Monitoring and Managing User Privacy Levels
First Claim
1. A computer system comprising:
- at least one processor; and
memory comprising instructions stored thereon that when executed by at least one processor cause at least one processor to perform acts for protecting privacy in computer data transmissions in the computer system, with the acts comprising;
monitoring, via the computer system, computer data traffic between one or more executable computer modules running on a client computer device, and one or more server computer devices with which the one or more executable computer modules is communicating over a computer network;
detecting, via the computer system, a privacy risk based on the monitoring of the data traffic; and
in response to the detecting of the privacy risk, engaging, via the computer system, a privacy mode for the one or more executable modules, with the engaging of the privacy mode modifying at least one of the following;
a behavior of the one or more executable modules, and a configuration of the one or more executable modules.
2 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments pertain to techniques for measuring a user'"'"'s privacy level as a user interacts with various web services. In various embodiments, entities with which the user interacts are detected and sensitive information shared by the user is logged to determine what a given entity knows about the user. In some embodiments, sensitive information that is shared by a user can be processed using a predictive algorithm to ascertain a user'"'"'s level of privacy. When a user'"'"'s identity is predicted by the algorithm, a user can be alerted to the loss of anonymity. In various embodiments, user-defined areas of anonymity can be used to measure a user'"'"'s definition of privacy. In some embodiments, alerts can also be provided to the user when a new, previously undisclosed, piece of information is shared by the user.
104 Citations
20 Claims
-
1. A computer system comprising:
-
at least one processor; and memory comprising instructions stored thereon that when executed by at least one processor cause at least one processor to perform acts for protecting privacy in computer data transmissions in the computer system, with the acts comprising; monitoring, via the computer system, computer data traffic between one or more executable computer modules running on a client computer device, and one or more server computer devices with which the one or more executable computer modules is communicating over a computer network; detecting, via the computer system, a privacy risk based on the monitoring of the data traffic; and in response to the detecting of the privacy risk, engaging, via the computer system, a privacy mode for the one or more executable modules, with the engaging of the privacy mode modifying at least one of the following;
a behavior of the one or more executable modules, and a configuration of the one or more executable modules. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method of protecting privacy in computer data transmissions in a computer system, the method comprising:
-
monitoring, via a computer system, computer data traffic between one or more executable computer modules running on a client computer device, and one or more server computer devices with which the one or more executable computer modules is communicating over a computer network; detecting, via the computer system, a privacy risk based on the monitoring of the data traffic; and in response to the detecting of the privacy risk, engaging, via the computer system, a privacy mode for the one or more executable modules, with the engaging of the privacy mode modifying at least one of the following;
a behavior of the one or more executable modules, and a configuration of the one or more executable modules. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer system comprising:
-
at least one processor; and memory comprising instructions stored thereon that when executed by at least one processor cause at least one processor to perform acts for protecting privacy in computer data transmissions in the computer system, with the acts comprising; monitoring, via a computer system, computer data traffic between one or more executable computer modules running on a client computer device, and one or more server computer devices with which the one or more executable computer modules is communicating over a computer network; detecting, via the computer system, an entity with which the one or more executable computer modules is communicating, based on the monitoring of the data traffic; and in response to the detecting of the entity, engaging, via the computer system, a privacy mode for the one or more executable modules, with the engaging of the privacy mode modifying a behavior of the one or more executable modules. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification