Area-based location privacy management
First Claim
1. A mobile computing device for location privacy management, the mobile computing device comprising:
- a policy-setting application to store a location access policy, wherein the location access policy comprises one or more predefined policy rules that identify whether an application is authorized to obtain the location of the mobile computing device, and wherein the predefined policy rules include a preset condition defined by a user;
a location management module to (i) determine, in response to storage of the location access policy, whether the application executed by the mobile computing device is authorized to obtain the location of the mobile computing device based on the application, a determined location, and the location access policy stored on the mobile computing device, and (ii) block the application from obtaining the location of the mobile computing device in response to a determination that the application is not authorized to obtain the location.
1 Assignment
0 Petitions
Accused Products
Abstract
Technologies for location privacy management include a mobile computing device to determine whether an application is authorized to obtain the location of the mobile computing device based on a determined location and location access policy of the mobile computing device. The location access policy includes policy rules that identify whether the application is authorized to obtain the location of the mobile computing device. If the mobile computing device determines that the application is not authorized to obtain the location of the mobile computing device, the mobile computing device blocks the application from obtaining the location.
-
Citations
25 Claims
-
1. A mobile computing device for location privacy management, the mobile computing device comprising:
-
a policy-setting application to store a location access policy, wherein the location access policy comprises one or more predefined policy rules that identify whether an application is authorized to obtain the location of the mobile computing device, and wherein the predefined policy rules include a preset condition defined by a user; a location management module to (i) determine, in response to storage of the location access policy, whether the application executed by the mobile computing device is authorized to obtain the location of the mobile computing device based on the application, a determined location, and the location access policy stored on the mobile computing device, and (ii) block the application from obtaining the location of the mobile computing device in response to a determination that the application is not authorized to obtain the location. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. One or more non-transitory, machine readable storage media comprising a plurality of instructions stored thereon that, in response to execution by a mobile computing device, cause the mobile computing device to:
-
store a location access policy, the location access policy comprising one or more predefined policy rules that identify whether an application is authorized to obtain the location of the mobile computing device, and wherein the predefined policy rules include a preset condition defined by a user; determine, in response to storing the location access policy, whether the application executed by the mobile computing device is authorized to obtain the location of the mobile computing device based on the application, a determined location, and the location access policy stored on the mobile computing device; and block the application from obtaining the location of the mobile computing device in response to a determination that the application is not authorized to obtain the location. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A method for managing location privacy on a mobile computing device, the method comprising:
-
storing, by the mobile computing device, a location access policy, the location access policy comprising one or more predefined policy rules that identify whether an application is authorized to obtain the location of the mobile computing device, and wherein the predefined policy rules include a preset condition defined by a user; determining, by the mobile computing device in response to storing the location access policy, whether the application executed by the mobile computing device is authorized to obtain the location of the mobile computing device based on the application, a determined location, and the location access policy stored on the mobile computing device; and blocking, by the mobile computing device, the application from obtaining the location of the mobile computing device in response to determining that the application is not authorized to obtain the location. - View Dependent Claims (24, 25)
-
Specification