Privacy in Mobile Device Communications
First Claim
1. In a computing environment, a method performed at least in part on at least one processor, comprising, performing one or more privacy-related actions with respect to an incoming or outgoing communication based upon contact data associated with the communication, or based upon operating in a private operating mode.
2 Assignments
0 Petitions
Accused Products
Abstract
The subject disclosure is directed towards mobile device privacy and anonymity. When a contact is marked as private, or when a device operates in a private mode, one or more privacy-related actions with respect to an incoming or outgoing communication are performed. Privacy-related actions include logging private telephone call information to a private, protected log, storing private message content to a private protected store, or not saving any such information or content. Another privacy-related action comprises not allowing a visible or audible notification to occur when a private communication is received.
-
Citations
20 Claims
- 1. In a computing environment, a method performed at least in part on at least one processor, comprising, performing one or more privacy-related actions with respect to an incoming or outgoing communication based upon contact data associated with the communication, or based upon operating in a private operating mode.
- 14. In a computing environment, a system comprising, a communications handling program configured to evaluate privacy-related data with respect to an incoming or outgoing communication to determine when a communication is private, and when the communication is determined to be private, to store information into a private storage that is accessible through a protected private user interface.
- 18. One or more computer-readable media having computer-executable instructions, which when executed perform steps, comprising, accessing privacy data associated with an entity that corresponds to a communication, determining whether the privacy data indicates that the communication is to be handled privately, and if so, handling the communication privately by maintaining information associated with the communication in a private storage or by not maintaining information associated with the communication.
Specification