Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
AGENT DEVICE AND METHOD FOR OPERATING THE SAME
Document Type and Number:
WIPO Patent Application WO/2019/175083
Kind Code:
A1
Abstract:
An agent device for assisting one or more users is provided. The agent device supports a first operation mode in which the agent device is configured to identify individual users. Further, the agent device supports a second operation mode in which the agent device is configured to not identify individual users.The agent device includes a receiver circuit configured to receive, from an external device, a signal indicating that a person in the vicinity of the agent device does not want to be identified. Additionally,the agent device includes a control circuit configured to set an operation mode of the agent device to the second operation mode in response to receiving the signal.

Inventors:
MARIVOET PHILIP (DE)
DEMARTO OLIVIER (DE)
COOL TOM (DE)
Application Number:
PCT/EP2019/055966
Publication Date:
September 19, 2019
Filing Date:
March 11, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SONY CORP (JP)
SONY EUROPE LTD (GB)
International Classes:
H04W4/80; H04W12/00
Domestic Patent References:
WO2018136067A12018-07-26
Foreign References:
EP3040955A12016-07-06
EP2629194A22013-08-21
Other References:
None
Attorney, Agent or Firm:
2SPL PATENTANWÄLTE PARTG MBB (DE)
Download PDF:
Claims:
Claims What is claimed is:

1. An agent device (100) for assisting one or more users, wherein the agent device (100) supports a first operation mode in which the agent device (100) is configured to identify in dividual users, and wherein the agent device (100) supports a second operation mode in which the agent (100) device is configured to not identify individual users, the agent device (100) comprising: a receiver circuit (110) configured to receive, from an external device, a signal (101) indicat ing that a person in the vicinity of the agent device (100) does not want to be identified; and a control circuit (120) configured to set an operation mode of the agent device (100) to the second operation mode in response to receiving the signal (101).

2. The agent device (100) of claim 1, further comprising: a notification circuit (130) configured to output a predefined notification if the agent device (100) operates in the second operation mode.

3. The agent device (100) claim 2, wherein the predefined notification is a visual notifi- cation.

4. The agent device (100) of claim 2 or claim 3, wherein the predefined notification is an acoustic notification.

5. The agent device (100) of any of claims 1 to 4, wherein the signal (101) is free from information about the identity of the person. 6. The agent device (100) of any of claims 1 to 5, wherein the control circuit (120) is further configured to keep the agent device (100) in the second operation mode as long as the signal (101) is received.

7. The agent device (100) of any of claims 1 to 6, wherein the control circuit(l20) is further configured to set the operation mode of the agent device (100) to the first operation mode if the signal (101) is not received.

8. The agent device (100) of any of claims 1 to 7, wherein the external device is one of a mobile communication device, a wearable, or a server.

9. A system, comprising: a user device (140) configured to emit a signal indicating that the carrier of the user device (140) does not want to be identified; and an agent device (100) according to any of claims 1 to 8. 10. A method (200) of operating an agent device for assisting one or more users, wherein the agent device supports a first operation mode in which the agent device is configured to identify individual users, and wherein the agent device supports a second operation mode in which the agent device is configured to not identify individual users, the method comprising: receiving (202), from an external device, a signal indicating that a person in the vicinity of the agent device does not want to be identified; and setting (204) an operation mode of the agent device to the second operation mode in response to receiving the signal.

11. The method of claim 10, further comprising: outputting (206) a predefined notification if the agent device operates in the second operation mode.

12. The method of claim 11 , wherein the predefined notification is a visual notification.

13. The method of claim 11 or claim 12, wherein the predefined notification is an acoustic notification.

14. The method of any of claims 10 to 13, wherein the signal is free from information about the identity of the person.

15. The method of any of claims 10 to 14, further comprising: keeping (208) the agent device in the second operation mode as long as the signal is received.

16. The method of any of claims 10 to 15, further comprising: setting (210) the operation mode of the agent device to the first operation mode if the signal is not received. 17. The method any of claims 10 to 16, wherein the external device is one of a mobile communication device, a wearable, or a server.

