Browse Prior Art Database

Leveraging sentiment analysis to dynamically change point in time access to application features

IP.com Disclosure Number: IPCOM000238276D
Publication Date: 2014-Aug-13
Document File: 3 page(s) / 32K

Publishing Venue

The IP.com Prior Art Database

Abstract

A method for leveraging sentiment analysis to dynamically change access to application features is disclosed. A variety of data sources are analyzed to assess the type, degree and status of relationship between the current holder of a device and the primary user of the device (for example, coworker. vs. family member vs. close friend). A set of permissions are dynamically applied to device applications and resources based on the current state of that relationship.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 45% of the total text.

Page 01 of 3

Leveraging sentiment analysis to dynamically change point in time access to application features

Disclosed is a method for leveraging sentiment analysis to dynamically change access to application features. A variety of data sources are analyzed to assess the type, degree and status of relationship between the current holder of a device and the primary user of the device (for example, coworker. vs. family member vs. close friend). A set of permissions are dynamically applied to device applications and resources based on the current state of that relationship.

Controlling user level access to a mobile device is typically static in nature, which users have access to various content and applications on the device is generally configuring ahead of time. Existing technology enables users to explicitly grant and deny resources and application access to individual users or user types, such as "guest" users. For example, most operating systems (OS) have a guest user that has limited access to applications and data. However, existing guest mode in OS or platforms today is static. Currently there is no way to dynamically control access to content and applications based on social clues online or in person (e.g. whether the relationship between the owner of the device and the current user is positive or negative).

Existing technology supports identifying when a known contact is using a mobile device. A set of application and resource permissions may be assigned based on the level of relationship to the user, as determined by analyzing various data sources. The disclosed method extends upon that capability and enables the application to potentially restrict access to such known contacts at certain times, and allows access at other times based on sentimental analysis of digital content from both the internet (e.g. social media) and surroundings (e.g. voice recognition).

For example, two teenagers are currently in an argument and have exchanged harsh words over text and voice. One of them takes the other's phone and might want to post embarrassing content on the primary user's social media page, etc. The disclosed method would detect the recent hostility and respond by restricting access for that person. At other times, access would be expanded beyond the default, such as a situation in which the phone detects that someone has received verbal permission from the primary user to borrow her device.

A person's relationship with each person in his social network may fluctuate from day to day. For example, the user may have an argument with a friend one day and reconcile the next day, and due to the short nature of the argument they do not take any explicit action to reflect a change in the relationship, such as "unfriending" each other on a social networking site or deleting each other as contacts in their phone. However, during the time that they were arguing, the primary user would not want his friend to be able to borrow (or take) his mobile dev...