Automated management of private information
First Claim
1. An computing apparatus for managing private information, comprising:
- a profile memory unit configured to store profile data representing private information of a first user;
a first reception unit configured to receive first setting data from a terminal of the first user, the first setting data being based on a predetermined template used to create a privacy rule defining a condition for restricting disclosure of the private information and a restriction method;
a creation unit configured to create the privacy rule in accordance with the first setting data received by the first reception unit;
a privacy rule memory unit configured to store the privacy rule created by the creation unit;
a determination unit configured to, in a case where undisclosed image data requested to be disclosed on a predetermined website contains the private information represented by the profile data, extract metadata contained in the undisclosed image data and determine whether or not the metadata satisfies the condition for restricting disclosure of the private information; and
an execution unit configured to, in a case where it is determined by the determination unit that the metadata satisfies the condition, execute the restriction method defined by the privacy rule.
5 Assignments
0 Petitions
Accused Products
Abstract
A private information management apparatus, a method, and a program that allows individual users to easily set and apply their privacy rules. A private information management apparatus receives setting data from a user terminal and creates a privacy rule that defines a condition for restricting disclosure of private information and a restriction method. If undisclosed image data contains private information of a user, the private information management apparatus extracts metadata contained in this undisclosed image data, and determines whether or not the metadata satisfies the condition for restricting disclosure of the private information. If it is determined that the condition is satisfied, the private information management apparatus executes the restriction method defined by the privacy rule.
13 Citations
19 Claims
-
1. An computing apparatus for managing private information, comprising:
-
a profile memory unit configured to store profile data representing private information of a first user; a first reception unit configured to receive first setting data from a terminal of the first user, the first setting data being based on a predetermined template used to create a privacy rule defining a condition for restricting disclosure of the private information and a restriction method; a creation unit configured to create the privacy rule in accordance with the first setting data received by the first reception unit; a privacy rule memory unit configured to store the privacy rule created by the creation unit; a determination unit configured to, in a case where undisclosed image data requested to be disclosed on a predetermined website contains the private information represented by the profile data, extract metadata contained in the undisclosed image data and determine whether or not the metadata satisfies the condition for restricting disclosure of the private information; and an execution unit configured to, in a case where it is determined by the determination unit that the metadata satisfies the condition, execute the restriction method defined by the privacy rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An computing apparatus for managing private information, comprising:
-
a profile memory unit configured to store profile data representing private information of a first user; a first reception unit configured to receive first setting data from a terminal of the first user, the first setting data being based on a predetermined template used to create a privacy rule defining a condition for restricting disclosure of the private information and a restriction method; a creation unit configured to create the privacy rule in accordance with the first setting data received by the first reception unit; a privacy rule memory unit configured to store the privacy rule created by the creation unit; a determination unit configured to, in a case where undisclosed image data requested to be disclosed on a predetermined website contains the private information represented by the profile data, extract metadata contained in the undisclosed image data and determine whether or not the metadata satisfies the condition for restricting disclosure of the private information; and an execution unit configured to, in a case where it is determined by the determination unit that the metadata satisfies the condition, execute the restriction method defined by the privacy rule; and a second reception unit configured to receive, from the terminal of the first user, second setting data representing the restriction method in a case where it is determined by the determination unit that the metadata satisfies the condition, wherein in the case where the second setting data is received, the execution unit executes the restriction method represented by the second setting data instead of the restriction method defined by the privacy rule. - View Dependent Claims (11)
-
-
12. A method for a computer to suppress leakage of private information, the computer including a profile memory unit configured to store profile data representing private information of a user, the method comprising:
-
receiving setting data from a terminal of the user, the setting data being based on a predetermined template used to create a privacy rule defining a condition for restricting disclosure of the private information and a restriction method; creating the privacy rule in accordance with the setting data received in the reception step; storing the privacy rule created in the creation step; a determination step of, in a case where undisclosed image data requested to be disclosed on a predetermined website contains the private information represented by the profile data, extracting metadata contained in the undisclosed image data and determining whether or not the metadata satisfies the condition for restricting disclosure of the private information; and an execution step of, in a case where it is determined in the determination step that the metadata satisfies the condition, executing the restriction method defined by the privacy rule. - View Dependent Claims (13, 14, 15)
-
-
16. A computer program product for suppressing leakage of private information, the computer program product comprising a non-transitory computer readable medium having program instructions embodied therewith, the program instructions executable by a data processing system to cause the data processing system to perform steps of:
-
receiving setting data from a terminal of the user, the setting data being based on a predetermined template used to create a privacy rule defining a condition for restricting disclosure of the private information and an executable restriction method; creating the privacy rule in accordance with the setting data received in the reception step; storing the privacy rule created in the creation step; a determination step of, in a case where undisclosed image data requested to be disclosed on a predetermined website contains the private information represented by the profile data, extracting metadata contained in the undisclosed image data and determining whether or not the metadata satisfies the condition for restricting disclosure of the private information; and an execution step of, in a case where it is determined in the determination step that the metadata satisfies the condition, executing the executable restriction method defined by the privacy rule. - View Dependent Claims (17, 18, 19)
-
Specification