Description:
AGENT DEVICE AND METHOD FOR OPERATING THE SAME

Field

The present disclosure relates to protecting user privacy when using an agent device. In par ticular, examples relate to an agent device for assisting one or more users, and a method of operating an agent device for assisting one or more users.

Background

An agent device, for example a smart home device integrating an intelligent virtual assistant, commonly recognizes, identifies and/or distinguishes between people present in the vicinity. The agent device performs user recognition in order to serve users at its best capacity.

Some users do not want this recognition to happen in order to protect their privacy.

Hence, there may be a desire for an improved agent device.

Summary

This desire is met by apparatuses and methods in accordance with the independent claims. Advantageous embodiments are addressed by the dependent claims.

According to an aspect, the present disclosure provides an agent device for assisting one or more users. The agent device supports a first operation mode in which the agent device is configured to identify individual users. Further, the agent device supports a second operation mode in which the agent device is configured to not identify individual users. The agent de- vice comprises a receiver circuit configured to receive, from an external device, a signal in dicating that a person in the vicinity of the agent device does not want to be identified. Addi tionally, the agent device comprises a control circuit configured to set an operation mode of the agent device to the second operation mode in response to receiving the signal. According to another aspect, the present disclosure provides a method of operating an agent device for assisting one or more users. The agent device supports a first operation mode in which the agent device is configured to identify individual users. Further, the agent device supports a second operation mode in which the agent device is configured to not identify individual users. The method comprises receiving, from an external device, a signal indicating that a person in the vicinity of the agent device does not want to be identified. Additionally, the method comprises setting an operation mode of the agent device to the second operation mode in response to receiving the signal.

Brief description of the Figures

Some examples of apparatuses and/or methods will be described in the following by way of example only, and with reference to the accompanying figures, in which

Figs la and lb illustrate an agent device according to an embodiment in different situations; and

Fig. 2 illustrates a flowchart of a method of operating an agent device for assisting one or more users according to an embodiment.

Detailed Description

Various examples will now be described more fully with reference to the accompanying draw- ings in which some examples are illustrated.

Accordingly, while further examples are capable of various modifications and alternative forms, some particular examples thereof are shown in the figures and will subsequently be described in detail. However, this detailed description does not limit further examples to the particular forms described. Further examples may cover all modifications, equivalents, and alternatives falling within the scope of the disclosure. Like numbers refer to like or similar elements throughout the description of the figures, which may be implemented identically or in modified form when compared to one another while providing for the same or a similar functionality. Unless otherwise defined, all terms (including technical and scientific terms) are used herein in their ordinary meaning of the art to which the examples belong.

Fig. la illustrates an agent device 100 for assisting one or more users according to an embod- iment together. Users A and B interact with agent device 100. Agent device 100 is a virtual assistant to the users A and B. In other words, agent device 100 is a platform for a software agent that can perform tasks or services for an individual. For example, agent device 100 may provide information such as weather or facts, set an alarm, make to-do lists or shopping lists, play music or videos from streaming services, or buy items on online sales platforms. Agent device 100 may be implemented into various types of physical platforms such as a smart speaker, an appliance, or a vehicle. The users A and B may, e.g., interact with agent device 100 via voice as indicated in Fig. la, gestures, and/or text (e.g. by typing a text into via an input device of agent device 100 or sending a message to agent device 100).

Agent device 100 supports a first operation mode in which the agent device is configured to identify individual users (persons). In other words, agent device 100 performs user recogni tion in the first operation mode. User recognition may be performed within agent device 100, or agent device 100 may send user data to a remote server for performing the user recognition. For example, the user recognition may be based on audio data (e.g. voice recognition) and/or image data (e.g. face recognition) of the users. Agent device 100 may comprise one or more sensors (e.g. a microphone) to capture the audio data and/or one or more sensors (e.g. a cam era) to capture the image data. Generally, agent device 100 may forward user data such as voice commands to a remote server, which interprets the user data and forwards data to agent device 100 for outputting it to the user.

