×

Privacy management for tracked devices

  • US 8,625,799 B2
  • Filed: 07/17/2009
  • Issued: 01/07/2014
  • Est. Priority Date: 07/18/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by a user computing device to enable a location of the user computing device to be monitored from a remote location, the method comprising:

  • receiving over a network, from a monitoring system, a conditional data encryption rule that specifies criteria for the user computing device to determine whether to encrypt at least device location data with a private key of a user of the device before transmitting the device location data to the monitoring system, said device location data representing a location of the user computing device, said criteria including time-based criteria corresponding to an employment work schedule of the user;

    storing the conditional data encryption rule in a memory of the user computing device;

    repeatedly reporting a location of the user computing device to the monitoring system according to the conditional data encryption rule such that said location is reported during both employment work hours and non-work hours of the user, wherein repeatedly reporting the location comprises;

    obtaining location data reflective of a location of the user computing device;

    determining, based at least partly on whether the location data was obtained during employment work hours associated with the user, as determined using the conditional data encryption rule, whether to encrypt the location data with the private key;

    when a determination is made to encrypt the location data with the private key, encrypting the location data with the private key to generate encrypted location data, and transmitting the encrypted location data on a network to the monitoring system; and

    when a determination is made not to encrypt the location data with the private key, transmitting the location data on the network to the monitoring system without first encrypting the location data with the private key;

    wherein the method is performed under the control of program code executed by the user computing device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×