System and Method for Protecting User Privacy Using Social Inference Protection Techniques
First Claim
Patent Images
1. A system for protecting individual privacy in a computer network, comprising:
- first means for modeling a context associated with an individual user and storing the modeled context in a data store;
second means for calculating an information entropy level associated with a user and storing the calculated information entropy level in the data store;
third means for calculating a privacy threshold associated with a user and storing the calculated privacy threshold in the data store; and
fourth means for executing at least one privacy protection action based upon the modeled context, the calculated information entropy level, and the calculated privacy threshold.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for protecting user privacy using social inference protection techniques is provided. The system executes a plurality of software modules which model of background knowledge associated with one or more users of the mobile computing devices; estimate information entropy of a user attribute which could include identity, location, profile information, etc.; utilize the information entropy models to predict the social inference risk; and minimize privacy risks by taking a protective action after detecting a high risk.
139 Citations
26 Claims
-
1. A system for protecting individual privacy in a computer network, comprising:
-
first means for modeling a context associated with an individual user and storing the modeled context in a data store; second means for calculating an information entropy level associated with a user and storing the calculated information entropy level in the data store; third means for calculating a privacy threshold associated with a user and storing the calculated privacy threshold in the data store; and fourth means for executing at least one privacy protection action based upon the modeled context, the calculated information entropy level, and the calculated privacy threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for protecting individual privacy in a computer network, comprising the steps of:
-
providing a computing device in communication with a network; modeling a context associated with a user of the at least one computing device and storing the modeled context in a data store; calculating an information entropy level associated with the user using the computing device; storing the calculated information entropy level in a data store of the computing device; calculating a privacy threshold associated with the user using the computing device; storing the calculated privacy threshold in the data store of the computing device; and implementing at least one privacy protection action based upon the modeled context, the calculated information entropy level, and the calculated privacy threshold. - View Dependent Claims (19, 20, 22, 23, 24, 25, 26)
-
-
21. The method of claim 21, wherein the step of modeling the context comprises modeling vicinity information about the user'"'"'s vicinity including at least one of names of nearby persons, profiles of nearby persons, and information about nearby locations.
Specification