In the situation illustrated in Fig. la, agent device 100 operates in the first operation mode. That is, agent device identifies the users A and B it is interacting with. Using user recognition, agent device 100 may serve user A and/or user B at its best capacity. For example, user A may ask agent device 100 if he has any planned appointments. Since agent device 100 iden tifies user A, agent device 100 may search a calendar of user A for appointments.

Fig. lb illustrates another situation, in which a third user C is present in the vicinity of agent device 100. User C does not want to be recognized in order to protect his/her privacy. In order to enable privacy for a user, agent device 100 additionally supports a second operation mode in which the agent device is configured to not identify individual users (persons). In other words, agent device 100 does not distinguish between individual users in the second operation mode. That is, agent device 100 does not know about the identity of the user(s) it is interacting with or about the identity of users (persons) in the vicinity of agent device 100 in the second operation mode.

Agent device 100 comprises a receiver circuit 110 configured to receive, from an external device, a signal 101 indicating that a person in the vicinity of agent device 100 does not want to be identified. Further, agent device 100 comprises a control circuit 120 for adjusting an operation mode of agent device 100. Control circuit 120 is configured to set the operation mode of agent device 100 to the second operation mode in response to receiving the signal 101.

In order to indicate to agent device 100 that he/she does not want to be recognized, user C carries or wears a user device 140. User device 140 is configured to emit a signal indicating that the carrier of the user device 140 does not want to be identified. That is, signal 101 re- ceived by receiver circuit 110 is the signal emitted by user device 140. For example, the signal emitted by user device 140 may be a radio frequency signal or an ultrasonic signal.

Accordingly, when user C is present in the vicinity of agent device 100, the agent device enters the second operation mode as an incognito (anonymous) mode so that user C (and also the other users A and B) are no longer identifiable. For example, agent device 100 may disable (deactivate) one or more sensors (e.g. a camera or a microphone) used for user recognition while operating in the second operation mode. Alternatively, agent device 100 may fully or at least partly disable (deactivate) the user recognition functionality (i.e. user data is captured like in the first operation mode, but is not processed further for user recognition). As illus- trated in Fig. lb, user C can decide to become anonymous by wearing a physical device. User device 140 as an example for an external device may, e.g., be a mobile communication device (such as a smartphone, a tablet-computer, or a laptop) or a wearable (such as a smartwatch, a dongle, optical head-mounted display). Agent device 100 does not need to recognize a user in order to be able to decide that the user does not want to be identified. In other words, the signal 101 does not contain information about the identity of the person. Referring to the situation illustrated in Fig. lb, the signal emitted by user device 140 does not comprise infor mation about the identity of user C. Further, no physical interaction of user C with agent device 110 is needed. The signal of user device 140 may, e.g., be detected by receiver circuit 110 even before user C enters the room, in which agent device 100 is located. Accordingly, agent device 100 will never recognize (identify) user C.

In some examples, the signal may be provided in a different manner to receiver circuit 110 of agent device 100. For example, signal 101 may be received from an external server by receiver circuit 110. User C may, e.g., carry a smartphone with enabled personal tracking. If user C indicated in his/her user profile that he/she does not want to be identified and if the personal tracking data indicates that user C approaches agent device 100, the server may send the signal to agent device 100 in order to cause agent device to change to the second operation mode.

Control circuit 120 may be configured to keep agent device 100 in the second operation mode as long as signal 101 is received. Alternatively, control circuit 120 may periodically (i.e. at regular time intervals) check for the reception of signal 101 by receiver circuit 110 and, e.g., keep agent device 100 in the second operation mode for a predefined time period after signal 101 was received the last time. Accordingly, privacy of the person may be protected. For example, user device 140 may continuously or periodically emit the signal. On the other hand, if signal 101 is not received by receiver circuit 1 10, control circuit 120 may be further con figured to set the operation mode of agent device 100 to the first operation mode in order to provide best service to users. For example, when user C walks away from agent device 110, signal 101 received by receiver circuit 110 from user device 140 gets weaker with increasing distance between user C and agent device 100 until receiver circuit 110 cannot receive signal 101 anymore. Accordingly, as long as user C is in the vicinity of agent device 100 (e.g. within a predetermined distance to agent device 100), his/her privacy is protected.

