may be provided.

According to some other embodiments of the invention, when the‘stranger’ takes the user's photograph and uploads the user's image tothe social network, then the face of the user is automatically blurredas the privacy protection system has provided the user's privacy statususer setting and/or the face vector (or other face recognitionmethod/technology) to the social network to that any images uploaded bystrangers are analyzed for the user's face, and once the user's face isrecognized, the portion of the image which includes the face of the useris ‘blurred’. Additionally, even if a ‘friend’ of the user takes aphotograph of the user and uploads the image to the social network, thenthe face of the user is blurred/visible based on selected option.

Further, if the user's photograph is taken in a crowd (such as if theuser is at a rally, or the theatre, for example) the face of the user isautomatically blurred even when clicked by a friend.

It should also be noted that it is possible that the user also agrees tobe photographed by the ‘stranger’, and then with the correspondingsettings in the privacy status, the face of the user in the image takenby the ‘stranger’ would be visible.

FIG. 7 illustrates a method 200. The method 200 includes capturing animage with a camera of a device (at block 202). Analyzing the image todetermine a person in the image (at block 204). Determining a privacystatus of the person (at block 206). Modifying a portion of the imagebased, at least partially, on the determined privacy status of theperson (at block 208). It should be noted that the illustration of aparticular order of the blocks does not necessarily imply that there isa required or preferred order for the blocks and the order andarrangement of the blocks may be varied. Furthermore it may be possiblefor some blocks to be omitted.

FIG. 8 illustrates a method 300. The method 300 includes capturing animage with a camera of a device (at block 302). Analyzing the image todetermine a person in the image (at block 304). Determining arelationship status of the person (at block 306). Modifying a portion ofthe image based, at least partially, on the determined relationshipstatus of the person (at block 308). It should be noted that theillustration of a particular order of the blocks does not necessarilyimply that there is a required or preferred order for the blocks and theorder and arrangement of the blocks may be varied. Furthermore it may bepossible for some blocks to be omitted.

FIG. 9 illustrates a method 400. The method 400 includes analyzing animage to determine a person in the image (at block 402). Determining arelationship status of the person (at block 404). Superseding a privacystatus of the person based, at least partially, on the relationshipstatus of the person or an authorization by the person (at block 406).It should be noted that the illustration of a particular order of theblocks does not necessarily imply that there is a required or preferredorder for the blocks and the order and arrangement of the blocks may bevaried. Furthermore it may be possible for some blocks to be omitted.

According to various exemplary embodiments of the invention, when theuser of the device captures an image, the privacy protection system isconfigured to analyze the image to determine a person in the image (suchas by face recognition technology, for example). The privacy protectionsystem is configured to determine a relationship status of the person.The relationship status may be ‘friend’, ‘family’, or ‘acquaintance’,for recognized persons. The relationship status may be ‘stranger’,‘unknown’, or ‘not known’, for persons not recognized. In the event thatthe person in the image is not recognized (and considered a stranger, orunknown, for example), the person's face is automatically blurred. Insome embodiments of the invention, the person in the image is notrecognized after the image is analyzed due to the person not beingpresent in the contact list of the user (wherein, for example, theuser's contact list includes information to compare with the image, suchas an image of the person, face vectors corresponding to the person, anysuitable facial recognition data, or any other suitable recognitiondata). In some other embodiments of the invention, the person in theimage is not recognized after the image is analyzed due to the personnot being on a friend list in a social networking site (wherein, forexample, the person's profile in the social networking web site includesinformation to compare with the image, such as an image of the person,face vectors corresponding to the person, any suitable facialrecognition data, or any other suitable recognition data). In the eventthat the person in the image is recognized (and considered a friend, orknown person, or a family member, for example), and the person's privacysetting/status is set to ‘privacy’ or ‘privacy on’ for example, then theperson's face would be automatically blurred. In the event that theperson in the image is recognized (and considered a friend, or knownperson, or a family member, for example), and the person's privacysetting/status is set to ‘public’ or ‘privacy off’ for example, then theperson's face would be shown in the image.

Referring now also to FIG. 10, the relationship status and privacystatus/setting may be checked by the privacy protection system of thedevice or the privacy server (or a combination of both the privacyprotection system and the privacy server) wherein the image isprocessed/analyzed for face recognition, such as by using face featurevectors, for example (at block 502). After the face recognition isperformed, the privacy protection system and/or the privacy servercompare the results with the users contacts/friends list, to determineif the person in the image is known or unknown (at block 504). If theperson is known, then the privacy status/setting in the person's profileof the contacts/friends list can be checked or verified for a selectionof ‘privacy on’ or ‘privacy off’ (at block 506). If the person isunknown, then the privacy status/setting may be a default setting (suchas ‘privacy on’, for example) (at block 508). In some embodiments of theinvention, if the unknown person is not on the user's friends list, butis a member of a social network common to the user, then there may be anadditional option set by the person for the privacy status/setting.

