Managing and predicting privacy preferences based on automated detection of physical reaction
First Claim
1. A method for preventing transmission of private information associated with a first person, comprising:
- detecting that a third person has requested access to the private information associated with the first person;
determining a previous reaction by the first person made in response to a previous authorization request for the private information made by a second person different from the third person, the determining a previous reaction comprises identifying at least one of a facial expression or a gesture performed by the first person while the previous authorization request made by the second person is displayed;
determining that the third person and the second person are associated with a common group identifier;
authorizing access to the private information by the third person in response to identifying the at least one of a facial expression or a gesture performed by the first person while the previous authorization request made by the second person is displayed and determining that the third person and the second person are associated with the common group identifier; and
transmitting the private information to the third person in response to authorizing access to the private information.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive information are described. In some embodiments, in order for an end user of a computing device to establish a secure connection with a secure network and access data stored on the secure network, a client application running on the computing device may be required by the secure network. The client application may monitor visual cues (e.g., facial expressions and gestures) associated with the end user, detect suspicious activity performed by the end user based on the visual cues, and in response to detecting suspicious activity may perform mitigating actions to prevent the transmission of sensitive information such as alerting human resources personnel or requiring authorization prior to sending information to locations outside of the secure network.
-
Citations
17 Claims
-
1. A method for preventing transmission of private information associated with a first person, comprising:
-
detecting that a third person has requested access to the private information associated with the first person; determining a previous reaction by the first person made in response to a previous authorization request for the private information made by a second person different from the third person, the determining a previous reaction comprises identifying at least one of a facial expression or a gesture performed by the first person while the previous authorization request made by the second person is displayed; determining that the third person and the second person are associated with a common group identifier; authorizing access to the private information by the third person in response to identifying the at least one of a facial expression or a gesture performed by the first person while the previous authorization request made by the second person is displayed and determining that the third person and the second person are associated with the common group identifier; and transmitting the private information to the third person in response to authorizing access to the private information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system, comprising:
-
a storage device, the storage device stores a user profile associated with a first person, the user profile includes a mapping of a previous reaction by the first person in response to a previous authorization request for private information associated with the first person made by a second person different from the first person; and a set of processors in communication with the storage device, the set of processors detects that a third person different from the second person has requested access to the private information associated with the first person, the set of processors determines the previous reaction based on at least one of a facial expression or a gesture performed by the first person while the previous authorization request made by the second person is displayed, the set of processors determines that the third person and the second person are associated with a common group identifier, the set of processors authorizes access to the private information by the third person in response to determining that the previous reaction was a positive reaction and determining that the third person and the second person are associated with the common group identifier, the set of processors causes the private information to be transmitted to the third person in response to the set of processors authorizing access to the private information. - View Dependent Claims (12, 13)
-
-
14. A computer program product, comprising:
-
a non-transitory computer readable storage medium having computer readable program code embodied therewith, the computer readable program code comprising; computer readable program code configured to detect that a third person has requested access to private information associated with a first person; computer readable program code configured to determine a previous reaction by the first person in response to a previous authorization request for the private information made by a second person different from the third person, the previous reaction is determined based on at least one of a facial expression or a gesture performed by the first person while the authorization request made by the second person is displayed; computer readable program code configured to determine that the third person and the second person are associated with a common group identifier; computer readable program code configured to authorize access to the private information by the third person in response to determining that the previous reaction was a positive reaction and determining that the third person and the second person are associated with the common group identifier; and computer readable program code configured to cause the transmission of the private information to the third person in response to authorizing access to the private information. - View Dependent Claims (15, 16, 17)
-
Specification