Computing system for privacy-aware sharing management and method of operation thereof
First Claim
Patent Images
1. A computing system for privacy-aware sharing management comprising:
- a control unit, including a microprocessor, configured to;
determine a usage context including a capability of a device, a usage time and a device location associated with the device, and a user context of one or more users with access to the device;
analyze a privacy risk level of a resource based on a metadata concerning the resource, a collective input regarding the resource, the usage context, and identifying a privacy trigger within a substantive content included in the resource through analysis of the substantive content;
retrieve one or more historical sharing profiles of the device, wherein each of the historical sharing profiles links a sharing privacy preference with a particular instance of the usage context;
generate one or more options for sharing the resource with the device by generating a privacy recommendation and a security measure based on the historical sharing profile, the privacy risk level and the usage context, wherein;
the privacy recommendation is for representing a choice or preference presented to the one or more users in one or more actions available to manage privacy risk, andthe security measure is for representing a command or setting to implement the one or more actions to manage the privacy risk; and
a storage unit, coupled to the control unit, configured to store the resource.
1 Assignment
0 Petitions
Accused Products
Abstract
A computing system includes a control unit configured to determine a usage context including a capability of a device, a usage time and a device location associated with the device, and a user context of one or more users with access to the device; analyze a privacy risk level of a resource based on a resource content included in the resource, a metadata concerning the resource, a collective input regarding the resource, and the usage context; and generate one or more options for sharing the resource with the device based on the privacy risk level and the usage context.
-
Citations
24 Claims
-
1. A computing system for privacy-aware sharing management comprising:
-
a control unit, including a microprocessor, configured to; determine a usage context including a capability of a device, a usage time and a device location associated with the device, and a user context of one or more users with access to the device; analyze a privacy risk level of a resource based on a metadata concerning the resource, a collective input regarding the resource, the usage context, and identifying a privacy trigger within a substantive content included in the resource through analysis of the substantive content; retrieve one or more historical sharing profiles of the device, wherein each of the historical sharing profiles links a sharing privacy preference with a particular instance of the usage context; generate one or more options for sharing the resource with the device by generating a privacy recommendation and a security measure based on the historical sharing profile, the privacy risk level and the usage context, wherein; the privacy recommendation is for representing a choice or preference presented to the one or more users in one or more actions available to manage privacy risk, and the security measure is for representing a command or setting to implement the one or more actions to manage the privacy risk; and a storage unit, coupled to the control unit, configured to store the resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for privacy-aware sharing management, comprising:
-
determining, with a control unit, a usage context including a capability of a device, a usage time and a device location associated with the device, and a user context of one or more users with access to the device; analyzing a privacy risk level of a resource based on a metadata concerning the resource, a collective input regarding the resource, the usage context, and identifying a privacy trigger within a substantive content included in the resource through analysis of the substantive content; and retrieving one or more historical sharing profiles of the device, wherein each of the historical sharing profiles links a sharing privacy preference with a particular instance of the usage context; generating one or more options for sharing the resource with the device by generating a privacy recommendation and a security measure based on the historical sharing profile, the privacy risk level and the usage context, wherein; the privacy recommendation is for representing a choice or preference presented to the one or more users in one or more actions available to manage privacy risk, and the security measure is for representing a command or setting to implement the one or more actions to manage the privacy risk. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer readable medium including instructions for execution, comprising:
-
determining a usage context including a capability of a device, a usage time and a device location associated with the device, and a user context of one or more users with access to the device; analyzing a privacy risk level of a resource based on a metadata concerning the resource, a collective input regarding the resource, the usage context, and identifying a privacy trigger within a substantive content included in the resource through analysis of the substantive content; and retrieving one or more historical sharing profiles of the device, wherein each of the historical sharing profiles links a sharing privacy preference with a particular instance of the usage context; generating one or more options for sharing the resource with the device by generating a privacy recommendation and a security measure based on the historical sharing profile, the privacy risk level and the usage context, wherein; the privacy recommendation is for representing a choice or preference presented to the one or more users in one or more actions available to manage privacy risk, and the security measure is for representing a command or setting to implement the one or more actions to manage the privacy risk. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification