Online privacy management
First Claim
1. A non-transitory computer-readable medium of a privacy management system server storing computer-executable instructions that, when executed by a processor of a remote computing device, cause the remote computing device to:
- access a Document Object Model (DOM) of a webpage, wherein the DOM comprises a first node that is configured to send analytics data to a third party device using a uniform resource locator stored in the first node and a second node that is configured to store private information;
in response to accessing the DOM, obtain the second node and create, in a memory, a wrapper object instead of the second node by calling a generic wrapper object function configured to create a wrapper object for at least two different node types;
configure the wrapper object to match the second node by setting values of the wrapper object according to values of the second node;
determine whether the wrapper object is to be configured to block the private information from being captured by the first node;
provide a getter function to the wrapper object, upon determining that the wrapper object is to be configured to block the private information from being captured by the first node, the getter function being configured to analyze the private information before returning the private information; and
replace the second node with the wrapper object in the DOM.
9 Assignments
0 Petitions
Accused Products
Abstract
A privacy management system (PMS) is disclosed for a Chief Privacy Officer (CPO) or other user to use in monitoring and/or controlling in realtime the flow of data (e.g., outflow) about the user and his/her online experience. The PMS may employ pattern recognition software to evaluate analytics data and potentially block private information from being sent within the analytics data. The PMS may provide a dashboard displaying a whitelist and/or blacklist indicating what destinations/sources are blocked or allowed as well as private information settings indicating what types of private information should be blocked. The PMS includes browser-client scripting code and may also include a PMS-certified verification icon and/or lock and unlock icons for display on webpages being monitored/controlled in realtime by the PMS.
-
Citations
27 Claims
-
1. A non-transitory computer-readable medium of a privacy management system server storing computer-executable instructions that, when executed by a processor of a remote computing device, cause the remote computing device to:
-
access a Document Object Model (DOM) of a webpage, wherein the DOM comprises a first node that is configured to send analytics data to a third party device using a uniform resource locator stored in the first node and a second node that is configured to store private information; in response to accessing the DOM, obtain the second node and create, in a memory, a wrapper object instead of the second node by calling a generic wrapper object function configured to create a wrapper object for at least two different node types; configure the wrapper object to match the second node by setting values of the wrapper object according to values of the second node; determine whether the wrapper object is to be configured to block the private information from being captured by the first node; provide a getter function to the wrapper object, upon determining that the wrapper object is to be configured to block the private information from being captured by the first node, the getter function being configured to analyze the private information before returning the private information; and replace the second node with the wrapper object in the DOM. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An apparatus, comprising:
-
at least one processor configured to transmit, over a network to a remote computing device, scripting code written in a programming language that lacks functionality to override certain functions; and a first memory storing the scripting code that, when executed by the remote computing device, causes the remote computing device to; access an object model of a page, wherein the object model comprises a first node that is configured to send analytics data to a third party device separate from the apparatus and the remote computing device, and a second node that is configured to store data; in response to accessing the object model, obtain the second node and create, in a second memory, a wrapper object instead of the second node; configure the wrapper object to replicate the second node by setting data of the wrapper object according to the data of the second node; provide a getter function to the wrapper object, the getter function being configured to analyze the data to identify whether the data comprises private information before returning the data to a requesting node and configured to block the private information from being transmitted to the third party device in a case where the data comprises the private information; and replace the second node with the wrapper object in the object model. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21)
-
-
22. A non-transitory computer-readable medium of a privacy management system server storing computer-executable instructions that, when executed by a processor of a remote computing device, provide:
-
instructions for accessing an object model of a page, wherein the object model comprises a plurality of nodes configured to store data; instructions for obtaining one of the nodes among the plurality of nodes of the object model and creating a wrapper object instead of the obtained node; instructions for configuring the wrapper object to replicate the obtained node by setting data of the wrapper object according to data of the obtained node; instructions for providing a getter function to the wrapper object, the getter function being configured to analyze the data to identify whether the data comprises private information before returning the data to a requesting node and configured to block the private information from being transmitted to a third party device in a case where the data comprises the private information; and instructions for replacing the obtained node with the wrapper object in the object model. - View Dependent Claims (23, 24, 25, 26, 27)
-
Specification