According to various exemplary embodiments of the invention, the privacysetting/status could be superseded for some time, through NFC, orthrough an outlook calendar event/invitation function (or any othersuitable calendar function, for example). For example, if a person sendsan electronic birthday invitation to be stored in a calendar applicationto invite friends to a party, the outlook calendar event/invitation sentby the user may have a privacy setting (or the calendar application mayhave a privacy setting/status for all invitations) which enables theuser of the device to take pictures of all the persons invited in thecalendar event/invitation (wherein the setting in the calendarevent/invitation overrides any other privacy setting). Additionally, insome embodiments of the invention, the person receiving the calendar isprovided an option to accept the calendar with/without the privacysetting. This can, for example, ensure that people in the invited groupcan take pictures of each other.

FIG. 11 illustrates a method 600. The method 600 includes defining afirst privacy setting related to a user (at block 602). Communicatingthe first privacy setting using a first radio communication network to aserver, such as an LTE network, for example (at block 604). Storing thefirst privacy setting related to the user on the server (at block 606).Applying the first privacy setting when analyzing an image to determinethe user in the image (at block 608). Determining to apply a secondprivacy setting related to the user (at block 610). Defining the secondprivacy setting related to the user and communicating (or sending) thesecond privacy setting to another device of a second user using a secondradio communication network, such as an NFC or Bluetooth network, forexample (at block 612). In response to sending (or communicating) thesecond privacy setting to the another device of the second user,applying the second privacy setting and overriding the first privacysetting for a predetermined time (at block 614). It should be noted thatthe illustration of a particular order of the blocks does notnecessarily imply that there is a required or preferred order for theblocks and the order and arrangement of the blocks may be varied.Furthermore it may be possible for some blocks to be omitted.

According to various exemplary embodiments of the invention, the privacyprotection feature provides for use cases where two ‘strangers’ meet andwant to take a photo without blurring (or otherwise modifying) eachother's faces in the image. Various exemplary embodiments of theinvention also provide for use cases where the permanent settings in theprivacy server indicate “familiarity”, but the users just want to blur(or otherwise modify) faces for a predetermined time. For example, iffriends are together in a social setting and a ‘party’ atmosphere ensueswhere for example the user may not want to be identified in apicture(s), as the picture(s) may not portray the user in a professionalmanner, then the user may choose to blur or modify the image(s) takenduring the social event so that he/she may not be identified.

According to various exemplary embodiments of the invention, the privacysetting(s) in the privacy server are not changed. For example, if thesetting(s) is superseded or overridden by the short-mid range radiocommunication (such as NFC or Bluetooth, for example), then this just“disables” the function of the server privacy policy for a predeterminedtime. This provides for two systems for defining the privacy settingswherein the privacy server defines the privacy settings (which can bechanged we the user changes his/her profile, however profile changes aregenerally used for long term [or non-temporary] settings), where thesesettings are valid all the time, excluding those times when the userdecides to disable the settings using NFC or Bluetooth communications tooverride the settings for some predetermined short time.

Without in any way limiting the scope, interpretation, or application ofthe claims appearing below, a technical effect of one or more of theexample embodiments disclosed herein is providing privacy protection inimages by giving users an option of not appearing on photographs.Another technical effect of one or more of the example embodimentsdisclosed herein is that a user may or may not appear in afriend's/stranger's photograph according to the chosen option. Anothertechnical effect of one or more of the example embodiments disclosedherein is that the user's face will not be visible or will beblurred/masked when the chosen option is ‘NO’. Another technical effectof one or more of the example embodiments disclosed herein is if astranger tries to upload a photograph of the user, probably taken fromanother device, the user's face is blurred. Another technical effect ofone or more of the example embodiments disclosed herein is that a usercan, just before going to a rally, change his settings. This ensuresthat the user becomes ‘invisible’ or unrecognizable in any photographstaken in the crowd. So, even if the user's ‘friend’ is taking aphotograph, the user will not be visible (or recognizable) in it, as theuser's face will be blurred.

Another technical effect of one or more of the example embodimentsdisclosed herein is that the user's privacy is protected with theprivacy protection system, as the user will not appear in any imagewhere he does not intend to. Even though, in some embodiments, the imageprocessing may become a little cumbersome to take photos, for example toprovide the suitable type of blurring as to not spoil the photographs,the added benefit of privacy protection provides significant advantages.Another technical effect of one or more of the example embodimentsdisclosed herein is that the privacy of a person (such as the user) isrespected and his photographs are not published on the web accidently.Another technical effect of one or more of the example embodimentsdisclosed herein is when two strangers meet and want to take a photo ofeach other, superseding the privacy setting stored on the servertemporarily for a predetermined is possible using NFC.

Another technical effect of one or more of the example embodimentsdisclosed herein is that users can avoid being ‘tricked’ into postingimages onto the social networks as, it is very easy to download imagesbeing shared publicly on the network, and the images can be morphedeasily. Another technical effect of one or more of the exampleembodiments disclosed herein is that a user can feel safe that his/heridentity is not known when images are taken at rally, and posted on thesocial network. Another technical effect of one or more of the exampleembodiments disclosed herein is that a user can avoid being captured inan image where he/she ‘accidently’ appears in them, such as when theuser is passing through a street where these images could be uploadedonto social media/internet (and user privacy could be compromised[accidently], and he/she may not have wanted to disclose his location inany way).

In general, the various exemplary embodiments may be implemented inhardware or special purpose circuits, software, logic or any combinationthereof. For example, some aspects may be implemented in hardware, whileother aspects may be implemented in firmware or software which may beexecuted by a controller, microprocessor or other computing device,although the invention is not limited thereto. While various aspects ofthe exemplary embodiments of this invention may be illustrated anddescribed as block diagrams, flow charts, or using some other pictorialrepresentation, it is well understood that these blocks, apparatus,systems, techniques or methods described herein may be implemented in,as nonlimiting examples, hardware, software, firmware, special purposecircuits or logic, general purpose hardware or controller or othercomputing devices, or some combination thereof.

It should thus be appreciated that at least some aspects of theexemplary embodiments of the inventions may be practiced in variouscomponents such as integrated circuit chips and modules, and that theexemplary embodiments of this invention may be realized in an apparatusthat is embodied as an integrated circuit. The integrated circuit, orcircuits, may comprise circuitry (as well as possibly firmware) forembodying at least one or more of a data processor or data processors, adigital signal processor or processors, baseband circuitry and radiofrequency circuitry that are configurable so as to operate in accordancewith the exemplary embodiments of this invention.

Various modifications and adaptations to the foregoing exemplaryembodiments of this invention may become apparent to those skilled inthe relevant arts in view of the foregoing description, when read inconjunction with the accompanying drawings. However, any and allmodifications will still fall within the scope of the non-limiting andexemplary embodiments of this invention.

For example, while the exemplary embodiments have been described abovein the context of the EUTRAN (UTRAN-LTE) system, it should beappreciated that the exemplary embodiments of this invention are notlimited for use with only this one particular type of wirelesscommunication system, and that they may be used to advantage in otherwireless communication systems such as for example (WLAN, UTRAN, GSM asappropriate).

It should be noted that the terms “connected,” “coupled,” or any variantthereof, mean any connection or coupling, either direct or indirect,between two or more elements, and may encompass the presence of one ormore intermediate elements between two elements that are “connected” or“coupled” together. The coupling or connection between the elements canbe physical, logical, or a combination thereof. As employed herein twoelements may be considered to be “connected” or “coupled” together bythe use of one or more wires, cables and/or printed electricalconnections, as well as by the use of electromagnetic energy, such aselectromagnetic energy having wavelengths in the radio frequency region,the microwave region and the optical (both visible and invisible)region, as several non-limiting and non-exhaustive examples.

As used in this application, the term ‘circuitry’ refers to all of thefollowing: (a) hardware-only circuit implementations (such asimplementations in only analog and/or digital circuitry) and (b) tocombinations of circuits and software (and/or firmware), such as (asapplicable): (i) to a combination of processor(s) or (ii) to portions ofprocessor(s)/software (including digital signal processor(s)), software,and memory(ies) that work together to cause an apparatus, such as amobile phone or server, to perform various functions) and (c) tocircuits, such as a microprocessor(s) or a portion of amicroprocessor(s), that require software or firmware for operation, evenif the software or firmware is not physically present.

This definition of ‘circuitry’ applies to all uses of this term in thisapplication, including in any claims. As a further example, as used inthis application, the term “circuitry” would also cover animplementation of merely a processor (or multiple processors) or portionof a processor and its (or their) accompanying software and/or firmware.The term “circuitry” would also cover, for example and if applicable tothe particular claim element, a baseband integrated circuit orapplications processor integrated circuit for a mobile phone or asimilar integrated circuit in server, a cellular network device, orother network device.

Below are provided further descriptions of various non-limiting,exemplary embodiments. The below-described exemplary embodiments may bepracticed in conjunction with one or more other aspects or exemplaryembodiments. That is, the exemplary embodiments of the invention, suchas those described immediately below, may be implemented, practiced orutilized in any combination (e.g., any combination that is suitable,practicable and/or feasible) and are not limited only to thosecombinations described herein and/or included in the appended claims.

In one exemplary embodiment, a method comprising capturing an image witha camera of a device; analyzing the image to determine a person in theimage; determining a privacy status of the person; and modifying aportion of the image based, at least partially, on the determinedprivacy status of the person.

In another exemplary embodiment, a method comprising capturing an imagewith a camera of a device; analyzing the image to determine a person inthe image; determining a relationship status of the person; andmodifying a portion of the image based, at least partially, on thedetermined relationship status of the person.

The method as above wherein the determining the relationship status ofthe person comprises determining if the person is a known person or anunknown person.

The method as above wherein the determining comprises determining aprivacy status of the person, and wherein the modifying comprisesmodifying the portion of the image based, at least partially, on thedetermined privacy status of the person.

The method as above, wherein the analyzing further comprises analyzingthe image to determine a face of the person in the image.

The method as above, wherein the modifying further comprises blurring aportion of the image.

The method as above, wherein the person is not recognizable in the imageafter the portion of the image is modified.

The method as above, comprising determining if the person is a knownperson or an unknown person in a social network.

The method as above, wherein the privacy status is set by the person.

An apparatus configured to perform the method as above.

A method substantially as herein described and illustrated in theaccompanying drawings.

An apparatus substantially as herein described and illustrated in theaccompanying drawings.

A computer program product comprising program instructions to performthe method as above.

In another exemplary embodiment, an apparatus, comprising: a camera; atleast one processor; and at least one memory including computer programcode, the at least one memory and the computer program code configuredto, with the at least one processor, cause the apparatus to perform atleast the following: analyze an image captured by the camera; determinea person in the image; determine a privacy status of the person; andmodify a portion of the image based, at least partially, on thedetermined privacy status of the person. In another exemplaryembodiment, a computer program product comprising a computer-readablemedium bearing computer program code embodied therein for use with acomputer, the computer program code comprising: code for analyzing animage captured by a camera; code for determining a person in the image;code for determining a privacy status of the person; and code formodifying a portion of the image based, at least partially, on thedetermined privacy status of the person.

In another exemplary embodiment, a method comprising: analyzing an imageto determine a person in the image; determining a relationship status ofthe person; and superseding a privacy status of the person based, atleast partially, on the relationship status of the person or anauthorization by the person.

The method as above wherein the determining the relationship status ofthe person comprises determining if the person is a known person or anunknown person.

The method as above wherein the privacy status comprises a setting setby the person when person is a known person.

The method as above wherein the privacy status comprises a defaultsetting when the person is an unknown person.

The method as above wherein the superseding comprises superseding theprivacy status for a predetermined amount of time, wherein after thepredetermined amount of time a portion of the image is blurred.

The method as above wherein the authorization by the person is providedby a short-mid range radio communication.

An apparatus configured to perform the method above.

The method as above substantially and as herein described andillustrated in the accompanying drawings.

An apparatus substantially as herein described and illustrated in theaccompanying drawings.

A computer program product comprising program instructions to performthe method above.

In another exemplary embodiment, a method comprising: defining a firstprivacy setting related to a user; communicating the first privacysetting using a first radio communication network to a server; storingthe first privacy setting related to the user on the server; applyingthe first privacy setting when analyzing an image to determine the userin the image; determining to apply a second privacy setting related tothe user; and defining the second privacy setting related to the userand communicating (or sending) the second privacy setting to anotherdevice of a second user using a second radio communication network.

The method as above wherein in response to sending (or communicating)the second privacy setting to the another device of the second user,applying the second privacy setting and overriding the first privacysetting for a predetermined time.

The method as above wherein after the predetermined time a portion ofthe image is blurred. The method as above wherein the first radiocommunication network comprises a long term evolution (LTE) network.

The method as above wherein the second radio communication networkcomprises a near field communications (NFC) network.

The method as above wherein the second radio communication networkcomprises a Bluetooth network.

An apparatus configured to perform the method above.

The method as above substantially and as herein described andillustrated in the accompanying drawings.

An apparatus substantially as herein described and illustrated in theaccompanying drawings. A computer program product comprising programinstructions to perform the method above. If desired, the differentfunctions discussed herein may be performed in a different order and/orconcurrently with each other. Furthermore, if desired, one or more ofthe above-described functions may be optional or may be combined.

