Selective regulation of information transmission from mobile applications to third-party privacy compliant target systems
First Claim
1. A method comprising:
- providing instrumentation instructions for integration with a mobile application and operation by a mobile device, wherein the instrumentation instructions comprise instructions for;
detecting an absence of a valid privacy policy;
responsive to detecting the absence of the valid privacy policy at the mobile device, requesting a privacy policy from a third-party privacy compliance system by the mobile device, the request comprising a respective identifier of a software installation cohort representing a plurality of mobile devices including the mobile device;
receiving the privacy policy from the third-party privacy compliance system, the privacy policy mapped to the identifier of the software installation cohort of the mobile application, the privacy policy comprising a rule for regulating transmission of information from the mobile device to a partner system;
identifying information in compliance with the received privacy policy; and
sending the identified information to the partner system; and
responsive to receiving the request from the mobile device, selecting the privacy policy according to the identifier of the software installation cohort; and
sending the selected privacy policy to the mobile device.
7 Assignments
0 Petitions
Accused Products
Abstract
Selective regulation of information transmission from mobile applications to a third-party privacy compliant target system. A privacy policy is configured for and mapped to each of a multiplicity of mobile application concerns, with each privacy policy comprising rules regulating the transmission of information to a third-party privacy compliant target system. Instrumentation instructions can be integrated with a mobile application and provided to a mobile device. The instrumentation instructions direct the mobile application to submit a privacy policy request comprising a mobile application identifier from the mobile device to a third-party privacy compliance system and enable sending information from the mobile device to the third-party privacy compliant target system, subject to the privacy policy. The privacy policy request is received at the third-party privacy compliance system which selects the privacy policy based on an application identifier and sends the privacy policy to the mobile device for implementation.
27 Citations
15 Claims
-
1. A method comprising:
-
providing instrumentation instructions for integration with a mobile application and operation by a mobile device, wherein the instrumentation instructions comprise instructions for; detecting an absence of a valid privacy policy; responsive to detecting the absence of the valid privacy policy at the mobile device, requesting a privacy policy from a third-party privacy compliance system by the mobile device, the request comprising a respective identifier of a software installation cohort representing a plurality of mobile devices including the mobile device; receiving the privacy policy from the third-party privacy compliance system, the privacy policy mapped to the identifier of the software installation cohort of the mobile application, the privacy policy comprising a rule for regulating transmission of information from the mobile device to a partner system; identifying information in compliance with the received privacy policy; and sending the identified information to the partner system; and responsive to receiving the request from the mobile device, selecting the privacy policy according to the identifier of the software installation cohort; and sending the selected privacy policy to the mobile device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A non-transitory computer readable storage medium executing computer program instructions, the computer program instructions comprising instructions for:
-
providing instrumentation instructions for integration with a mobile application and operation by a mobile device, wherein the instrumentation instructions comprise instructions for; detecting an absence of a valid privacy policy; responsive to detecting the absence of the valid privacy policy at the mobile device, requesting a privacy policy from a third-party privacy compliance system by the mobile device, the request comprising a respective identifier of a software installation cohort representing a plurality of mobile devices including the mobile device; receiving the privacy policy from the third-party privacy compliance system, the privacy policy mapped to the identifier of the software installation cohort of the mobile application, the privacy policy comprising a rule for regulating transmission of information from the mobile device to the partner system; identifying information in compliance with the received privacy policy; and sending the identified information to the partner system; and responsive to receiving the request from the mobile device, selecting the privacy policy according to the identifier of the software installation cohort; and sending the selected privacy policy to the mobile device. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A system comprising:
-
a processor; a non-transitory computer readable storage medium storing processor-executable computer program instructions, the instructions comprising instructions for; providing instrumentation instructions for integration with an operating system and operation by the mobile device, wherein the instrumentation instructions comprise instructions for; detecting an absence of a valid privacy policy; responsive to detecting the absence of the valid privacy policy at the mobile device, requesting a privacy policy from a third-party privacy compliance system by the mobile device, the request comprising a respective identifier of a software installation cohort representing a plurality of mobile devices including the mobile device; receiving the privacy policy from the third-party privacy compliance system, the privacy policy mapped to the identifier of the software installation cohort of the mobile application, the privacy policy comprising a rule for regulating transmission of information from the mobile device to a partner system; identifying information in compliance with the received privacy policy; and sending the identified information to the partner system; and responsive to receiving the request from the mobile device, selecting the privacy policy according to the identifier of the software installation cohort; and sending the selected privacy policy to the mobile device. - View Dependent Claims (12, 13, 14, 15)
-
Specification