User-directed privacy control in a user-centric identity management system
First Claim
1. A system comprising:
- at least one hardware processor programmed to provide an identity manager programmed to manage a plurality of user identities of an individual user, the plurality of user identities pertaining to the individual user and describing different sets of personal information of the individual user, and to select one or more of the user identities of the user that satisfy a set of identity requirements of a security policy obtained from an environment;
a privacy engine operatively associated with a plurality of privacy preferences, the privacy engine programmed to evaluate one or more privacy preferences of the one or more selected user identities of the user against a privacy policy obtained from the environment to determine which of the selected user identities satisfy the at least one privacy preference; and
a policy editor programmed to process a privacy policy from the environment, generate a reduced version thereof, and supply the reduced privacy policy as the privacy policy used by the privacy engine evaluation.
4 Assignments
0 Petitions
Accused Products
Abstract
An identity management system incorporates privacy management processes that enable the user to exercise privacy controls over the disclosure of user identity information within the context of an authentication process. A combination includes an identity selector, a privacy engine, and a ruleset. The identity selector directs the release of a user identity as a security token to satisfy the requirements of a security policy. Before releasing the user identity, the engine conducts a privacy enforcement process that examines the privacy policy of the service provider and determines if it is acceptable. The engine evaluates a ruleset against the privacy policy. A preference editor enables the user to construct, in advance, the ruleset containing the user'"'"'s privacy preferences regarding the disclosure of identity information. Based on the evaluation results, the user can either approve or disapprove the privacy policy, and so decide whether to proceed with disclosure of the user identity.
-
Citations
20 Claims
-
1. A system comprising:
-
at least one hardware processor programmed to provide an identity manager programmed to manage a plurality of user identities of an individual user, the plurality of user identities pertaining to the individual user and describing different sets of personal information of the individual user, and to select one or more of the user identities of the user that satisfy a set of identity requirements of a security policy obtained from an environment; a privacy engine operatively associated with a plurality of privacy preferences, the privacy engine programmed to evaluate one or more privacy preferences of the one or more selected user identities of the user against a privacy policy obtained from the environment to determine which of the selected user identities satisfy the at least one privacy preference; and a policy editor programmed to process a privacy policy from the environment, generate a reduced version thereof, and supply the reduced privacy policy as the privacy policy used by the privacy engine evaluation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method, comprising:
-
managing a plurality of user identities of an individual user, the plurality of user identities pertaining to the individual user and describing different sets of personal information of the individual user, by an identity manager programmed to manage the plurality of user identities of the user including selecting one or more of the user identities of the user that satisfy a set of identity requirements of a security policy obtained from the environment; evaluating, by a privacy engine, one or more privacy preferences of the one or more selected user identities of the user against a privacy policy obtained from the environment to determine which of the selected user identities satisfy the at least one privacy preference; and processing, by a policy editor, a privacy policy from the environment, generating a reduced version thereof, and supplying the reduced privacy policy as the privacy policy used by the privacy engine evaluation. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium having computer-executable instructions that, when executed, cause a processor to:
-
manage a plurality of user identities of an individual user, the plurality of user identities pertaining to the individual user and describing different sets of personal information of the individual user, and to select one or more of the user identities of the user that satisfy a set of identity requirements of a security policy obtained from the environment; evaluate one or more privacy preferences of the one or more selected user identities of the user against a privacy policy obtained from the environment to determine which of the selected user identities satisfy the at least one privacy preference; and process, by a policy editor, a privacy policy from the environment, generate a reduced version thereof, and supply the reduced privacy policy as the privacy policy used by the privacy engine evaluation. - View Dependent Claims (18, 19, 20)
-
Specification