×

Privacy management for tracked devices

  • US 8,995,668 B2
  • Filed: 12/12/2013
  • Issued: 03/31/2015
  • Est. Priority Date: 07/18/2008
  • Status: Active Grant
First Claim
Patent Images

1. A method performed by a user computing device to enable data created on the user computer device (“

  • created data”

    ) to be stored on a remote storage system with protection of user privacy, the method comprising;

    receiving, over a network, a conditional data encryption rule that specifies criteria for the user computing device to selectively encrypt the created data with a private key of a user of the device before transmitting the created data to the remote storage system, said criteria including time-based criteria to determine which elements of the created data are to be selectively encrypted based at least in part on whether each element was created during employment work hours of a user, wherein the time-based criteria include an employment work schedule of the user;

    storing the conditional data encryption rule in a memory of the user computing device;

    during both employment work hours and non-work hours of the user, sending the created data to the remote storage system according to the conditional data encryption rule, wherein sending the created data comprises;

    identifying a set of created data to send to the remote storage system;

    determining, based at least partly on whether the set of created data was created during employment work hours associated with the user, as determined using the time-based criteria, whether to encrypt the set of created data with the private key;

    when a determination is made based at least in part on the time-based criteria to encrypt the set of created data with the private key, encrypting the set of created data with the private key to generate privacy-protected data, and transmitting the privacy-protected data via a network to the remote storage system; and

    when a determination is made based at least in part on the time-based criteria not to encrypt the set of created data with the private key, transmitting the set of created data via the network to the remote storage system without first encrypting the set of created data with the private key;

    wherein the method is performed under the control of program code executed by the user computing device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×