Data security system
First Claim
Patent Images
1. A method for managing a response to a query for information via a user interface, one or more applications, or a computer device, comprising the steps of:
- a computer determining one or more privacy settings for a user, wherein the one or more privacy settings are determined by analyzing a usage history, of the user, of the one or more applications;
the computer determining that the user is utilizing the one or more applications in a manner that contradicts the one or more privacy settings as determined based on the usage history of the user;
the computer determining that an amount of utilization, of the user, of the one or more applications a plurality of times, in the manner that contradicts the one or more privacy settings, exceeds a threshold amount of contradictory use;
based on the amount of utilization, of the user, in the manner that contradicts the one or more privacy settings, exceeding the threshold amount of contradictory use;
the computer altering the one or more privacy settings;
the computer receiving an electronic query for information;
the computer determining whether a response to the query satisfies the one or more privacy settings; and
responsive to determining that the response to the query does not satisfy the one or more privacy settings, the computer altering the response to satisfy the one or more privacy settings.
1 Assignment
0 Petitions
Accused Products
Abstract
A computer identifies one or more privacy settings. The computer receives a query for information. The computer determines whether a response to the query satisfies the one or more privacy settings. If the computer determines that the response to the query does not satisfy the one or more privacy settings, the computer alters the response to satisfy the one or more privacy settings.
35 Citations
10 Claims
-
1. A method for managing a response to a query for information via a user interface, one or more applications, or a computer device, comprising the steps of:
-
a computer determining one or more privacy settings for a user, wherein the one or more privacy settings are determined by analyzing a usage history, of the user, of the one or more applications; the computer determining that the user is utilizing the one or more applications in a manner that contradicts the one or more privacy settings as determined based on the usage history of the user; the computer determining that an amount of utilization, of the user, of the one or more applications a plurality of times, in the manner that contradicts the one or more privacy settings, exceeds a threshold amount of contradictory use; based on the amount of utilization, of the user, in the manner that contradicts the one or more privacy settings, exceeding the threshold amount of contradictory use;
the computer altering the one or more privacy settings;the computer receiving an electronic query for information; the computer determining whether a response to the query satisfies the one or more privacy settings; and responsive to determining that the response to the query does not satisfy the one or more privacy settings, the computer altering the response to satisfy the one or more privacy settings. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification