PRIVACY MANAGEMENT FOR TRACKED DEVICES
First Claim
Patent Images
1. A method performed by a user computing device to enable a location of the user computing device to be monitored from a remote location, the method comprising:
- obtaining location data reflective of a current location of the user computing device;
determining, based upon the operation of a conditional data encryption rule, whether to encrypt the location data with a private key of a user of the user computing device;
when a determination is made to encrypt the location data with the private key, encrypting the location data with the private key to generate encrypted location data, and transmitting the location data on a network to a monitoring system; and
when a determination is made not to encrypt the location data with the private key, transmitting the location data on the network to a monitoring system without first encrypting the location data with the private key;
wherein the method is performed under the control of program code executed by the user computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
A device, method, system and computer readable medium for the protection of private data while permitting the monitoring or tracking of electronic devices that are shared for both business and private purposes.
-
Citations
15 Claims
-
1. A method performed by a user computing device to enable a location of the user computing device to be monitored from a remote location, the method comprising:
-
obtaining location data reflective of a current location of the user computing device; determining, based upon the operation of a conditional data encryption rule, whether to encrypt the location data with a private key of a user of the user computing device; when a determination is made to encrypt the location data with the private key, encrypting the location data with the private key to generate encrypted location data, and transmitting the location data on a network to a monitoring system; and when a determination is made not to encrypt the location data with the private key, transmitting the location data on the network to a monitoring system without first encrypting the location data with the private key; wherein the method is performed under the control of program code executed by the user computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer readable medium which stores program code that instructs a user computing device to perform a method that comprises:
-
obtaining location data reflective of a current location of the user computing device; determining, based upon the operation of a conditional data encryption rule, whether to encrypt the location data with a private key of a user of the user computing device; when a determination is made to encrypt the location data with the private key, encrypting the location data with the private key to generate encrypted location data, and transmitting the location data on a network to a monitoring system; and when a determination is made not to encrypt the location data with the private key, transmitting the location data on the network to a monitoring system without first encrypting the location data with the private key.
-
-
13. A system for the protection of private data while monitoring an electronic device, the system comprising:
-
a. remote memory; b. an electronic device comprising a processor, a memory in which resides data; and
a network interface;c. an encryption module installed in said electronic device; and d. a conditional encryption rule stored in said device; wherein said device is configured to; i. determine that the data is private data or non-private data; ii. encrypt private data; and iii. transmit non-private data and encrypted private data to the remote memory via the network interface. - View Dependent Claims (14, 15)
-
Specification