Selective regulation of information transmission from mobile applications to third-party privacy compliant target systems
First Claim
1. A computer-implemented method for selectively regulating transmission of information from a mobile device to a partner system by a third-party privacy compliance system, the method comprising:
- associating a privacy policy with each of a plurality of software installation cohorts, each software installation cohort representing a plurality of mobile devices, each privacy policy comprising a rule for regulating transmission of information from the mobile device to the partner system, each privacy policy mapped to a respective identifier;
providing instrumentation instructions for integration with a mobile application and operation by the mobile device, wherein the instrumentation instructions comprise instructions for;
requesting a privacy policy from the third-party privacy compliance system, the privacy policy request comprising the identifier of a software installation cohort of the mobile application;
receiving the privacy policy from the third-party privacy compliance system;
selecting privacy-compliant information available to the mobile device, the privacy-compliant information in compliance with the received privacy policy; and
sending the selected privacy-compliant information to the partner system;
receiving the privacy policy request at the third-party privacy compliance system;
selecting, at the third-party privacy compliance system, the privacy policy mapped to the identifier of the software installation cohort of the mobile application; and
sending the selected privacy policy to the mobile device.
11 Assignments
0 Petitions
Accused Products
Abstract
Selective regulation of information transmission from mobile applications to a third-party privacy compliant target system. A privacy policy is configured for and mapped to each of a multiplicity of mobile application concerns, with each privacy policy comprising rules regulating the transmission of information to a third-party privacy compliant target system. Instrumentation instructions can be integrated with a mobile application and provided to a mobile device. The instrumentation instructions direct the mobile application to submit a privacy policy request comprising a mobile application identifier from the mobile device to a third-party privacy compliance system and enable sending information from the mobile device to the third-party privacy compliant target system, subject to the privacy policy. The privacy policy request is received at the third-party privacy compliance system which selects the privacy policy based on an application identifier and sends the privacy policy to the mobile device for implementation.
-
Citations
20 Claims
-
1. A computer-implemented method for selectively regulating transmission of information from a mobile device to a partner system by a third-party privacy compliance system, the method comprising:
-
associating a privacy policy with each of a plurality of software installation cohorts, each software installation cohort representing a plurality of mobile devices, each privacy policy comprising a rule for regulating transmission of information from the mobile device to the partner system, each privacy policy mapped to a respective identifier; providing instrumentation instructions for integration with a mobile application and operation by the mobile device, wherein the instrumentation instructions comprise instructions for; requesting a privacy policy from the third-party privacy compliance system, the privacy policy request comprising the identifier of a software installation cohort of the mobile application; receiving the privacy policy from the third-party privacy compliance system; selecting privacy-compliant information available to the mobile device, the privacy-compliant information in compliance with the received privacy policy; and sending the selected privacy-compliant information to the partner system; receiving the privacy policy request at the third-party privacy compliance system; selecting, at the third-party privacy compliance system, the privacy policy mapped to the identifier of the software installation cohort of the mobile application; and sending the selected privacy policy to the mobile device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable storage medium executing computer program instructions for selectively regulating transmission of information from a mobile device to a partner system by a third-party privacy compliance system, the computer program instructions comprising instructions for:
-
associating a privacy policy with each of a plurality of software installation cohorts, each software installation cohort representing a plurality of mobile devices, each privacy policy comprising a rule for regulating transmission of information from the mobile device to the partner system, each privacy policy mapped to a respective identifier; providing instrumentation instructions for integration with a mobile application and operation by the mobile device, wherein the instrumentation instructions comprise instructions for; requesting a privacy policy from the third-party privacy compliance system, the privacy policy request comprising the identifier of a software installation cohort of the mobile application; receiving the privacy policy from the third-party privacy compliance system; selecting privacy-compliant information available to the mobile device, the privacy-compliant information in compliance with the received privacy policy; and sending the selected privacy-compliant information to the partner system; receiving the privacy policy request at the third-party privacy compliance system; selecting, at the third-party privacy compliance system, the privacy policy mapped to the identifier of the software installation cohort of the mobile application; and sending the selected privacy policy to the mobile device. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A system comprising:
-
a processor; a non-transitory computer readable storage medium storing processor-executable computer program instructions for selectively regulating transmission of information from a mobile device to a partner system by a third-party privacy compliance system, the instructions comprising instructions for; associating a privacy policy with each of a plurality of software installation cohorts, each software installation cohort representing a plurality of mobile devices, each privacy policy comprising a rule for regulating transmission of information from the mobile device to the partner system, each privacy policy mapped to a respective identifier; providing instrumentation instructions for integration with a mobile application and operation by the mobile device, wherein the instrumentation instructions comprise instructions for; requesting a privacy policy from the third-party privacy compliance system, the privacy policy request comprising the identifier of a software installation cohort of the mobile application; receiving the privacy policy from the third-party privacy compliance system; selecting privacy-compliant information available to the mobile device, the privacy compliant information in compliance with the received privacy policy; and sending the selected privacy-compliant information to the partner system; receiving the privacy policy request at the third-party privacy compliance system; selecting, at the third-party privacy compliance system, the privacy policy mapped to the identifier of the software installation cohort of the mobile application; and sending the selected privacy policy to the mobile device. - View Dependent Claims (19, 20)
-
Specification