Managing personal privacy settings
First Claim
1. At least one non-transitory machine-readable storage medium for managing user information comprising a plurality of instructions that in response to being executed on a computing device, cause the computing device to:
- receive at a user device from a source device, user information and a privacy setting for the user information, the user information related to that of a remote user, and the privacy setting used to permit or deny access to the user information to a third-party application executing on the user device, wherein the user information and privacy setting are stored in a data store at the source device and organized into an information profile reflecting an aspect of the remote user, and wherein the information profile is associated with a user of the user device;
store the user information and privacy setting at the user device;
attempt to install the third-party application on the user device;
check the privacy setting for the user information;
allow or deny the third-party application to install based on the privacy setting;
, andmanage a request to access the user information from the third-party application based on the privacy setting.
1 Assignment
0 Petitions
Accused Products
Abstract
Various systems and methods for managing user information on mobile devices are described herein. A selection of user information is received from a user operating a user device. A privacy setting for the selection of user information is received from the user, the privacy setting to permit or deny access to the user information to a third-party application. The selection of user information and the privacy setting is transmitted from the user device to a receiving device, where the receiving device is configured to enforce the privacy setting for the third-party application executing on the receiving device.
-
Citations
21 Claims
-
1. At least one non-transitory machine-readable storage medium for managing user information comprising a plurality of instructions that in response to being executed on a computing device, cause the computing device to:
-
receive at a user device from a source device, user information and a privacy setting for the user information, the user information related to that of a remote user, and the privacy setting used to permit or deny access to the user information to a third-party application executing on the user device, wherein the user information and privacy setting are stored in a data store at the source device and organized into an information profile reflecting an aspect of the remote user, and wherein the information profile is associated with a user of the user device; store the user information and privacy setting at the user device; attempt to install the third-party application on the user device; check the privacy setting for the user information; allow or deny the third-party application to install based on the privacy setting;
, andmanage a request to access the user information from the third-party application based on the privacy setting. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for managing user information, the system comprising:
-
a processor; and a memory including a plurality of instructions that in response to being executed on the processor, cause the processor to; receive at a user device from a source device, user information and a privacy setting for the user information, the user information related to that of a remote user, and the privacy setting used to permit or deny access to the user information to a third-party application executing on the user device, wherein the user information and privacy setting are stored in a data store at the source device and organized into an information profile reflecting an aspect of the remote user, and wherein the information profile is associated with a user of the user device; store the user information and privacy setting at the user device; attempt to install the third-party application on the user device; check the privacy setting for the user information; allow or deny the third-party application to install based on the privacy setting; and manage a request to access the user information from the third-party application based on the privacy setting. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method for managing user information, the method comprising:
-
receiving at a user device from a source device, user information and a privacy setting for the user information, the user information related to that of a remote user, and the privacy setting used to permit or deny access to the user information to a third-party application executing on the user device, wherein the user information and privacy setting are stored in a data store at the source device and organized into an information profile reflecting an aspect of the remote user, and wherein the information profile is associated with a user of the user device; storing the user information and privacy setting at the user device; attempting to install the third-party application on the user device; checking the privacy setting for the user information; allowing or denying the third-party application to install based on the privacy setting; and managing a request to access the user information from the third-party application based on the privacy setting. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification