US 11,790,109 B2
Privacy control operation modes
Dikla Dotan-Cohen, Herzliya (IL); Haim Somech, Herzliya (IL); Hadas Bitran, Ramat Hasharon (IL); and Ido Priness, Herzilya (IL)
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC, Redmond, WA (US)
Filed by MICROSOFT TECHNOLOGY LICENSING, LLC, Redmond, WA (US)
Filed on Jan. 4, 2021, as Appl. No. 17/141,103.
Application 17/141,103 is a continuation of application No. 15/431,432, filed on Feb. 13, 2017, granted, now 10,885,219.
Prior Publication US 2021/0124840 A1, Apr. 29, 2021
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 21/62 (2013.01); H04W 12/033 (2021.01); G06F 21/60 (2013.01); G06F 21/53 (2013.01)
CPC G06F 21/6245 (2013.01) [H04W 12/033 (2021.01); G06F 21/53 (2013.01); G06F 21/60 (2013.01); G06F 2221/2111 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for controlling user privacy by providing an in-private mode (IPM) of operation on a user device having a sensor, the method comprising:
determining a configuration for a quarantine, the quarantine comprising a virtual machine associated with a portion of computing-system resources including computer memory on the user device, the computer memory configured for storing data contents including user-activity data generated during the IPM of operation, wherein memory locations of data contents stored in the computer memory are not accessible to at least one other operating environment of the computing device;
generating on the user device the quarantine according to the determined configuration;
installing in the quarantine a set of applications;
modifying, according to a set of user settings, sensor data provided to the quarantine from the sensor such that the user-activity data and first location information corresponding to the sensor data is obscured and usable by the set of application to perform operations, where modifying the first location information includes changing the first location information to second location information;
determining to end the IPM of operation on the user device; and
deleting the virtual machine including the data contents of the computer memory configured for storing user-activity data generated during the IPM of operation, thereby removing the quarantine from the user device.