METHOD AND APPARATUS FOR PRIVACY-ORIENTED CODE OPTIMIZATION
First Claim
1. A method facilitating a processing of and/or processing (1) data and/or (2) information and/or (3) at least one signal, the (1) data and/or (2) information and/or (3) at least one signal based, at least in part, on the following:
- a processing of one or more code segments, one or more execution logs associated with the one or more code segments, or a combination thereof to determine at least one privacy intrusion signature associated with the one or more code segments; and
at least one determination of one or more recommendations for one or more alternate code segments based, at least in part, on the at least one privacy intrusion signature.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and apparatuses are provided for automatically optimizing application program code for minimized access to privacy data. A privacy-oriented code optimizing module process and/or facilitate a processing one or more code segments, one or more execution logs associated with the one or more code segments, or a combination thereof to determine at least one privacy intrusion signature associated with the one or more code segments. Further, the privacy-oriented code optimizing module determines one or more recommendations for one or more alternate code segments based, at least in part, on the at least one privacy intrusion signature.
-
Citations
21 Claims
-
1. A method facilitating a processing of and/or processing (1) data and/or (2) information and/or (3) at least one signal, the (1) data and/or (2) information and/or (3) at least one signal based, at least in part, on the following:
-
a processing of one or more code segments, one or more execution logs associated with the one or more code segments, or a combination thereof to determine at least one privacy intrusion signature associated with the one or more code segments; and at least one determination of one or more recommendations for one or more alternate code segments based, at least in part, on the at least one privacy intrusion signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, process and/or facilitate a processing of one or more code segments, one or more execution logs associated with the one or more code segments, or a combination thereof to determine at least one privacy intrusion signature associated with the one or more code segments; and determine one or more recommendations for one or more alternate code segments based, at least in part, on the at least one privacy intrusion signature. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21-48. -48. (canceled)
Specification