SYSTEMS AND METHODS FOR MANAGING PRIVACY SETTINGS OF SHARED CONTENT
First Claim
Patent Images
1. A method for managing privacy of shared content, the method comprising:
- receiving, by a computing device, content associated with an object;
receiving, by the computing device, privacy settings associated with the object associated with the received content;
based on the received privacy settings, obfuscating, by the computing device, at least a portion of the content associated with the object to generated obfuscated content; and
transmitting, by the computing device, the obfuscated content to a publishing server, wherein the publishing server publishes the obfuscated content to one or more third parties.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for managing privacy settings of shared content include receiving content associated with an object; receiving privacy settings associated with the object associated with the received content; based on the received privacy settings, obfuscating, at least a portion of the content associated with the object to generated obfuscated content; and transmitting the obfuscated content to a publishing server, wherein the publishing server publishes the obfuscated content to one or more third parties.
-
Citations
88 Claims
-
1. A method for managing privacy of shared content, the method comprising:
-
receiving, by a computing device, content associated with an object; receiving, by the computing device, privacy settings associated with the object associated with the received content; based on the received privacy settings, obfuscating, by the computing device, at least a portion of the content associated with the object to generated obfuscated content; and transmitting, by the computing device, the obfuscated content to a publishing server, wherein the publishing server publishes the obfuscated content to one or more third parties. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for managing privacy of shared content, the method comprising:
-
receiving, by a computing device, content associated with an object; receiving, by the computing device, an object identification that identifies the object associated with the received content; determining, by the computing device, privacy settings associated with the identified object based on database stored on the computing device; based on the determined privacy settings, obfuscating, by the computing device, at least a portion of the content associated with the object to generated obfuscated content; and transmitting, by the computing device, the obfuscated content to a publishing server, wherein the publishing server publishes the obfuscated content to one or more third parties. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A method for managing privacy of shared content, the method comprising:
-
receiving, by a computing device, content associated with an object; extracting, by the computing device, object features from the content, the object features being associated with the object of the content; identifying, by the computing device, the object of the content based on the extracted object features; determining, by the computing device, privacy settings associated with the identified object based on a database stored on the computing device; based on the determined privacy settings, obfuscating, by the computing device, at least a portion of the content associated with the object to generated obfuscated content; and transmitting, by the computing device, the obfuscated content to a publishing server, wherein the publishing server publishes the obfuscated content to one or more third parties. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A non-transitory computer readable medium having stored therein computer executable instructions for:
-
receiving content associated with an object; receiving privacy settings associated with the object associated with the received content; based on the received privacy settings, obfuscating at least a portion of the content associated with the object to generated obfuscated content; and transmitting the obfuscated content to a publishing server, wherein the publishing server publishes the obfuscated content to one or more third parties.
-
-
21. A non-transitory computer readable medium having stored therein computer executable instructions for:
-
receiving content associated with an object; receiving an object identification that identifies the object associated with the received content; determining privacy settings associated with the identified object based on database stored on the computing device; based on the determined privacy settings, obfuscating at least a portion of the content associated with the object to generated obfuscated content; and transmitting the obfuscated content to a publishing server, wherein the publishing server publishes the obfuscated content to one or more third parties.
-
-
22. A non-transitory computer readable medium having stored therein computer executable instructions for:
-
receiving content associated with an object; extracting object features from the content, the object features being associated with the object of the content; identifying the object of the content based on the extracted object features; determining privacy settings associated with the identified object based on a database stored on the computing device; based on the determined privacy settings, obfuscating at least a portion of the content associated with the object to generated obfuscated content; and transmitting the obfuscated content to a publishing server, wherein the publishing server publishes the obfuscated content to one or more third parties.
-
-
23. At least one computing device comprising storage and a processor configured to perform:
-
receiving content associated with an object; receiving privacy settings associated with the object associated with the received content; based on the received privacy settings, obfuscating at least a portion of the content associated with the object to generated obfuscated content; and transmitting the obfuscated content to a publishing server, wherein the publishing server publishes the obfuscated content to one or more third parties.
-
-
24. At least one computing device comprising storage and a processor configured to perform:
-
receiving content associated with an object; receiving an object identification that identifies the object associated with the received content; determining privacy settings associated with the identified object based on database stored on the computing device; based on the determined privacy settings, obfuscating at least a portion of the content associated with the object to generated obfuscated content; and transmitting the obfuscated content to a publishing server, wherein the publishing server publishes the obfuscated content to one or more third parties.
