Method and apparatus for controlling the transfer of private information in a communication system
First Claim
1. A method for selectively transferring private information to a user of a communication device, comprising:
- detecting an occurrence of a trigger event at a first mobile terminal;
retrieving or forming a data object at the first mobile terminal, in response to the trigger event;
determining whether the data object that was retrieved or formed in response to the trigger event includes private information;
determining whether a user of the first mobile terminal has consented to transfer of the data object, if the data object includes private information;
sending the data object from the first mobile terminal to a second mobile terminal, responsive to the trigger event, if the user of the first mobile terminal has consented or if the data object does not include private information.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for selectively transferring confidential or private information to a user of a communication device are disclosed. In an exemplary method, a trigger event is detected at a first communication device, resulting in the retrieval of a data object for transmission to a second communication device. If the data object includes private or confidential information, consent of a user of the first communication device is required before the data object may be sent to the second communication device. In some embodiments, consent is obtained by explicitly requesting consent from a user. In others, consent may be deemed under pre-determined circumstances.
23 Citations
15 Claims
-
1. A method for selectively transferring private information to a user of a communication device, comprising:
-
detecting an occurrence of a trigger event at a first mobile terminal; retrieving or forming a data object at the first mobile terminal, in response to the trigger event; determining whether the data object that was retrieved or formed in response to the trigger event includes private information; determining whether a user of the first mobile terminal has consented to transfer of the data object, if the data object includes private information; sending the data object from the first mobile terminal to a second mobile terminal, responsive to the trigger event, if the user of the first mobile terminal has consented or if the data object does not include private information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A first mobile terminal configured for communication with a second mobile terminal, wherein the first mobile terminal comprises processing logic configured to:
-
detect an occurrence of a trigger event at the first mobile terminal; retrieve or form a data object in response to the trigger event; determine whether the data object includes private information; determine whether a user of the first mobile terminal has consented to transfer of the data object, if the data object includes private information; send the data object to the second mobile terminal, responsive to the trigger event, if the user of the first mobile terminal has consented or if the data object does not include private information. - View Dependent Claims (11, 12, 13, 14, 15)
-
Specification