INFORMATION PRIVACY SYSTEM AND METHOD
First Claim
1. An information privacy system, comprising:
- an environment monitoring component configured to monitor an aspect of an environment; and
a privacy component configured to;
determine whether one or more factors associated with the environment are triggered; and
at least one of obscure access or provide access to at least one of data, a program or a device associated with the one or more factors based on a determination that the one or more factors are triggered.
2 Assignments
0 Petitions
Accused Products
Abstract
The subject disclosure relates to systems and methods for providing privacy for information. In one non-limiting embodiment, a system includes an environment monitoring component configured to monitor an aspect of an environment; and a privacy component configured to: determine whether factors associated with the environment are triggered; and obscure access or provide access to data or a program associated with the factors based on determining that the factors are triggered. Factors can be based on the time and the location or network connectivity of a device associated with the system, the detected presence or absence of an authorized person other than the user logged into the device or the privacy state of the user logged into the device. Motion detectors, cameras, biometric sensors and other devices can be employed in the determination of whether to provide or obscure access to the information.
52 Citations
20 Claims
-
1. An information privacy system, comprising:
-
an environment monitoring component configured to monitor an aspect of an environment; and a privacy component configured to; determine whether one or more factors associated with the environment are triggered; and at least one of obscure access or provide access to at least one of data, a program or a device associated with the one or more factors based on a determination that the one or more factors are triggered. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of enhancing privacy, comprising:
executing on a computing device, instructions that, when executed, cause the computing device to perform operations, comprising; associating at least one of data, a program or a device with an availability of an authorized person, wherein the authorized person is other than a user logged into a computing device attempting to access the at least one of the data, the program or the device; determining that the authorized person is available; and providing access to or unlocking the data, the program or the device based on the determining that the authorized person is available. - View Dependent Claims (13, 14, 15, 16, 17)
-
18. A computer-readable storage medium storing computer-executable instructions that, in response to execution by a computing device, cause the computing device to perform operations comprising:
-
associating at least one of data, a program or a device with a privacy state of an authorized person, wherein the privacy state is indicated by whether others other than the authorized person are detected within a distance of the authorized person; determining the privacy state of the authorized person; at least one of obscuring or providing access to the data, the program or the device based on the privacy state of the authorized person. - View Dependent Claims (19, 20)
-
Specification