When acting in the second operation mode, the functionality (e.g. service quality) of agent device 100 may be limited since agent device 100 does not identify the individual users it is interacting with. For example, agent device 100 cannot provide inform to one of user A, B, and C about planned appointments since agent device 100 does not know about the identity of users A, B, and C in the second operation mode. In order to inform users it is interacting with about the operation in the second operation mode, agent device 100 further comprises a notification circuit 130 configured to output a predefined notification, if agent device 100 operates in the second operation mode. As indicated in Fig. lb, the predefined notification may be a visual notification (e.g. predetermined color or a message is displayed) and/or an acoustic notification (e.g. a predetermined tone or melody is output). By means of notification circuit 130, agent device 100 may clearly indicate to people present that agent device 100 has entered the incognito mode.

In order to summarize the above aspects on operating an agent device according to the pro- posed technique, Fig. 2 illustrates a flowchart of a method 200 of operating an agent device for assisting one or more users. The agent device supports a first operation mode in which the agent device is configured to identify individual users. Further, the agent device supports a second operation mode in which the agent device is configured to not identify individual us- ers.

Method 200 comprises receiving 202, from an external device, a signal indicating that a per son in the vicinity of the agent device does not want to be identified. Additionally, method 200 comprises setting 204 an operation mode of the agent device to the second operation mode in response to receiving the signal.

Optionally, method 200 may further comprise outputting 206 a predefined notification if the agent device operates in the second operation mode.

Further, method 200 may comprise keeping 208 the agent device in the second operation mode as long as the signal is received. If the signal is not received, method 200 may comprise setting 210 the operation mode of the agent device to the first operation mode

More details and aspects of the method are mentioned in connection with the proposed tech nique or one or more examples described above (e.g. Fig. 1). The method may comprise one or more additional optional features corresponding to one or more aspects of the proposed technique or one or more examples described above.

The examples as described herein may be summarized as follows:

(1) An agent device for assisting one or more users. The agent device supports a first operation mode in which the agent device is configured to identify individual users. Further, the agent device supports a second operation mode in which the agent device is configured to not identify individual users. The agent device comprises a receiver circuit configured to re- ceive, from an external device, a signal indicating that a person in the vicinity of the agent device does not want to be identified. Additionally, the agent device comprises a control cir cuit configured to set an operation mode of the agent device to the second operation mode in response to receiving the signal.

(2) The agent device of (1), further comprising a notification circuit configured to output a predefined notification if the agent device operates in the second operation mode.

(3) The agent device of (2), wherein the predefined notification is a visual notification.

(4) The agent device of (2) or (3), wherein the predefined notification is an acoustic noti- fication.

(5) The agent device of any of (1) to (4), wherein the signal is free from information about the identity of the person.

(6) The agent device of any of (1) to (5), wherein the control circuit is further configured to keep the agent device in the second operation mode as long as the signal is received.

(7) The agent device of any of (1) to (6), wherein the control circuit is further configured to set the operation mode of the agent device to the first operation mode if the signal is not received.

(8) The agent device of any of (1) to (7), wherein the external device is one of a mobile communication device, a wearable, or a server.

(9) A system, comprising a user device configured to emit a signal indicating that the carrier of the user device does not want to be identified, and an agent device according to any of (1) to (8).

(10) A method of operating an agent device for assisting one or more users. The agent device supports a first operation mode in which the agent device is configured to identify individual users. Further, the agent device supports a second operation mode in which the agent device is configured to not identify individual users. The method comprises receiving, from an external device, a signal indicating that a person in the vicinity of the agent device does not want to be identified. Additionally, the method comprises setting an operation mode of the agent device to the second operation mode in response to receiving the signal.

(11) The method of (10), further comprising outputting a predefined notification if the agent device operates in the second operation mode.

(12) The method of (11), wherein the predefined notification is a visual notification.

