INTELLIGENT AGENT FOR PRIVACY AND SECURITY
First Claim
Patent Images
1. An apparatus comprising:
- at least one processor; and
at least one memory including computer program code that, when executed by the at least one processor, directs the apparatus to;
monitor requests for information associated with a user of a mobile device;
intercept at least one request, which is sent from a source, for information from the requests for information;
review a profile, which is associated with the source, established for access to the information by the at least one request; and
provide at least one response to the request, wherein the at least one response is compliant with at least one rule established to control content of the at least one response.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method are provided for use with a mobile device. The system is configurable to detect unauthorized access to onboard sensors or information developed by the sensors or configured by the user. Upon detection, access may be denied or limited according to pre-set rules or user intervention. The rules may consider prior access attempts, time-of-day or current location in the denial or limitation of access. Access limitation can include limiting access to only dithered data or spoofed data in accordance to the rules or user instructions.
26 Citations
20 Claims
-
1. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code that, when executed by the at least one processor, directs the apparatus to; monitor requests for information associated with a user of a mobile device; intercept at least one request, which is sent from a source, for information from the requests for information; review a profile, which is associated with the source, established for access to the information by the at least one request; and provide at least one response to the request, wherein the at least one response is compliant with at least one rule established to control content of the at least one response. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer program product comprising at least one computer-readable non-transitory storage medium including computer-readable program code portions stored therein, the computer-readable program code portions comprising:
-
a first executable portion for monitoring a database that includes at least one profile associated with a requestor, wherein the profile defines a level of access for the requestor to information on a device; a second executable portion for intercepting a request from the requestor for the information; and a third executable portion for modifying the level of access based on a rule that is related to the profile and thereby provide a response to the request based on the rules. - View Dependent Claims (12, 13, 14)
-
-
15. A mobile device comprising:
-
a processor; a memory accessible by the processor for storing code and information; a communication module controlled by the processor for communicate with a network; a display electrically connected to the processor for allowing user input; and at least one sensor in electrical communication with the processor for collecting the information, wherein instructions are executed by the processor to cause the mobile device to limit access to the information through at least one rule and at least one profile, and wherein an access attempt and a response to an access attempt are logged. - View Dependent Claims (16, 17, 18)
-
-
19. A method comprising the steps of:
-
intercepting a request; determining a source of the request; reading from memory a profile associated with the source, wherein the profile grants a level of access that the source has to information available at a device, which information can be provided in a response to the request; applying a rule associated with the profile to determine if the access level granted by the profile should be modified; adapting the access level granted by the profile to the source; and formatting the response, wherein the response is compliant with the rule. - View Dependent Claims (20)
-
Specification