Privacy Control Processes for Mobile Devices, Wearable Devices, other Networked Devices, and the Internet of Things
First Claim
1. A method whereby the information collection capabilities, including but not limited to still and video photography and sound recording, are positively controlled through computer code built into the hardware of a mobile device, firmware or software resident on the device, or “
- cloudware”
accessed by the device (hereinafter referred to as a “
collection controller”
).
0 Assignments
0 Petitions
Accused Products
Abstract
Mobile devices are increasingly capable of collecting, storing, and transmitting data which may infringe on the security or privacy of others. The inventions disclosed provide methods by which such conflicts may be reduced by allowing geo-graphical areas to be opted-out of certain types of collection, at all or specific times. These methods may help broaden the acceptance of such devices as Google Glass®, other wearable devices, or other mobile collection-capable devices. The disclosure describes a “collection controller” which maintains positive control over a device'"'"'s collection capabilities. This controller may be paired with an online opt-out registry or sensor which detects coded opt-out beacons. Certain data collected by the device might be metadata tagged and its further use determined by a “data disposition controller” which ensures restrictions on the collected data are maintained and adhered to. Finally, the device may itself be queried to determine if it is controlled by any or all of the processes disclosed in this submission.
49 Citations
22 Claims
-
1. A method whereby the information collection capabilities, including but not limited to still and video photography and sound recording, are positively controlled through computer code built into the hardware of a mobile device, firmware or software resident on the device, or “
- cloudware”
accessed by the device (hereinafter referred to as a “
collection controller”
). - View Dependent Claims (2, 3, 4, 5, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
- cloudware”
-
6. A method whereby computer code built into the hardware of the device, firmware or software resident on the device, or “
- cloudware”
accessed by the device (hereinafter referred to as a “
data disposition controller”
) maintains positive control over the metadata tagged information on the device preventing such information from being offloaded from the device or used on the device in a way contrary to the restrictions or caveats in the metadata tags. - View Dependent Claims (7, 8, 9, 10)
- cloudware”
-
11. A method whereby computer code built into the hardware of the device, firmware or software resident on the device, or “
- cloudware”
accessed by the device (hereinafter referred to as an “
opt-out integrity verifier”
) allows an external query of the device to launch a series of tests to ensure that the collection controller and/or the data disposition controller are active on the device and not tampered with and then returns a response to the query either verifying that the device is controlled by such opt-out technologies or that such cannot be determined.
- cloudware”
-
12. A variation claim 12 wherein a device which has the “
- collection controller”
or “
data disposition controller”
code permanently and inalterably resident in the device is identified through a logo or other visual distinguishing feature.
- collection controller”
Specification