-
-
25. At least one computing device comprising storage and a processor configured to perform:
-
receiving content associated with an object; extracting object features from the content, the object features being associated with the object of the content; identifying the object of the content based on the extracted object features; determining privacy settings associated with the identified object based on a database stored on the computing device; based on the determined privacy settings, obfuscating at least a portion of the content associated with the object to generated obfuscated content; and transmitting the obfuscated content to a publishing server, wherein the publishing server publishes the obfuscated content to one or more third parties.
-
-
26. A method for managing privacy of shared content, the method comprising:
-
receiving, by a computing device, previously received content associated with an object; receiving, by the computing device, privacy settings associated with the object associated with the received content; based on the received privacy settings, obfuscating, by the computing device, at least a portion of the content associated with the object to generated obfuscated content; and publishing, by the computing device, the obfuscated content to one or more third parties. - View Dependent Claims (27, 28, 29, 30, 31)
-
-
32. A method for managing privacy of shared content, the method comprising:
-
receiving, by a computing device, previously received content associated with an object; receiving, by the computing device, an object identification identifying the object associated with the received content; determining, by the computing device, privacy settings associated with the identified object based on database stored on the computing device; based on the determined privacy settings, obfuscating, by the computing device, at least a portion of the content associated with the object to generated obfuscated content; and publishing, by the computing device, the obfuscated content to one or more third parties. - View Dependent Claims (33, 34, 35, 36, 37)
-
-
38. A method for managing privacy of shared content, the method comprising:
-
receiving, by a computing device, previously received content associated with an object; extracting, by the computing device, object features from the content, the object features being associated with the object of the content; identifying, by the computing device, the object of the content based on the extracted object features; determining, by the computing device, privacy settings associated with the identified object based on a database stored on the computing device; based on the determined privacy settings, obfuscating, by the computing device, at least a portion of the content associated with the object to generated obfuscated content; and publishing, by the computing device, the obfuscated content to one or more third parties. - View Dependent Claims (39, 40, 41, 42)
-
-
43. A non-transitory computer readable medium having stored therein computer executable instructions for:
-
receiving previously received content associated with an object; receiving privacy settings associated with the object associated with the received content; based on the received privacy settings, obfuscating at least a portion of the content associated with the object to generated obfuscated content; and publishing the obfuscated content to one or more third parties.
-
-
44. A non-transitory computer readable medium having stored therein computer executable instructions for:
-
receiving previously received content associated with an object; receiving an object identification identifying the object associated with the received content; determining privacy settings associated with the identified object based on a database; based on the determined privacy settings, obfuscating at least a portion of the content associated with the object to generated obfuscated content; and publishing the obfuscated content to one or more third parties.
-
-
45. A non-transitory computer readable medium having stored therein computer executable instructions for:
-
receiving previously received content associated with an object; extracting object features from the content, the object features being associated with the object of the content; identifying the object of the content based on the extracted object features; determining privacy settings associated with the identified object based on a database; based on the determined privacy settings, obfuscating at least a portion of the content associated with the object to generated obfuscated content; and publishing the obfuscated content to one or more third parties.
-
-
46. At least one computing device comprising storage and a processor configured to perform:
-
receiving previously received content associated with an object; receiving privacy settings associated with the object associated with the received content; based on the received privacy settings, obfuscating at least a portion of the content associated with the object to generated obfuscated content; and publishing the obfuscated content to one or more third parties.
-
-
47. At least one computing device comprising storage and a processor configured to perform:
-
receiving previously received content associated with an object; receiving an object identification identifying the object associated with the received content; determining privacy settings associated with the identified object based on database stored on the computing device; based on the determined privacy settings, obfuscating at least a portion of the content associated with the object to generated obfuscated content; and publishing the obfuscated content to one or more third parties.
-
-
48. At least one computing device comprising storage and a processor configured to perform:
-
receiving previously received content associated with an object; extracting object features from the content, the object features being associated with the object of the content; identifying the object of the content based on the extracted object features; determining privacy settings associated with the identified object based on a database; based on the determined privacy settings, obfuscating at least a portion of the content associated with the object to generated obfuscated content; and publishing the obfuscated content to one or more third parties.
-
-
49. A method for distributing received content, the method comprising:
-
receiving, by a computing device, received content associated with an object; partitioning, by the computing device, the received content into a plurality of layers, the plurality of layers having two or more levels of fidelity; generating, by a computing device, an encryption key; encrypting, by a computing device, at least one of the plurality of layers using the generated encryption key; combining, by a computing device, the encrypted at least one plurality of layers with a remainder of the plurality of layers to generate the obfuscated content; and transmitting, by the computing device, the obfuscated content to a publishing server for publishing to one or more third parties. - View Dependent Claims (50, 51, 52)
-
-
53. A method for distributing received content, the method comprising:
-
receiving, by a computing device, received content associated with an object; partitioning, by the computing device, the received content into a plurality of layers, the plurality of layers having two or more levels of fidelity; generating, by a computing device, an encryption key; encrypting, by a computing device, at least one of the plurality of layers using the generated encryption key; combining, by a computing device, the encrypted at least one plurality of layers with a remainder of the plurality of layers to generate the obfuscated content; and publishing, by the computing device, the obfuscated content to one or more third parties. - View Dependent Claims (54, 55, 56)
-
-
57. A non-transitory computer readable medium having stored therein computer executable instructions for:
-
receiving received content associated with an object; partitioning the received content into a plurality of layers, the plurality of layers having two or more levels of fidelity; generating an encryption key; encrypting at least one of the plurality of layers using the generated encryption key; combining the encrypted at least one plurality of layers with a remainder of the plurality of layers to generate the obfuscated content; and transmitting the obfuscated content to a publishing server for publishing to one or more third parties. - View Dependent Claims (58, 59, 60)
-
-
61. A non-transitory computer readable medium having stored therein computer executable instructions for:
-
receiving received content associated with an object; partitioning the received content into a plurality of layers, the plurality of layers having two or more levels of fidelity; generating an encryption key; encrypting at least one of the plurality of layers using the generated encryption key; combining the encrypted at least one plurality of layers with a remainder of the plurality of layers to generate the obfuscated content; and publishing the obfuscated content to one or more third parties. - View Dependent Claims (62, 63, 64)
-
-
65. At least one computing device comprising storage and a processor configured to perform:
-
receiving received content associated with an object; partitioning the received content into a plurality of layers, the plurality of layers having two or more levels of fidelity; generating an encryption key; encrypting at least one of the plurality of layers using the generated encryption key; combining the encrypted at least one plurality of layers with a remainder of the plurality of layers to generate the obfuscated content; and transmitting the obfuscated content to a publishing server for publishing to one or more third parties. - View Dependent Claims (66, 67, 68)
-
-
69. At least one computing device comprising storage and a processor configured to perform:
-
receiving received content associated with an object; partitioning the received content into a plurality of layers, the plurality of layers having two or more levels of fidelity; generating an encryption key; encrypting at least one of the plurality of layers using the generated encryption key; combining the encrypted at least one plurality of layers with a remainder of the plurality of layers to generate the obfuscated content; and publishing the obfuscated content to one or more third parties. - View Dependent Claims (70, 71, 72)
-
-
73. A system for managing privacy of shared content, the system comprising:
-
a terminal device, the terminal device comprising; a content receiving device configured to receive content; a storage configured to store content by the content receiving device; a privacy setting determiner configured to determine privacy settings associated with an object of the received content that is associated with a user of an online account that is not associated with the terminal device; a content obfuscator configured to obfuscate at least a portion of the received content based on the privacy settings of the object associated with the received content to generate obfuscated content; and a transmitter configured to transmit the obfuscated content; and a server device, the server device comprising; a receiver configured to receive the obfuscated content from the transmitter of the terminal device; a publisher configured to publish the obfuscated content to one or more third parties, wherein the receiver is configured to receive a request to change privacy settings of the object of the received content; and a de-obfuscator configured to, based on the received request to change privacy settings, de-obfuscate the at least a portion of the received content to generate de-obfuscated content, wherein the publisher is configured to publish the de-obfuscated content to one or more third parties based on the received request to change privacy settings. - View Dependent Claims (74, 75, 76, 77, 78, 79, 80)
-
-
81. A system for managing privacy of shared content, the system comprising:
-
a terminal device, the terminal device comprising; a content receiver configured to receive content; a storage configure to store received content; and a transmitter configured to transmit the received content; and a server, comprising; a receiver configured to receive the received content transmitted from the transmitter of the terminal device; a privacy setting determiner configured to determine privacy settings of an object of the received content; a content obfuscator configured to obfuscate at least a portion of the received content based on the privacy settings of the object of the received content to generate obfuscated content; a publisher configured to publish the obfuscated content to one or more third parties, wherein the receiver is configured to receive a request to change privacy settings of the object of the received content; and a de-obfuscator configured to, based on the received request to change privacy settings, de-obfuscate the at least a portion of the received content to generate de-obfuscated content, wherein the publisher is configured to, based on the received request to change privacy settings, publish the de-obfuscated content to one or more third parties. - View Dependent Claims (82, 83, 84, 85, 86, 87, 88)
-
Specification