Computing system with identity protection mechanism and method of operation thereof
First Claim
Patent Images
1. A computing system comprising:
- a communication unit, including microelectronics, configured to access content information, including a feature, of a target account of a user on a first social site;
a control unit, including a processor, coupled to the communication unit, configured to;
calculate a counter rating for the target account, wherein the counter rating includes a representation of a characteristic of the feature adversely related to an anonymity rating,calculate a comparison result as an amount of distinction between the target account and a comparison account of the user on a second social site based on the feature, wherein the amount of distinction between the target account and the comparison account is less than or equal to an amount of distinction between the target account and an account of a different user on the second social site,determine an anonymity threshold for conforming the target account with the comparison account,determine the feature for the target account based on the counter rating, the comparison result, and the anonymity threshold for displaying on a device to achieve k-anonymity for the target account, andimplement a protective solution based on the comparison result for protecting the content information, including the feature, from unauthorized access.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing system includes: a communication unit configured to access a target account including a feature; a control unit, coupled to the communication unit, configured to: calculate a comparison result based on the feature, determine an anonymity threshold for conforming the target account with a comparison account, and determine the feature for the target account based on the comparison result and the anonymity threshold for displaying on a device.
-
Citations
20 Claims
-
1. A computing system comprising:
-
a communication unit, including microelectronics, configured to access content information, including a feature, of a target account of a user on a first social site; a control unit, including a processor, coupled to the communication unit, configured to; calculate a counter rating for the target account, wherein the counter rating includes a representation of a characteristic of the feature adversely related to an anonymity rating, calculate a comparison result as an amount of distinction between the target account and a comparison account of the user on a second social site based on the feature, wherein the amount of distinction between the target account and the comparison account is less than or equal to an amount of distinction between the target account and an account of a different user on the second social site, determine an anonymity threshold for conforming the target account with the comparison account, determine the feature for the target account based on the counter rating, the comparison result, and the anonymity threshold for displaying on a device to achieve k-anonymity for the target account, and implement a protective solution based on the comparison result for protecting the content information, including the feature, from unauthorized access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of operation of a computing system comprising:
-
accessing content including a feature, of a target account of a user on a first social site; calculating a counter rating for the target account, wherein the counter rating includes a representation of a characteristic of the feature adversely related to an anonymity rating; calculating a comparison result as an amount of distinction between the target account and a comparison account of the user on a second social site based on the feature, wherein the amount of distinction between the target account and the comparison account is less than or equal to an amount of distinction between the target account and an account of a different user on the second social site, determining an anonymity threshold for conforming the target account with the comparison account; determining the feature, with a processor, for the target account based on the counter rating, the comparison result, and the anonymity threshold for displaying on a device to achieve k-anonymity for the target account; and implementing a protective solution based on the comparison result for protecting the content information, including the feature, from unauthorized access. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory computer readable medium including instructions executable by a processor, the instructions comprising:
-
accessing content information, including a feature, of a target account of a user on a first social site; calculating a counter rating for the target account, wherein the counter rating includes a representation of a characteristic of the feature adversely related to an anonymity rating; calculating a comparison result as an amount of distinction between the target account and a comparison account of the user on a second social site based on the feature, wherein the amount of distinction between the target account and the comparison account is less than or equal to an amount of distinction between the target account and an account of a different user on the second social site, determining an anonymity threshold for conforming the target account with the comparison account; determining the feature, with the processor, for the target account based on the counter rating, the comparison result, and the anonymity threshold for displaying on a device to achieve k-anonymity for the target account; and implementing a protective solution based on the comparison result for protecting the content information, including the feature, from unauthorized access. - View Dependent Claims (17, 18, 19, 20)
-
Specification