Privacy management for tracked devices
First Claim
1. A method performed by a user computing device to enable a location of the user computing device to be monitored from a remote location, the method comprising:
- receiving over a network, from a monitoring system, a conditional data encryption rule that specifies criteria for the user computing device to determine whether to encrypt at least device location data with a private key of a user of the device before transmitting the device location data to the monitoring system, said device location data representing a location of the user computing device, said criteria including time-based criteria corresponding to an employment work schedule of the user;
storing the conditional data encryption rule in a memory of the user computing device;
repeatedly reporting a location of the user computing device to the monitoring system according to the conditional data encryption rule such that said location is reported during both employment work hours and non-work hours of the user, wherein repeatedly reporting the location comprises;
obtaining location data reflective of a location of the user computing device;
determining, based at least partly on whether the location data was obtained during employment work hours associated with the user, as determined using the conditional data encryption rule, whether to encrypt the location data with the private key;
when a determination is made to encrypt the location data with the private key, encrypting the location data with the private key to generate encrypted location data, and transmitting the encrypted location data on a network to the monitoring system; and
when a determination is made not to encrypt the location data with the private key, transmitting the location data on the network to the monitoring system without first encrypting the location data with the private key;
wherein the method is performed under the control of program code executed by the user computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
A system is disclosed that protects private data of users while permitting the monitoring or tracking of electronic devices that are shared for both business and private purposes. The electronic devices are configured to selectively encrypt location data, and/or other types of data, before such data is transmitted to a monitoring center. For example, data collected or generated on a user device outside of work hours may be encrypted with a private key of the device'"'"'s user prior to transmission to the monitoring center, so that the data is not accessible to the employer. Data collected or generated during work hours may be transmitted without such encryption.
24 Citations
19 Claims
-
1. A method performed by a user computing device to enable a location of the user computing device to be monitored from a remote location, the method comprising:
-
receiving over a network, from a monitoring system, a conditional data encryption rule that specifies criteria for the user computing device to determine whether to encrypt at least device location data with a private key of a user of the device before transmitting the device location data to the monitoring system, said device location data representing a location of the user computing device, said criteria including time-based criteria corresponding to an employment work schedule of the user; storing the conditional data encryption rule in a memory of the user computing device; repeatedly reporting a location of the user computing device to the monitoring system according to the conditional data encryption rule such that said location is reported during both employment work hours and non-work hours of the user, wherein repeatedly reporting the location comprises; obtaining location data reflective of a location of the user computing device; determining, based at least partly on whether the location data was obtained during employment work hours associated with the user, as determined using the conditional data encryption rule, whether to encrypt the location data with the private key; when a determination is made to encrypt the location data with the private key, encrypting the location data with the private key to generate encrypted location data, and transmitting the encrypted location data on a network to the monitoring system; and when a determination is made not to encrypt the location data with the private key, transmitting the location data on the network to the monitoring system without first encrypting the location data with the private key; wherein the method is performed under the control of program code executed by the user computing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 14, 15, 16, 17, 18, 19)
-
-
10. A non-transitory computer readable medium which stores program code that instructs a user computing device to perform a method that comprises:
-
receiving over a network, from a monitoring system, a conditional data encryption rule that specifies criteria for the user computing device to determine whether to encrypt at least device location data with a private key of a user of the device before transmitting the device location data to the monitoring system, said device location data representing a location of the user computing device, said criteria including time-based criteria corresponding to an employment work schedule of the user with an employer; storing the conditional data encryption rule in a memory of the user computing device; repeatedly reporting a location of the user computing device to the monitoring system according to the conditional data encryption rule such that said location is reported during both employment work hours and non-work hours of the user, wherein repeatedly reporting the location comprises; obtaining location data reflective of a location of the user computing device; determining, based at least partly on a schedule of work hours associated with the employer, as determined using the conditional data encryption rule, whether the location data is associated with an employment use of the user computing device; when a determination is made that the location data is not associated with an employment use of the device, encrypting the location data with the private key of the user to generate encrypted location data, and transmitting the encrypted location data on a network to the monitoring system; and when a determination is made that the location data is associated with an employment use of the device, transmitting the location data on the network to the monitoring system without first encrypting the location data with the private key.
-
-
11. A method of monitoring a location of a user computing device such that user privacy is preserved, the method comprising:
-
transmitting over a network, from a monitoring system to the user computing device, a conditional data encryption rule that specifies criteria for the user computing device to determine whether to encrypt at least device location data with a private key of a user of the device before transmitting the device location data to the monitoring system, said device location data representing a location of the user computing device, said criteria including time-based criteria corresponding to an employment work schedule of the user with an employer; receiving from the user computing device, over a network, and storing in computer storage of the monitoring system, a first set of location data that is encrypted with the private key of the user, said first set of location data representing a monitored location of the user computing device during non-work hours of the user, said first set of location data encrypted with the private key by the user computing device based on the conditional data encryption rule; receiving from the user computing device, over a network, and storing in computer storage of the monitoring system, a second set of location data that is not encrypted with the private key of the user, said second set of location data representing a monitored location of the user computing device during work hours of the user; receiving the private key of the user in connection with a reported theft of the user computing device, and using the private key to decrypt the first set of location data; and using the decrypted first set of location data and the second set of location data to attempt recovery of the user computing device following the reported theft. - View Dependent Claims (12, 13)
-
Specification