SYSTEM AND METHOD TO DETECT ONLINE PRIVACY VIOLATION
First Claim
1. A method to detect online privacy violation, the method comprising steps of:
- embedding a tracker into a web browser to open at least one data consumer website or at least one third party website, wherein a user submits at least one data value into their corresponding data field in a data consumer website;
generating one or more profile using the tracker, wherein the profile assists the user to select one or more data fields as per the user preferences;
capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker;
storing the profile and the plurality of browsing history into at least one database through the tracker;
triggering of the tracker for detecting online privacy violation in a third party website; and
submitting at least one data field by the user into at least one input field as provided through the tracker to detect online privacy violation for the submitted data field;
wherein triggering of at least one processor using the tracker to compare the submitted data field with the data field as stored in the database and matching of the stored data field with its corresponding browsing history to indicate one or more websites with their related timestamps that have assisted in violating privacy of the user by leaking the submitted data field to the third party website.
1 Assignment
0 Petitions
Accused Products
Abstract
The present invention relates to a method to detect online privacy violation. The method comprising steps of embedding a tracker into a web browser to open at least one data consumer website or at least one third party website wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more privacy profile using the tracker wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database; triggering of the tracker for detecting online privacy violation in a third party website and submitting at least one data field into at least one input field to detect online privacy violation for the submitted data field.
-
Citations
17 Claims
-
1. A method to detect online privacy violation, the method comprising steps of:
-
embedding a tracker into a web browser to open at least one data consumer website or at least one third party website, wherein a user submits at least one data value into their corresponding data field in a data consumer website; generating one or more profile using the tracker, wherein the profile assists the user to select one or more data fields as per the user preferences; capturing the user selected one or more data fields and their corresponding plurality of browsing history using the tracker; storing the profile and the plurality of browsing history into at least one database through the tracker; triggering of the tracker for detecting online privacy violation in a third party website; and submitting at least one data field by the user into at least one input field as provided through the tracker to detect online privacy violation for the submitted data field; wherein triggering of at least one processor using the tracker to compare the submitted data field with the data field as stored in the database and matching of the stored data field with its corresponding browsing history to indicate one or more websites with their related timestamps that have assisted in violating privacy of the user by leaking the submitted data field to the third party website. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A system to detect online privacy violation, the system comprising:
-
a browser to open at least one data consumer website or at least one third party website, wherein in the consumer data website the user submits at least one data value into their corresponding data field; a tracker embedded into a browser, the tracker assists to generate one or more profiles for the user, the profile enables user to select one or more data fields as established on user preferences;
wherein the tracker captures the user selected data field and their corresponding plurality of browsing history; anda privacy system operatively connected with the tracker, the privacy system comprises at least one processor and at least one database;
wherein the database stores the profile and the plurality of browsing history;wherein the tracker is triggered through the user for detecting online privacy violation in a third party website, wherein the tracker enables the user to submit at least one data field into at least one input field as provided through the tracker to detect online privacy violation for the submitted data field; wherein the processor being triggered by the tracker to compare the submitted data field with the stored data field in the database and matching of the stored data field with its corresponding browsing history to indicate one or more websites with their related timestamps that have assisted in violating privacy of the user by leaking the submitted data field to the third party. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
Specification