Online Privacy Management
First Claim
1. A non-transitory computer-readable medium of a privacy management system server storing computer-executable instructions that, when executed by a processor of a remote computing device, cause the remote computing device to:
- access a Document Object Model (DOM) of a webpage, wherein the DOM is configured to include a first node that is configured to send analytics data to a third party device using a uniform resource locator stored in the first node and a second node that is configured to store private information;
in response to accessing the DOM, obtain the second node and create, in a memory, a wrapper object instead of the second node by calling a generic wrapper object function configured to create a wrapper object for at least two different node types;
configure the wrapper object to match the second node by setting values of the wrapper object according to values of the second node;
determine whether the wrapper object is to be configured to block the private information from being captured by the first node;
provide a getter function to the wrapper object, when it is determined that the wrapper object is to be configured to block the private information from being captured by the first node, the getter function being configured to analyze the private information before returning the private information; and
replace the second node with the wrapper object in the DOM.
9 Assignments
0 Petitions
Accused Products
Abstract
A privacy management system (PMS) is disclosed for a Chief Privacy Officer (CPO) or other user to use in monitoring and/or controlling in realtime the flow of data (e.g., outflow) about the user and his/her online experience. The PMS may employ pattern recognition software to evaluate analytics data and potentially block private information from being sent within the analytics data. The PMS may provide a dashboard displaying a whitelist and/or blacklist indicating what destinations/sources are blocked or allowed as well as private information settings indicating what types of private information should be blocked. The PMS includes browser-client scripting code and may also include a PMS-certified verification icon and/or lock and unlock icons for display on webpages being monitored/controlled in realtime by the PMS.
-
Citations
27 Claims
-
1. A non-transitory computer-readable medium of a privacy management system server storing computer-executable instructions that, when executed by a processor of a remote computing device, cause the remote computing device to:
-
access a Document Object Model (DOM) of a webpage, wherein the DOM is configured to include a first node that is configured to send analytics data to a third party device using a uniform resource locator stored in the first node and a second node that is configured to store private information; in response to accessing the DOM, obtain the second node and create, in a memory, a wrapper object instead of the second node by calling a generic wrapper object function configured to create a wrapper object for at least two different node types; configure the wrapper object to match the second node by setting values of the wrapper object according to values of the second node; determine whether the wrapper object is to be configured to block the private information from being captured by the first node; provide a getter function to the wrapper object, when it is determined that the wrapper object is to be configured to block the private information from being captured by the first node, the getter function being configured to analyze the private information before returning the private information; and replace the second node with the wrapper object in the DOM. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An apparatus, comprising:
-
at least one processor configured to transmit, over a network to a remote computing device, scripting code written in a programming language that lacks functionality to override certain functions; and memory storing the scripting code that, when executed by the remote computing device, causes the remote computing device to; access an object model of a page, wherein the object model is configured to include a first node that is configured to send analytics data to a third party device separate from the apparatus and the remote computing device, and a second node that is configured to store data; in response to accessing the object model, obtain the second node and create, in a memory, a wrapper object instead of the second node; configure the wrapper object to replicate the second node by setting data of the wrapper object according to the data of the second node; provide a getter function to the wrapper object, the getter function being configured to analyze the data before returning the data to a requesting node; and replace the second node with the wrapper object in the object model. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A non-transitory computer-readable medium of a privacy management system server storing computer-executable instructions that, when executed by a processor of a remote computing device, provide:
-
a means for accessing an object model of a page, wherein the object model comprises a plurality of nodes configured to store data; a means for obtaining one of the nodes among the plurality of nodes of the object model and creating a wrapper object instead of the obtained node; a means for configuring the wrapper object to replicate the obtained node by setting data of the wrapper object according to data of the obtained node; a means for providing a getter function to the wrapper object, the getter function being configured to analyze the data before returning the data to a requesting node; and a means for replacing the second node with the wrapper object in the object model. - View Dependent Claims (23, 24, 25, 26, 27)
-
Specification