INFORMATION PRIVACY SYSTEM AND METHOD
First Claim
1. An information privacy system, comprising:
- an environment monitoring component configured to monitor an aspect of an environment of a computing device; and
a privacy component configured to;
receive information from the environment monitoring component about the aspect of the monitored environment;
based on the information about the monitored environment, determine whether one or more factors associated with the environment are triggered; and
in response to determining that at least one of the one or more factors associated with the environment are triggered, hide a device or firmware of the computing device from a list of the computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
The subject disclosure relates to systems and methods for providing privacy for information. In one non-limiting embodiment, a system includes an environment monitoring component configured to monitor an aspect of an environment; and a privacy component configured to: determine whether factors associated with the environment are triggered; and obscure access or provide access to data or a program associated with the factors based on determining that the factors are triggered. Factors can be based on the time and the location or network connectivity of a device associated with the system, the detected presence or absence of an authorized person other than the user logged into the device or the privacy state of the user logged into the device. Motion detectors, cameras, biometric sensors and other devices can be employed in the determination of whether to provide or obscure access to the information.
9 Citations
20 Claims
-
1. An information privacy system, comprising:
-
an environment monitoring component configured to monitor an aspect of an environment of a computing device; and a privacy component configured to; receive information from the environment monitoring component about the aspect of the monitored environment; based on the information about the monitored environment, determine whether one or more factors associated with the environment are triggered; and in response to determining that at least one of the one or more factors associated with the environment are triggered, hide a device or firmware of the computing device from a list of the computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An information privacy system, comprising:
-
an environment monitoring component configured to detect an emergency event in an environment that includes a computing device; and a privacy component configured to move data stored in the computing device to a location outside of the computing device responsive to a detection of the emergency event. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. An information privacy system, comprising:
-
an environment monitoring component configured to monitor a presence of one or more parties with respect to a computing device in an environment; and a privacy component configured to; determine an authorization status for at least one of the one or more parties based on the presence; and move data stored in the computing device to a location that is outside the computing device, to which the computing device does not have access, based on the authorization status. - View Dependent Claims (17, 18, 19, 20)
-
Specification