Method and apparatus for managing and enforcing user privacy
First Claim
1. A method of managing user privacy of a user operating a user device in a network environment, comprising:
- determining a context for interaction with a party;
filtering user data to be provided to the party based on the determined context; and
transmitting the filtered user data to the party.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method manages and enforces user privacy of user data in a network environment in various manners. The system and method can determine a context for interaction with a party, filter user data to be provided to the party based on the determined context, and transmit the filtered user data to the party. The system and method can further determine an anonymity level at which interaction with the party is to be conducted, and interact with the party at the determined anonymity level. Additionally, to enforce user privacy, a privacy enforcement system can be employed at the receiving party and a trusted supervising authority can be utilized to supervise the access of user data received by the receiving party as well as to provide third party certification.
-
Citations
49 Claims
-
1. A method of managing user privacy of a user operating a user device in a network environment, comprising:
-
determining a context for interaction with a party;
filtering user data to be provided to the party based on the determined context; and
transmitting the filtered user data to the party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 28, 30, 31, 32, 33, 34, 35, 36, 38, 39, 40, 41, 42, 43)
-
-
26. A method of managing user privacy of a user in a network environment, comprising:
-
determining a context for interaction with a party;
determining an anonymity level at which interaction with the party is to be conducted; and
interacting with the party at the determined anonymity level.
-
-
27. A method of managing user privacy of a user in a network environment, comprising:
-
establishing communications with a party;
authenticating whether the party is under supervision by a trusted supervising authority, the supervising authority supervising enforcement of access rights to user information received by the party; and
providing user data to the party if the party is authenticated as being under the supervision of the supervising authority.
-
-
29. A method of managing privacy of user data received from a wireless device of the user at a receiving party, comprising:
-
receiving personal assets including rights management rules from a wireless device of the user;
storing the personal assets in a storage facility; and
providing a privacy enforcement software layer between the application program interfaces of the receiving party and the stored personal assets to restrict access by the application program interfaces to the personal assets according to the rights management rules.
-
-
37. A method of employing a trusted third party in managing privacy over user data provided from a user device of a user to a receiving party, comprising:
-
maintaining personal assets including rights management rules from a wireless device of the user at the receiving party; and
employing a supervising authority, in communications with the receiving party, for supervising enforcement of the rights management rules over the stored personal assets.
-
-
44. A system for managing and enforcing privacy of data of a user in a network environment, comprising:
-
a user device, operated by a user, for interacting with and providing user data to one or more objects, the user data having rights management rules associated therewith defining access rights to the user data;
an object for interacting with the user device and receiving user data;
a supervising authority for supervising enforcement of the rights management rules over the received user data; and
a network environment to enable interaction between the user device, the object and the supervising authority. - View Dependent Claims (45)
-
-
46. A computer-readable medium encoded with processing instructions for implementing a method of managing user privacy of a user operating a user device in a network environment, performed by a computer, the method comprising:
-
determining a context for interaction with a party;
filtering user data to be provided to the party based on the determined context; and
transmitting the filtered user data to the party.
-
-
47. A computer-readable medium encoded with processing instructions for implementing a method of managing user privacy of a user in a network environment, performed by a computer, the method comprising:
-
determining a context for interaction with a party;
determining an anonymity level at which interaction with the party is to be conducted; and
interacting with the party at the determined anonymity level.
-
-
48. A computer-readable medium encoded with processing instructions for implementing a method of managing user privacy of a user in a network environment, performed by a computer, the method comprising:
-
establishing communications with a party;
authenticating whether the party is under supervision by a trusted supervising authority, the supervising authority supervising enforcement of access rights to user information received by the party; and
providing user data to the party if the party is authenticated as being under the supervision of the supervising authority.
-
-
49. A computer-readable medium encoded with processing instructions for implementing a method of managing privacy of user data received from a wireless device of the user at a receiving party, the method comprising:
-
receiving personal assets including rights management rules from a wireless device of the user;
storing the personal assets in a storage facility; and
providing a privacy enforcement software layer between the application program interfaces of the receiving party and the stored personal assets to restrict access by the application program interfaces to the personal assets according to the rights management rules.
-
Specification