Information privacy system and method
First Claim
1. An information privacy system, comprising:
- an environment monitoring component configured to monitor an aspect of an environment; and
a privacy component executed on a first computing device configured to;
determine whether one or more factors associated with the environment are triggered; and
at least one of obscure access or provide access to at least one of data stored on the first computing device associated with the information privacy system, a program stored on the first computing device, or a device in the first computing device based on a determination that the one or more factors are triggered;
the one or more factors comprising at least the first computing device associated with the information privacy system being disconnected from a designated network due to the first computing device being moved outside of a designated area, the designated network being a computer network.
2 Assignments
0 Petitions
Accused Products
Abstract
The subject disclosure relates to systems and methods for providing privacy for information. In one non-limiting embodiment, a system includes an environment monitoring component configured to monitor an aspect of an environment; and a privacy component configured to: determine whether factors associated with the environment are triggered; and obscure access or provide access to data or a program associated with the factors based on determining that the factors are triggered. Factors can be based on the time and the location or network connectivity of a device associated with the system, the detected presence or absence of an authorized person other than the user logged into the device or the privacy state of the user logged into the device. Motion detectors, cameras, biometric sensors and other devices can be employed in the determination of whether to provide or obscure access to the information.
25 Citations
20 Claims
-
1. An information privacy system, comprising:
-
an environment monitoring component configured to monitor an aspect of an environment; and a privacy component executed on a first computing device configured to; determine whether one or more factors associated with the environment are triggered; and at least one of obscure access or provide access to at least one of data stored on the first computing device associated with the information privacy system, a program stored on the first computing device, or a device in the first computing device based on a determination that the one or more factors are triggered; the one or more factors comprising at least the first computing device associated with the information privacy system being disconnected from a designated network due to the first computing device being moved outside of a designated area, the designated network being a computer network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of enhancing privacy, comprising:
executing on a computing device, instructions that, when executed, cause the computing device to perform operations, comprising; associating at least one of data stored on the computing device, a program stored on the computing device, or a device in the computing device with an availability of an authorized person, the authorized person being other than a user logged into the computing device attempting to access the at least one of the data, the program or the device; determining that the authorized person is available; providing access to or unlocking the data, the program, or the device based on the determining that the authorized person is available; determining that the computing device has been disconnected from a designated network; and obscuring access to at least one of the data, the program, or the device subsequent to determining that the computing device has been disconnected from the designated network, the designated network persisting subsequent to the computing device being disconnected and including at least one of a local area network, a wide area network, an enterprise network, or the Internet. - View Dependent Claims (13, 14, 15, 16, 17)
-
18. A computer-readable storage device storing computer-executable instructions that, in response to execution by a computing device, cause the computing device to perform operations comprising:
-
associating at least one of data stored on the computing device, a program stored on the computing device, or a device in the computing device with a privacy state of an authorized person, the privacy state being indicated by whether others other than the authorized person are detected within a distance of the authorized person; determining the privacy state of the authorized person; providing access to the data, the program, or the device based on the privacy state of the authorized person; and obscuring access to at least one of the data, the program, or the device subsequent to a determination that the computing device has been disconnected from a designated network, the designated network being an enterprise network. - View Dependent Claims (19, 20)
-
Specification