WO2013084563A1 - プライバシー情報管理装置、方法及びプログラム - Google Patents
プライバシー情報管理装置、方法及びプログラム Download PDFInfo
- Publication number
- WO2013084563A1 WO2013084563A1 PCT/JP2012/074110 JP2012074110W WO2013084563A1 WO 2013084563 A1 WO2013084563 A1 WO 2013084563A1 JP 2012074110 W JP2012074110 W JP 2012074110W WO 2013084563 A1 WO2013084563 A1 WO 2013084563A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- privacy
- privacy information
- user
- rule
- unit
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
Definitions
- Web services such as SNS (Social Networking Service) that allow individual users to disclose information are provided on the Internet.
- SNS Social Networking Service
- Non-Patent Document 1 a service for outputting an alert when a preset keyword is disclosed is provided (for example, see Non-Patent Document 1).
- a technique for warning privacy infringement for example, see Patent Document 1
- a technique for analyzing post data and calculating urgency for example, see Patent Document 2
- a technique for automatically updating privacy settings for example, Patent Document 3
- a technique for automatically generating a profile for example, see Patent Document 4
- JP 2010-97336 A JP 2010-238237 A Special table 2010-539565 gazette Special table 2008-517402
- image data such as still images or moving images.
- image data such as still images or moving images.
- an image such as a face or car number that can identify a user is included in the image data, depending on the combination conditions with the metadata such as the date and time or location where the image data was created (photographed)
- the image data can be privacy information for the user.
- An object of the present invention is to provide a privacy information management apparatus, method, and program that allow individual users to easily set and apply privacy rules.
- a privacy information management apparatus that suppresses leakage of privacy information.
- the privacy information management apparatus receives the setting data from the user's terminal, and generates a privacy rule that defines conditions and a restriction method for restricting the disclosure of privacy information. Then, when the privacy information of the user is included in the pre-release image data, the privacy information management device extracts the metadata included in the pre-release image data and restricts the disclosure of the privacy information. It is determined whether or not a condition to be satisfied is satisfied, and when it is determined that the condition is satisfied, the restriction method defined by the privacy rule is executed.
- the privacy information management device restricts the disclosure of the user's privacy information included in this image after the time when the start instruction is received from the user's terminal, with respect to the image taken around the positioning position of this terminal.
- the present invention can be provided as a method for causing a computer to execute the function of the privacy information management apparatus, and a program for causing the computer to execute the method.
- the privacy information management device generates and applies a privacy rule that defines the conditions and the restriction method for restricting the disclosure of privacy information based on the setting data received from the user's terminal.
- the disclosure of privacy information that meets the conditions included in the previous image data can be restricted in advance. Accordingly, each user can easily set and apply privacy rules.
- the privacy information management device 1 is a server device that provides a function of suppressing leakage of privacy information in the SNS.
- FIG. 1 is a block diagram showing an overall configuration of a system including a privacy information management device 1 according to the present embodiment.
- the privacy information management device 1 is connected to the object server 2 directly or via a network, and further, in response to a request from a user terminal 3 such as a PC or a mobile terminal used by each of a plurality of users, the user terminal 3 And wired or wireless communication.
- a user terminal 3 such as a PC or a mobile terminal used by each of a plurality of users, the user terminal 3 And wired or wireless communication.
- the privacy information management device 1 includes a user profile 11 (profile storage unit), a rule repository 12 (privacy rule storage unit), a privacy rule setting unit 13 (first receiving unit), and a privacy rule generation unit 14 (generation unit). ), A privacy rule application unit 15, and a privacy information control unit 16. Further, the privacy information control unit 16 includes a post data input unit 161, a data analysis unit 162, an object reference unit 163, a setting reference unit 164, a privacy rule determination unit 165 (determination unit), and an action control unit 166 ( An execution unit, a transmission request unit, and a second reception unit).
- the object server 2 includes an image recognition unit 21 and an object determination unit 22.
- the user terminal 3a (first user's terminal) for setting a privacy rule includes a privacy setting input unit 31, and the user terminal 3b (second user's terminal) for posting an image is a data posting unit 32. And a data display unit 33.
- the user profile 11 stores profile data indicating privacy information for each user.
- the profile data includes, for example, the face of a person or a friend, vehicle data, image data such as pets, belongings, or audio data, etc., depending on the combination of the image data (still image or moving image) with the shooting date or location. Data that can be privacy information. In order to simplify the description, the profile data is assumed to be image data below.
- the user profile 11 stores a relationship of mutual reference of privacy rules with other users described later.
- the rule repository 12 stores a privacy rule for each user generated by a privacy rule generation unit 14 described later.
- the privacy rule setting unit 13 receives, from the user terminal 3a, setting data (first setting data) for generating a privacy rule that defines conditions for limiting the disclosure of privacy information and a control action (limitation method).
- the setting data includes parameters for condition item templates provided in advance.
- the setting data includes selection instruction data from a predetermined type of control action provided in advance.
- the privacy setting input unit 31 of the user terminal 3a has a radius from the current location of the user terminal 3a for the user account “A” between “17:00 on August 1” and “23:00 on the same day”.
- a condition is accepted in which profile data included in an image shot in a range of 10 km is used as privacy information.
- the current location of the user terminal 3a is obtained from, for example, GPS positioning information or base station information.
- the privacy setting input unit 31 confirms each time whether or not to permit the publication as a control action executed when privacy information is included in the pre-publishing image data posted in the SNS. Accepting the selection.
- a start instruction is notified to the privacy information management apparatus 1, and the time when the start instruction is accepted is the start date / time of the shooting date / time which is the determination condition of the privacy information.
- an end instruction is notified to the privacy information management apparatus 1, and when this end instruction is accepted, the end date / time of the shooting date / time which is the determination condition of the privacy information is set. That is, during the “recording” state from when the start button is pressed to when the end button is pressed, the image relating to the user is determined as privacy information, and the disclosure is restricted.
- the start date and time and the end date and time are times provided by the clock function of the user terminal 3a or the privacy information management device 1.
- profile data relating to the user is determined as privacy information when a range of a predetermined distance including the position of the user terminal 3a that has been positioned is the shooting location.
- the position of the user terminal 3a may be periodically notified to the privacy information management device.
- FIG. 4 is a diagram showing an example of privacy rules stored in the rule repository 12 according to the present embodiment.
- control action executed when it is determined that privacy information is included in the image data is described in an ⁇ Obligations> tag.
- disclosure prohibition, disclosure permission by masking, approval notification, notification of release, and the like are defined according to the setting data described above.
- the privacy rule application unit 15 instructs the privacy information control unit 16 to apply the privacy rules stored in the rule repository 12.
- the posting data input unit 161 receives the SNS posting data received from the user by the data posting unit 32 of the user terminal 3b (second user terminal).
- the data analysis unit 162 analyzes the pre-release image data included in the post data and the metadata added to the pre-release image data, and extracts an object that is a determination rule of the privacy rule. Specifically, the data analysis unit 162 acquires a comparison result between the image data and the profile data by the object server 2 via the object reference unit 163, and further extracts data that is a condition comparison target from the metadata. To the privacy rule determination unit 165.
- the privacy rule determination unit 165 is included in the pre-release image data when the privacy information indicated by the profile data of a certain user is included in the pre-release image data requested to be released in the SNS. Metadata is extracted, and it is determined whether or not a condition for limiting the disclosure of privacy information is satisfied.
- the metadata is, for example, Exif information of image data, and stores a shooting time and a shooting location.
- the privacy rule determination unit 165 determines whether or not these pieces of information meet the conditions defined in the privacy rules for each user.
- the action control unit 166 executes the control action defined in the privacy rule when the privacy rule determination unit 165 determines that the condition is satisfied. Specifically, for example, when image data with privacy information masked is provided to the data display unit 33 that displays data on the user terminal 3 viewing the posted data, or when disclosure is prohibited, the data is displayed. Display data indicating that the data cannot be disclosed to the data display unit 33 of the user terminal 3b that requested the request.
- FIG. 5 is a diagram illustrating an example of a privacy rule when the disclosure of privacy information according to the present embodiment is prohibited.
- the action control unit 166 prohibits others from uploading the image of the user “A” and displays an alert screen on the user terminal 3 b of the poster.
- the action control unit 166 executes this control action when the execution of the control action is approved by the user terminal 3b (data posting unit 32) of the second user who has requested the release of the pre-release image data. Also good.
- the control action is executed when the cross-reference setting for mutually approving the application of the privacy rule between the first user and the second user is stored in the user profile 11.
- all privacy rules may be automatically applied.
- FIG. 7 is a diagram illustrating an example of a privacy rule when an approval request for disclosure of privacy information according to the present embodiment is performed.
- the action control unit 166 displays an alert screen for the user terminal 3a of the user “A” when it is determined that the privacy information of the user “A” is included in the pre-release image data. Display.
- a link to the pre-release image data that is the target of the control action is displayed.
- the user “A” can select an appropriate control action while confirming an actual image.
- privacy information of users other than the user “A” is included in the pre-release image data, it is preferable that these privacy information is masked.
- step S2 the privacy rule generation unit 14 generates a privacy rule for each user based on the setting data received in step S1.
- step S4 the privacy rule application unit 15 determines whether or not the privacy information management device 1 automatically applies the privacy rule. If this determination is YES, it is assumed that all privacy rules have been approved, and the process proceeds to step S7. If the determination is NO, the process proceeds to step S5.
- step S5 the privacy rule application unit 15 requests other users to approve cross-references in response to an instruction from the user terminal 3.
- step S6 the privacy rule application unit 15 accepts the cross-reference approval from the user terminal 3 that requested the approval in step S5.
- step S7 the privacy rule application unit 15 starts applying the approved privacy rule.
- step S5 and step S6 may be executed together with the SNS standard friend registration sequence.
- FIG. 10 is a flowchart showing privacy information control processing according to the present embodiment.
- step S11 the post data input unit 161 reads pre-release image data posted from the user terminal 3b.
- step S13 the data analysis unit 162 specifies the user account of the object detected in step S12 using the object server 2 (object determination unit 22) via the object reference unit 163.
- step S14 the privacy rule determination unit 165 extracts the privacy rule for the user account specified in step S13 from the rule repository 12 via the setting reference unit 164.
- step S15 the data analysis unit 162 extracts, from the metadata included in the pre-release image data, the shooting date / time or shooting location, which is a condition comparison target value in the privacy rule.
- step S16 the privacy rule determination unit 165 determines whether or not the value extracted in step S15 matches the privacy rule condition. If this determination is YES, the process proceeds to step S17, and if the determination is NO, the process proceeds to step S18.
- step S17 since it is determined in step S16 that the privacy information is included in the pre-release image data, the action control unit 166 executes the control action defined in the privacy rule.
- step S18 the action control unit 166 outputs the posting data based on the control action in step S17, or the posting data itself if it is determined in step S16 that privacy information is not included.
- the privacy information management device 1 can improve the accuracy of determination and limit the search range by using the location range in addition to the time range as a condition for determining that privacy information is included. , The processing load is reduced.
- the privacy information management device 1 can apply the privacy rules in real time by instructing the start time and end time of the time range from the user terminal 3a by pressing a button or the like. Therefore, the first user can apply the privacy rules in a timely manner with a simple interface.
- the user terminal 3a is preferably a mobile terminal.
- the first user can easily and timely apply the privacy rule on the condition of the current time and position.
- control action is selected from predetermined types provided in advance, the first user can easily define the privacy rule. Furthermore, since the first user can select a control action when receiving a request for approval of post data, the control action can be appropriately changed and confirmed, and convenience is improved. In addition, the first user can execute an appropriate control action by confirming the pre-release image data transmitted from the privacy information management device 1.
- the privacy information management device 1 applies the privacy rule to the posted data between users even if the privacy rule cannot be applied with the administrator authority of the site by cross-referencing the privacy rule. I can meet each other.
- FIG. 11 is a diagram showing a hardware configuration of the privacy information management apparatus 1 according to the present embodiment.
- the following describes the overall configuration of the privacy information management device 1 as an information processing device 1000 typified by a computer. In the case of a dedicated machine or an embedded device, the minimum required configuration is selected according to the environment. Needless to say, it can be done.
- the hardware configuration of the privacy information management apparatus 1 is shown, but the hardware configurations of the object server 2 and the user terminal 3 are the same as those of the privacy information management apparatus 1.
- the information processing apparatus 1000 includes a CPU (Central Processing Unit) 1010, a bus line 1005, a communication I / F 1040, a main memory 1050, a BIOS (Basic Input Output System) 1060, a parallel port 1080, a USB port 1090, a graphic controller 1020, and a VRAM 1024. , An audio processor 1030, an I / O controller 1070, and input means such as a keyboard and mouse adapter 1100.
- Storage means such as a flexible disk (FD) drive 1072, a hard disk 1074, an optical disk drive 1076, and a semiconductor memory 1078 can be connected to the I / O controller 1070.
- a display device 1022 is connected to the graphic controller 1020.
- an amplifier circuit 1032 and a speaker 1034 are connected to the audio processor 1030.
- optical disk drive 1076 for example, a DVD-ROM drive, a CD-ROM drive, a DVD-RAM drive, a BD (Blu-ray Disk) -ROM drive, or the like can be used. In this case, it is necessary to use the optical disk 1077 corresponding to each drive.
- the optical disk drive 1076 can also read a program or data from the optical disk 1077 and provide it to the main memory 1050 or the hard disk 1074 via the I / O controller 1070.
- the computer program provided to the information processing apparatus 1000 is stored in a recording medium such as the flexible disk 1071, the optical disk 1077, or a memory card and provided by the user.
- This computer program is read from the recording medium via the I / O controller 1070 or downloaded via the communication I / F 1040 to be installed and executed in the information processing apparatus 1000.
- the operation that the computer program causes the information processing apparatus to perform is the same as the operation in the apparatus that has already been described, and is therefore omitted.
- the information processing apparatus 1000 has been mainly described.
- the information described above is obtained by installing a program having the function described in the information processing apparatus in a computer and causing the computer to operate as the information processing apparatus. Functions similar to those of the processing device can be realized. Therefore, the information processing apparatus described as one embodiment in the present invention can also be realized by a method and a computer program thereof.
- the program for executing the functions of the present invention is stored in an arbitrary computer-readable medium such as a flexible disk, MO, CD-ROM, DVD, hard disk device, ROM, RAM, M-RAM (Magnetic Resistive RAM), flash memory, etc. can do.
- a program can be downloaded from another computer system connected via a communication line or copied from another medium for storage in a computer-readable medium. Further, such a program can be compressed or divided into a plurality of pieces and stored in a single or a plurality of recording media.
- image data has been described as profile data, but even audio data can be handled in the same manner.
- a voice analysis unit (not shown) for analyzing a voice print of voice data included in the moving image data is provided.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Automation & Control Theory (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
Abstract
Description
本実施形態に係るプライバシー情報管理装置1は、SNSにおいてプライバシー情報の漏洩を抑制する機能を提供するサーバ装置である。
プライバシー情報管理装置1は、オブジェクトサーバ2と直接に又はネットワークを介して接続され、さらに、複数のユーザそれぞれが使用するPC又は携帯端末等のユーザ端末3からの要求に応じて、このユーザ端末3と有線又は無線通信を行う。
さらに、プライバシー情報制御部16は、投稿データ入力部161と、データ解析部162と、オブジェクト参照部163と、設定参照部164と、プライバシールール判定部165(判定部)と、アクション制御部166(実行部、送信要求部、第2の受信部)とを備える。
また、プライバシールールを設定するユーザ端末3a(第1のユーザの端末)は、プライバシー設定入力部31を備え、画像を投稿するユーザ端末3b(第2のユーザの端末)は、データ投稿部32と、データ表示部33とを備える。
なお、説明を簡略化するために、以下では、プロファイルデータは画像データであるとする。
ここで、設定データは、予め設けられている条件項目のテンプレートに対するパラメータを含む。また、設定データは、予め設けられている所定種類の制御アクションからの選択指示データを含む。
つまり、開始ボタンが押下されてから終了ボタンが押下されるまでの、「記録中」の状態である間は、ユーザに関する画像がプライバシー情報として判定され、公開が制限される。なお、開始日時及び終了日時は、ユーザ端末3a又はプライバシー情報管理装置1が有する時計機能によって提供される時刻である。
なお、制御アクションとしては、公開禁止、マスキングによる公開許可、承認通知、公開されたことの通知等が、上述の設定データに応じて定義される。
また、オブジェクト判定部22は、画像認識部21により識別されたオブジェクトと、ユーザプロファイル11に記憶されているプロファイルデータとを比較し、画像データの中にプライバシー情報になり得る画像が含まれているか否かを判定する。
ここで、メタデータは、例えば、画像データのExif情報等であり、撮影時間及び撮影場所が格納されている。プライバシールール判定部165は、これらの情報が、ユーザ毎のプライバシールールで定義されている条件に合致しているか否かを判定する。
この例では、アクション制御部166は、ユーザ「A」の画像を他人がアップロードすることを禁止し、投稿者のユーザ端末3bに対してアラート画面を表示させる。
この例では、投稿者が公開を要求した画像データの中に、ユーザ「A」のプライバシー情報が含まれていたため、画像を公開できないことが表示され、投稿者に対して確認を求めている。
なお、この第2の設定データは、複数種類の制御アクションの候補からの選択データ、又はプライバシールールに予め定められている制御アクションの実行許可若しくは不許可を示すデータであってよい。
この例では、アクション制御部166は、公開前画像データの中にユーザ「A」のプライバシー情報が含まれていると判定された場合に、ユーザ「A」のユーザ端末3aに対してアラート画面を表示させる。
この例では、プライバシー情報に対する制御アクションの選択肢が表示され、ユーザ「A」が選択した制御アクションがアクション制御部166により実行される。なお、選択肢は、許可又は不許可の2択でもよく、この場合、「YES」又は「NO」のいずれかのボタン押下により選択されてもよい。
さらに、第1のユーザは、投稿データの承認依頼を受けた時に制御アクションを選択できるので、制御アクションを適宜変更、確認でき、利便性が向上する。また、第1のユーザは、プライバシー情報管理装置1から送信される公開前画像データを確認することで、適切な制御アクションを実行させることができる。
2 オブジェクトサーバ
3、3a、3b ユーザ端末
11 ユーザプロファイル
12 ルールレポジトリ
13 プライバシールール設定部
14 プライバシールール生成部
15 プライバシールール適用部
16 プライバシー情報制御部
161 投稿データ入力部
162 データ解析部
163 オブジェクト参照部
164 設定参照部
165 プライバシールール判定部
166 アクション制御部
Claims (11)
- 第1のユーザのプライバシー情報を示すプロファイルデータを記憶するプロファイル記憶部と、
前記第1のユーザの端末から、前記プライバシー情報の公開を制限する条件及び制限方法を定めたプライバシールールを生成するための所定のテンプレートに対する第1の設定データを受信する第1の受信部と、
前記第1の受信部により受信された前記第1の設定データに基づいて、前記プライバシールールを生成する生成部と、
前記生成部により生成された前記プライバシールールを記憶するプライバシールール記憶部と、
所定のWebサイトにおいて公開が要求された公開前画像データの中に、前記プロファイルデータにより示される前記プライバシー情報が含まれている場合に、当該公開前画像データに含まれているメタデータを抽出し、当該プライバシー情報の公開を制限する条件を満たすか否かを判定する判定部と、
前記判定部により前記条件を満たすと判定された場合に、前記プライバシールールにより定められている制限方法を実行する実行部と、を備えるプライバシー情報管理装置。 - 前記プライバシー情報の公開を制限する条件は、前記公開前画像データの撮影日時の範囲を含む請求項1に記載のプライバシー情報管理装置。
- 前記撮影日時の範囲は、前記第1のユーザの端末から開始指示を受け付けた時から、終了指示を受け付けた時までの範囲である請求項2に記載のプライバシー情報管理装置。
- 前記プライバシー情報の公開を制限する条件は、前記公開前画像データの撮影場所の範囲を含む請求項1から請求項3のいずれかに記載のプライバシー情報管理装置。
- 前記撮影場所の範囲は、前記第1のユーザの端末が測位された位置を含む所定の範囲である請求項4に記載のプライバシー情報管理装置。
- 前記第1の受信部は、前記第1のユーザの端末から、前記プライバシー情報の公開を制限する制限方法を定めるために、予め設けられている所定種類の制限方法からの選択指示を含む前記第1の設定データを受信する請求項1から請求項5のいずれかに記載のプライバシー情報管理装置。
- 前記実行部は、前記公開前画像データの公開を要求した第2のユーザによって、前記制限方法の実行が承認された場合に、当該制限方法を実行する請求項1から請求項6のいずれかに記載のプライバシー情報管理装置。
- 前記判定部により前記条件を満たすと判定された場合に、前記第1のユーザの端末から、前記制限方法を示す第2の設定データを受信する第2の受信部を備え、
前記実行部は、前記第2の設定データが受信された場合には、前記プライバシールールにより定められている制限方法に代えて、当該第2の設定データにより示される制限方法を実行する請求項1から請求項7のいずれかに記載のプライバシー情報管理装置。 - 前記判定部により前記条件を満たすと判定された場合に、前記第1のユーザの端末へ、前記公開前画像データを送信して前記第2の設定データの送信を要求する送信要求部を備える請求項8に記載のプライバシー情報管理装置。
- コンピュータがプライバシー情報の漏洩を抑制する方法であって、
前記コンピュータは、ユーザのプライバシー情報を示すプロファイルデータを記憶するプロファイル記憶部を備え、
前記ユーザの端末から、前記プライバシー情報の公開を制限する条件及び制限方法を定めたプライバシールールを生成するための所定のテンプレートに対する設定データを受信する受信ステップと、
前記受信ステップにおいて受信された前記設定データに基づいて、前記プライバシールールを生成する生成ステップと、
前記生成ステップにおいて生成された前記プライバシールールを記憶するプライバシールール記憶ステップと、
所定のWebサイトにおいて公開が要求された公開前画像データの中に、前記プロファイルデータにより示される前記プライバシー情報が含まれている場合に、当該公開前画像データに含まれているメタデータを抽出し、当該プライバシー情報の公開を制限する条件を満たすか否かを判定する判定ステップと、
前記判定ステップにおいて前記条件を満たすと判定された場合に、前記プライバシールールにより定められている制限方法を実行する実行ステップと、を含む方法。 - 請求項10に記載の方法の各ステップをコンピュータに実行させるためのプログラム。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2013548119A JP5588074B2 (ja) | 2011-12-05 | 2012-09-20 | プライバシー情報管理装置、方法及びプログラム |
US14/362,635 US9280682B2 (en) | 2011-12-05 | 2012-09-20 | Automated management of private information |
CN201280059768.5A CN103975339B (zh) | 2011-12-05 | 2012-09-20 | 隐私信息管理装置和方法 |
DE112012005074.6T DE112012005074T5 (de) | 2011-12-05 | 2012-09-20 | Vorrichtung, Verfahren und Programm zum Management privater Informationen |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2011266150 | 2011-12-05 | ||
JP2011-266150 | 2011-12-05 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013084563A1 true WO2013084563A1 (ja) | 2013-06-13 |
Family
ID=48573946
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2012/074110 WO2013084563A1 (ja) | 2011-12-05 | 2012-09-20 | プライバシー情報管理装置、方法及びプログラム |
Country Status (5)
Country | Link |
---|---|
US (1) | US9280682B2 (ja) |
JP (1) | JP5588074B2 (ja) |
CN (1) | CN103975339B (ja) |
DE (1) | DE112012005074T5 (ja) |
WO (1) | WO2013084563A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015049762A (ja) * | 2013-09-02 | 2015-03-16 | キヤノン株式会社 | サーバ装置、情報処理方法及びプログラム |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102011079043A1 (de) | 2011-07-13 | 2013-01-17 | Robert Bosch Gmbh | Laserzündkerze und Reinigungsverfahren hierfür |
US10013564B2 (en) | 2013-10-10 | 2018-07-03 | Elwha Llc | Methods, systems, and devices for handling image capture devices and captured images |
US10102543B2 (en) * | 2013-10-10 | 2018-10-16 | Elwha Llc | Methods, systems, and devices for handling inserted data into captured images |
US10346624B2 (en) | 2013-10-10 | 2019-07-09 | Elwha Llc | Methods, systems, and devices for obscuring entities depicted in captured images |
US20150104004A1 (en) * | 2013-10-10 | 2015-04-16 | Elwha Llc | Methods, systems, and devices for delivering image data from captured images to devices |
US9799036B2 (en) | 2013-10-10 | 2017-10-24 | Elwha Llc | Devices, methods, and systems for managing representations of entities through use of privacy indicators |
US10185841B2 (en) | 2013-10-10 | 2019-01-22 | Elwha Llc | Devices, methods, and systems for managing representations of entities through use of privacy beacons |
JP6355520B2 (ja) * | 2013-11-06 | 2018-07-11 | キヤノン株式会社 | サーバ装置及びその制御方法、システム、プログラム、並びに記憶媒体 |
US8856948B1 (en) | 2013-12-23 | 2014-10-07 | Google Inc. | Displaying private information on personal devices |
US9781190B2 (en) * | 2014-01-22 | 2017-10-03 | Panasonic Intellectual Property Corporation Of America | Apparatus and method for supporting selection of an image to be posted on a website |
WO2016114392A1 (ja) * | 2015-01-15 | 2016-07-21 | 日本電気株式会社 | 情報出力装置、カメラ、情報出力システム、情報出力方法及びプログラム |
US20170012982A1 (en) * | 2015-07-10 | 2017-01-12 | Google Inc. | Protecting Data From Unauthorized Access |
KR20170017066A (ko) * | 2015-08-05 | 2017-02-15 | 삼성전자주식회사 | 휴대용 단말 장치 및 그 제어 방법 |
US10205708B1 (en) | 2015-08-21 | 2019-02-12 | Teletracking Technologies, Inc. | Systems and methods for digital content protection and security in multi-computer networks |
US10515419B1 (en) * | 2016-02-17 | 2019-12-24 | United Services Automobile Association | Systems and methods for leveraging remotely captured images |
CN106131306A (zh) * | 2016-06-17 | 2016-11-16 | 青岛海信移动通信技术股份有限公司 | 一种照片实时加密的方法的装置 |
US10311330B2 (en) * | 2016-08-17 | 2019-06-04 | International Business Machines Corporation | Proactive input selection for improved image analysis and/or processing workflows |
US10579741B2 (en) | 2016-08-17 | 2020-03-03 | International Business Machines Corporation | Proactive input selection for improved machine translation |
US10311249B2 (en) | 2017-03-31 | 2019-06-04 | Google Llc | Selectively obscuring private information based on contextual information |
DE102017218547A1 (de) * | 2017-10-18 | 2019-04-18 | Robert Bosch Gmbh | Serveranwendung und Verfahren zur Plausibilisierung von Datenschutzangaben |
CN109118454A (zh) * | 2018-08-30 | 2019-01-01 | 北京旷视科技有限公司 | 图像数据处理方法、装置、系统、计算机可读存储介质 |
CN110035183B (zh) * | 2019-04-22 | 2021-10-12 | 维沃移动通信有限公司 | 信息分享方法和终端 |
US11188351B2 (en) | 2019-08-16 | 2021-11-30 | International Business Machines Corporation | Personal advisor for managing private information |
US11183294B2 (en) | 2019-08-30 | 2021-11-23 | International Business Machines Corporation | Automatic detection and replacement of identifying information in images using machine learning |
CN110990873B (zh) * | 2019-12-03 | 2023-06-02 | 浙江大华技术股份有限公司 | 一种违规操作的监控方法、计算机设备及存储介质 |
FR3114893B1 (fr) * | 2020-10-05 | 2024-02-23 | Commissariat Energie Atomique | Procédé d’administration du téléversement d’un contenu personnel sur une plateforme web |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002183351A (ja) * | 2000-12-12 | 2002-06-28 | Hitachi Koukiyou Syst Eng Kk | 著作権侵害防止装置および防止方法 |
JP2006293455A (ja) * | 2005-04-06 | 2006-10-26 | Dainippon Printing Co Ltd | 不適正データ確認システム |
JP2010136373A (ja) * | 2008-12-05 | 2010-06-17 | Internatl Business Mach Corp <Ibm> | 写真認証のための電子写真デバイス、方法、およびシステム(写真認証システム) |
JP2011120214A (ja) * | 2009-11-04 | 2011-06-16 | Canon Inc | 画像配信装置及び画像配信方法 |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000082001A (ja) | 1998-09-04 | 2000-03-21 | Ai Soft Kk | データ管理装置およびデータ管理方法 |
JP2003091457A (ja) | 2001-09-14 | 2003-03-28 | Sony Corp | 情報管理システム、情報管理装置、情報管理方法及び記録媒体 |
JP4764897B2 (ja) | 2002-09-19 | 2011-09-07 | 株式会社リコー | 画像形成装置、画像形成方法、情報処理システム及びプログラム |
US8019692B2 (en) | 2004-10-19 | 2011-09-13 | Yahoo! Inc. | System and method for location based social networking |
JP2007213177A (ja) | 2006-02-08 | 2007-08-23 | Omron Corp | 情報処理装置および方法、並びにプログラム |
US7805406B2 (en) * | 2006-10-27 | 2010-09-28 | Xystar Technologies, Inc. | Cross-population of virtual communities |
WO2008147548A1 (en) * | 2007-05-24 | 2008-12-04 | Facebook, Inc. | Personalized platform for accessing internet applications |
CA2696945C (en) | 2007-09-07 | 2014-12-02 | Facebook, Inc. | Dynamically updating privacy settings in a social network |
US7836093B2 (en) * | 2007-12-11 | 2010-11-16 | Eastman Kodak Company | Image record trend identification for user profiles |
JP5082917B2 (ja) | 2008-02-25 | 2012-11-28 | 日本電気株式会社 | 違法情報検出装置、違法情報検出方法、及び違法情報検出プログラム |
US8763149B1 (en) * | 2008-04-30 | 2014-06-24 | Google Inc. | Site dependent embedded media playback manipulation |
JP5178392B2 (ja) | 2008-08-13 | 2013-04-10 | キヤノン株式会社 | 情報処理装置及び情報処理装置の制御方法 |
JP5008633B2 (ja) | 2008-10-15 | 2012-08-22 | 日本電信電話株式会社 | プライバシー侵害監視装置、プライバシー侵害監視方法及びプログラム |
US8515049B2 (en) | 2009-03-26 | 2013-08-20 | Avaya Inc. | Social network urgent communication monitor and real-time call launch system |
US20110044512A1 (en) * | 2009-03-31 | 2011-02-24 | Myspace Inc. | Automatic Image Tagging |
US20110238755A1 (en) * | 2010-03-24 | 2011-09-29 | Hameed Khan | Proximity-based social networking |
US8244848B1 (en) * | 2010-04-19 | 2012-08-14 | Facebook, Inc. | Integrated social network environment |
KR101753031B1 (ko) * | 2010-11-15 | 2017-06-30 | 엘지전자 주식회사 | 이동 단말기 및 이것의 메타데이터 설정 방법 |
FR2972823B1 (fr) | 2011-03-16 | 2013-03-01 | Alcatel Lucent | Controle de publication de message relatif a un utilisateur |
US9710765B2 (en) * | 2011-05-26 | 2017-07-18 | Facebook, Inc. | Browser with integrated privacy controls and dashboard for social network data |
US9286641B2 (en) * | 2011-10-19 | 2016-03-15 | Facebook, Inc. | Automatic photo capture based on social components and identity recognition |
-
2012
- 2012-09-20 CN CN201280059768.5A patent/CN103975339B/zh not_active Expired - Fee Related
- 2012-09-20 DE DE112012005074.6T patent/DE112012005074T5/de not_active Withdrawn
- 2012-09-20 US US14/362,635 patent/US9280682B2/en active Active
- 2012-09-20 WO PCT/JP2012/074110 patent/WO2013084563A1/ja active Application Filing
- 2012-09-20 JP JP2013548119A patent/JP5588074B2/ja not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002183351A (ja) * | 2000-12-12 | 2002-06-28 | Hitachi Koukiyou Syst Eng Kk | 著作権侵害防止装置および防止方法 |
JP2006293455A (ja) * | 2005-04-06 | 2006-10-26 | Dainippon Printing Co Ltd | 不適正データ確認システム |
JP2010136373A (ja) * | 2008-12-05 | 2010-06-17 | Internatl Business Mach Corp <Ibm> | 写真認証のための電子写真デバイス、方法、およびシステム(写真認証システム) |
JP2011120214A (ja) * | 2009-11-04 | 2011-06-16 | Canon Inc | 画像配信装置及び画像配信方法 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015049762A (ja) * | 2013-09-02 | 2015-03-16 | キヤノン株式会社 | サーバ装置、情報処理方法及びプログラム |
Also Published As
Publication number | Publication date |
---|---|
DE112012005074T5 (de) | 2014-09-11 |
CN103975339B (zh) | 2016-08-24 |
US20140344948A1 (en) | 2014-11-20 |
CN103975339A (zh) | 2014-08-06 |
JP5588074B2 (ja) | 2014-09-10 |
JPWO2013084563A1 (ja) | 2015-04-27 |
US9280682B2 (en) | 2016-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5588074B2 (ja) | プライバシー情報管理装置、方法及びプログラム | |
US11791987B2 (en) | Content validation using blockchain | |
US10484429B1 (en) | Automated sensitive information and data storage compliance verification | |
US9485146B1 (en) | Providing services using a device capabilities service | |
US9900261B2 (en) | Shared resource watermarking and management | |
WO2018005644A1 (en) | System to track engagement of media items | |
US20160328416A1 (en) | System and method for identification and consolidation of related concurrent document sessions | |
JP6493079B2 (ja) | 情報処理装置及び情報処理プログラム | |
US10715842B2 (en) | Method and system for distributing internet cartoon content, and recording medium | |
EP3304402A1 (en) | Security vulnerability detection | |
US20170070462A1 (en) | System, apparatus, method, and non-transitory computer readable medium for providing location information using image in communication session | |
US20130275600A1 (en) | Resource Watermarking and Management | |
US9510182B2 (en) | User onboarding for newly enrolled devices | |
US10951790B1 (en) | Systems and methods for authenticating an image | |
US9665723B2 (en) | Watermarking detection and management | |
JP5991143B2 (ja) | 情報処理装置、システム及び情報登録方法 | |
JP5561207B2 (ja) | 位置情報信頼度決定プログラム及び位置情報信頼度決定装置 | |
KR102072288B1 (ko) | GANs을 이용한 보안 로그 데이터의 이상 탐지 방법 및 이를 수행하는 장치들 | |
JP7445017B2 (ja) | ユーザ識別子および署名収集を利用したモバイルアプリケーション偽造・変造探知方法、コンピュータプログラム、コンピュータ読み取り可能な記録媒体およびコンピュータ装置 | |
US9100239B2 (en) | Information processing system, portable information processing apparatus, and information processing method | |
KR101874049B1 (ko) | 소셜 네트워크 서비스 제공 방법 및 시스템 | |
KR102416178B1 (ko) | 사용자 그룹 생성을 위한 방법 및 장치 | |
JP6437610B1 (ja) | アクセス認証システム | |
KR101325533B1 (ko) | 음악 히스토리 서비스 방법, 모바일 단말기 및 기록매체 | |
JP2020197918A (ja) | 情報処理装置及びプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 12855431 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2013548119 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14362635 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 112012005074 Country of ref document: DE Ref document number: 1120120050746 Country of ref document: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 12855431 Country of ref document: EP Kind code of ref document: A1 |