SYSTEM, METHOD AND APPARATUS FOR FINE-GRAINED PRIVACY SPECIFICATION AND VERIFICATION
First Claim
1. A method performed by at least one hardware processor, comprising:
- presenting a user interface via a display of a computing device, the user interface including at least one element that is activatable by a user to set a privacy policy, the privacy policy specifying a maximum amount of confidential data that is authorized to be leaked to a sink;
receiving from the user via the user interface an activation of the at least one element to set the privacy policy, the activation specifying the maximum amount of confidential data that is authorized to be leaked to the sink;
tracking movement of confidential data through an application;
determining based on the tracked movement of the confidential data that the confidential data is leaked to the sink by the application;
comparing the confidential data that is leaked to the sink to the specified maximum amount of confidential data that is authorized to be leaked to the sink; and
presenting to the user via the user interface an indication of whether the application complies with the privacy policy set by the user based on the comparison.
1 Assignment
0 Petitions
Accused Products
Abstract
A method includes receiving from a user via a user interface an activation of at least one element to set a privacy policy specifying the maximum amount of confidential data that is authorized to be leaked to a sink, tracking movement of confidential data through an application, determining based on the tracked movement of the confidential data that the confidential data is leaked to the sink by the application, comparing the confidential data that is leaked to the sink to the specified maximum amount of confidential data that is authorized to be leaked to the sink, and presenting to the user via the user interface an indication of whether the application complies with the privacy policy set by the user based on the comparison.
-
Citations
20 Claims
-
1. A method performed by at least one hardware processor, comprising:
-
presenting a user interface via a display of a computing device, the user interface including at least one element that is activatable by a user to set a privacy policy, the privacy policy specifying a maximum amount of confidential data that is authorized to be leaked to a sink; receiving from the user via the user interface an activation of the at least one element to set the privacy policy, the activation specifying the maximum amount of confidential data that is authorized to be leaked to the sink; tracking movement of confidential data through an application; determining based on the tracked movement of the confidential data that the confidential data is leaked to the sink by the application; comparing the confidential data that is leaked to the sink to the specified maximum amount of confidential data that is authorized to be leaked to the sink; and presenting to the user via the user interface an indication of whether the application complies with the privacy policy set by the user based on the comparison. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
at least one processor comprising hardware; and a display coupled to the at least one processor, the at least one processor configured to; present a user interface via the display, the user interface including at least one element that is activatable by a user to set a privacy policy, the privacy policy specifying a maximum amount of confidential data that is authorized to be leaked to a sink; receive from the user via the user interface an activation of the at least one element to set the privacy policy, the activation specifying the maximum amount of confidential data that is authorized to be leaked to the sink; track movement of confidential data through an application; determine based on the tracked movement of the confidential data that the confidential data is leaked to the sink by the application; compare the confidential data that is leaked to the sink to the specified maximum amount of confidential data that is authorized to be leaked to the sink; and present to the user via the user interface an indication of whether the application complies with the privacy policy set by the user based on the comparison. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium storing instructions that, when executed by at least one processor, configure the at least one processor to:
-
present a user interface via a display of a computing device, the user interface including at least one element that is activatable by a user to set a privacy policy, the privacy policy specifying a maximum amount of confidential data that is authorized to be leaked to a sink; receive from the user via the user interface an activation of the at least one element to set the privacy policy, the activation specifying the maximum amount of confidential data that is authorized to be leaked to the sink; track movement of confidential data through an application; determine based on the tracked movement of the confidential data that the confidential data is leaked to the sink by the application; compare the confidential data that is leaked to the sink to the specified maximum amount of confidential data that is authorized to be leaked to the sink; and present to the user via the user interface an indication of whether the application complies with the privacy policy set by the user based on the comparison. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification