Network information collection and access control system
First Claim
Patent Images
1. A method comprising:
- receiving, by at least one processor, network information associated with a device;
separating the network information into separately accessible anonymized network information and user identifiable information;
enabling access to the anonymized network information independently of the user identifiable information based on a privacy setting;
generating a correlation key associated with the anonymized network information and the user identifiable information; and
appending the correlation key to the anonymized network information and the user identifiable information.
1 Assignment
0 Petitions
Accused Products
Abstract
An approach is provided for collecting and controlling access to network information. A network information anonymizer receives network information associated with a device, separates the network information into anonymized network information and user identifiable information, and enables access to the anonymized network information independently of the user identifiable information based on a privacy setting.
21 Citations
18 Claims
-
1. A method comprising:
-
receiving, by at least one processor, network information associated with a device; separating the network information into separately accessible anonymized network information and user identifiable information; enabling access to the anonymized network information independently of the user identifiable information based on a privacy setting; generating a correlation key associated with the anonymized network information and the user identifiable information; and appending the correlation key to the anonymized network information and the user identifiable information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one process, cause the apparatus to perform at least the following, receive network information associated with a device; separate the network information into separately accessible anonymized network information and user identifiable information; enable access to the anonymized network information independently of the user identifiable information based on a privacy setting; generate a correlation key associated with the anonymized network information and the user identifiable information; and append the correlation key to the anonymized network information and the user identifiable information. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
Specification