(13) The method of (11) or (12), wherein the predefined notification is an acoustic notifi- cation.

(14) The method of any of (10) to (13), wherein the signal is free from information about the identity of the person.

(15) The method of any of (10) to (14), further comprising keeping the agent device in the second operation mode as long as the signal is received.

(16) The method of any of (10) to (15), further comprising setting the operation mode of the agent device to the first operation mode if the signal is not received.

(17) The method any of (10) to (16), wherein the external device is one of a mobile com munication device, a wearable, or a server.

The aspects and features mentioned and described together with one or more of the previously detailed examples and figures, may as well be combined with one or more of the other exam ples in order to replace a like feature of the other example or in order to additionally introduce the feature to the other example.

Examples may further be or relate to a computer program having a program code for perform ing one or more of the above methods, when the computer program is executed on a computer or processor. Steps, operations or processes of various above-described methods may be per formed by programmed computers or processors. Examples may also cover program storage devices such as digital data storage media, which are machine, processor or computer readable and encode machine-executable, processor-executable or computer-executable programs of instructions. The instructions perform or cause performing some or all of the acts of the above- described methods. The program storage devices may comprise or be, for instance, digital memories, magnetic storage media such as magnetic disks and magnetic tapes, hard drives, or optically readable digital data storage media. Further examples may also cover computers, processors or control units programmed to perform the acts of the above-described methods or (field) programmable logic arrays ((F)PLAs) or (field) programmable gate arrays ((F)PGAs), programmed to perform the acts of the above-described methods.

The description and drawings merely illustrate the principles of the disclosure. Furthermore, all examples recited herein are principally intended expressly to be only for pedagogical pur poses to aid the reader in understanding the principles of the disclosure and the concepts con tributed by the inventor(s) to furthering the art. All statements herein reciting principles, as pects, and examples of the disclosure, as well as specific examples thereof, are intended to encompass equivalents thereof.

Functions of various elements shown in the figures may be implemented in the form of dedi cated hardware, such as“a signal provider”,“a signal processing unit”,“a processor”,“a con troller”, etc. as well as hardware capable of executing software in association with appropriate software. When provided by a processor, the functions may be provided by a single dedicated processor, by a single shared processor, or by a plurality of individual processors, some of which or all of which may be shared. However, the term“processor” or“controller” is by far not limited to hardware exclusively capable of executing software, but may include digital signal processor (DSP) hardware, network processor, application specific integrated circuit (ASIC), field programmable gate array (FPGA), read only memory (ROM) for storing soft ware, random access memory (RAM), and non-volatile storage. Other hardware, conventional and/or custom, may also be included.

A block diagram may, for instance, illustrate a high-level circuit diagram implementing the principles of the disclosure. Similarly, a flow chart, a flow diagram, a state transition diagram, a pseudo code, and the like may represent various processes, operations or steps, which may, for instance, be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown. Meth ods disclosed in the specification or in the claims may be implemented by a device having means for performing each of the respective acts of these methods.

It is to be understood that the disclosure of multiple acts, processes, operations, steps or func- tions disclosed in the specification or claims may not be construed as to be within the specific order, unless explicitly or implicitly stated otherwise, for instance for technical reasons. Therefore, the disclosure of multiple acts or functions will not limit these to a particular order unless such acts or functions are not interchangeable for technical reasons. Furthermore, in some examples a single act, function, process, operation or step may include or may be broken into multiple sub-acts, -functions, -processes, -operations or -steps, respectively. Such sub acts may be included and part of the disclosure of this single act unless explicitly excluded. Furthermore, the following claims are hereby incorporated into the detailed description, where each claim may stand on its own as a separate example. While each claim may stand on its own as a separate example, it is to be noted that - although a dependent claim may refer in the claims to a specific combination with one or more other claims - other examples may also include a combination of the dependent claim with the subject matter of each other de- pendent or independent claim. Such combinations are explicitly proposed herein unless it is stated that a specific combination is not intended. Furthermore, it is intended to include also features of a claim to any other independent claim even if this claim is not directly made dependent to the independent claim.