Although various aspects of the invention are set out in the independentclaims, other aspects of the invention comprise other combinations offeatures from the described embodiments and/or the dependent claims withthe features of the independent claims, and not solely the combinationsexplicitly set out in the claims.

It should be understood that the foregoing description is onlyillustrative of the invention. Various alternatives and modificationscan be devised by those skilled in the art without departing from theinvention. Accordingly, the invention is intended to embrace all suchalternatives, modifications and variances which fall within the scope ofthe appended claims.

I claim:
 1. A method comprising: defining a first privacy settingrelated to a user, wherein the first privacy setting is determined bythe user; communicating the first privacy setting using a first radiocommunication network to a server; storing the first privacy settingrelated to the user on the server; applying the first privacy settingwhen analyzing an image to determine the user in the image; determiningto apply a second privacy setting related to the user, wherein thesecond privacy setting is determined by the user; and defining thesecond privacy setting related to the user and communicating the secondprivacy setting to another device of a second user using a second radiocommunication network, wherein the second privacy setting determines howthe image or another image of the user is accessible from the anotherdevice of the second user while overriding the first privacy setting fora period of time.
 2. A method as claimed in claim 1 wherein in responseto communicating the second privacy setting to the another device of thesecond user, applying the second privacy setting and overriding thefirst privacy setting for a predetermined time.
 3. A method as claimedin claim 2 wherein after the predetermined time a portion of the imageis blurred.
 4. A method as claimed in claim 1 wherein the first radiocommunication network comprises a long term evolution (LTE) network. 5.A method as claimed in claim 1 wherein the second radio communicationnetwork comprises a near field communications (NFC) network.
 6. A methodas claimed in claim 1 wherein the second radio communication networkcomprises a Bluetooth network.
 7. An apparatus comprising: at least oneprocessor; and at least one memory including computer program code forone or more programs, the at least one memory and the computer programcode configured to, with the at least one processor, cause the apparatusto perform at least the following, define a first privacy settingrelated to a user; communicate the first privacy setting using a firstradio communication network to a server; store the first privacy settingrelated to the user on the server; apply the first privacy setting whenanalyzing an image to determine the user in the image; determine toapply a second privacy setting related to the user; and define thesecond privacy setting related to the user and communicating the secondprivacy setting to another device of a second user using a second radiocommunication network, wherein the second privacy setting determines howthe image or another image of the user is accessible from the anotherdevice of the second user while overriding the first privacy setting fora period of time.
 8. An apparatus as claimed in claim 7 wherein inresponse to communicate the second privacy setting to the another deviceof the second user, the apparatus is further caused to apply the secondprivacy setting and to override the first privacy setting for apredetermined time.
 9. An apparatus as claimed in claim 8 wherein afterthe predetermined time a portion of the image is blurred.
 10. Anapparatus as claimed in claim 7 wherein the first radio communicationnetwork comprises a long term evolution (LTE) network.
 11. An apparatusas claimed in claim 7 wherein the second radio communication networkcomprises a near field communications (NFC) network.
 12. An apparatus asclaimed in claim 7 wherein the second radio communication networkcomprises a Bluetooth network.
 13. A computer program product comprisinga non-transitory computer readable storage medium havingcomputer-readable code embodied thereon, the computer-readable codeexecutable by an apparatus and causing the apparatus, in response to theexecution of the computer-readable code, causing the apparatus toperform at least the following: define a first privacy setting relatedto a user; communicate the first privacy setting using a first radiocommunication network to a server; store the first privacy settingrelated to the user on the server; apply the first privacy setting whenanalyzing an image to determine the user in the image; determine toapply a second privacy setting related to the user; and define thesecond privacy setting related to the user and communicating the secondprivacy setting to another device of a second user using a second radiocommunication network, wherein the second privacy setting determines howthe image or another image of the user is accessible from the anotherdevice of the second user while overriding the first privacy setting fora period of time.
 14. A computer program product as claimed in claim 13wherein in response to communicate the second privacy setting to theanother device of the second user, the program instructions furtherapply the second privacy setting and override the first privacy settingfor a predetermined time.
 15. A computer program product as claimed inclaim 14 wherein after the predetermined time a portion of the image isblurred.
 16. A computer program product as claimed in claim 13 whereinthe first radio communication network comprises a long term evolution(LTE) network.
 17. A computer program product as claimed in claim 13wherein the second radio communication network comprises a near fieldcommunications (NFC) network.
 18. A computer program product as claimedin claim 13 wherein the second radio communication network comprises aBluetooth network.