EP2695098A1 - Method of parameterizing rules for broadcasting personal data - Google Patents
Method of parameterizing rules for broadcasting personal dataInfo
- Publication number
- EP2695098A1 EP2695098A1 EP12708870.6A EP12708870A EP2695098A1 EP 2695098 A1 EP2695098 A1 EP 2695098A1 EP 12708870 A EP12708870 A EP 12708870A EP 2695098 A1 EP2695098 A1 EP 2695098A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- user
- target contact
- personal data
- data
- behavioral
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 24
- 230000003542 behavioural effect Effects 0.000 claims abstract description 44
- 230000035945 sensitivity Effects 0.000 claims abstract description 39
- 238000009826 distribution Methods 0.000 claims description 16
- 230000006399 behavior Effects 0.000 claims description 14
- 238000004364 calculation method Methods 0.000 claims description 14
- 238000001914 filtration Methods 0.000 claims description 8
- 238000004590 computer program Methods 0.000 claims description 7
- 230000004931 aggregating effect Effects 0.000 claims description 4
- 230000002776 aggregation Effects 0.000 claims description 4
- 238000004220 aggregation Methods 0.000 claims description 4
- 238000011084 recovery Methods 0.000 claims description 3
- 238000011156 evaluation Methods 0.000 abstract description 3
- 230000001902 propagating effect Effects 0.000 abstract description 2
- 238000003860 storage Methods 0.000 description 8
- 230000000644 propagated effect Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000009792 diffusion process Methods 0.000 description 3
- 102100031437 Cell cycle checkpoint protein RAD1 Human genes 0.000 description 2
- 102100033934 DNA repair protein RAD51 homolog 2 Human genes 0.000 description 2
- 101001130384 Homo sapiens Cell cycle checkpoint protein RAD1 Proteins 0.000 description 2
- 101001132307 Homo sapiens DNA repair protein RAD51 homolog 2 Proteins 0.000 description 2
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 2
- 230000008451 emotion Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 230000000717 retained effect Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 238000007796 conventional method Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000763 evoking effect Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000007935 neutral effect Effects 0.000 description 1
- ZRHANBBTXQZFSP-UHFFFAOYSA-M potassium;4-amino-3,5,6-trichloropyridine-2-carboxylate Chemical group [K+].NC1=C(Cl)C(Cl)=NC(C([O-])=O)=C1Cl ZRHANBBTXQZFSP-UHFFFAOYSA-M 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000007480 spreading Effects 0.000 description 1
- 238000003892 spreading Methods 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 230000003245 working effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0201—Market modelling; Market analysis; Collecting market data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
Definitions
- the present invention relates to the field of social networks and the dissemination of personal data within these social networks.
- the invention relates to a method of setting the rules for the distribution of personal data of a user of a social network.
- the invention also relates to a system for setting up the distribution rules of personal data of a user of a social network, to an application server and to a computer program product.
- a social network therefore allows its users to enter personal data relating to privacy and to interact with other users.
- the information likely to be made available to the network mainly concerns the civil status, studies or profession, or centers of interest. This information then makes it possible to find users sharing the same interests.
- the use of social networks then extends to a simple sharing of personal data, relating to privacy, through photographs, links, or texts for example. But these social networks can also be used to form public groups to publicize institutions, companies or causes. variety. Interactions between members of such groups include the sharing of correspondence and multimedia documents in particular.
- users' personal data is used by advertisers to send targeted advertisements.
- Social networks can also legally resell information about their members, not just their profile but also their consumer behavior, in order to better target advertising.
- Some companies also collect personal data, publicly available, to collect information about their employees. recruiters can also collect information and use it for the selection of their candidates.
- Political or governmental organizations may also collect information and supplement their files.
- users also incur a high risk of identity theft. Other users are more cautious and do not wish to insert their personal data lest they be used without their consent or stolen.
- the invention therefore aims to remedy at least one of the disadvantages of the prior art.
- the invention aims to make it possible to evaluate the danger that represent a potential contact of a social network user, to propagate personal data deemed sensitive by the user.
- the subject of the invention is a method for setting up rules for broadcasting personal data of a user of a social network with respect to a target contact, said personal data being classified by categories, said method comprising the steps of:
- the method allows to assign an evaluation score to the target contact, and to establish a recommendation of parameterization for the user, according to the assessment of the danger that represents the contact target to propagate data.
- the calculation of the notes is further refined by a collaborative exchange of notes with at least one common contact between said user and said target contact,
- - issuing a recommendation consists in issuing an alert message proposing to block access to a category of personal data for the said target contact, provided that the overall score obtained for said category of personal data is less than a predetermined threshold value,
- the threshold value is modified according to a decision of said user to follow or not said recommendation issued
- the recovery of the behavioral data of said target contact is achieved by means of contacts common to said user and said target contact, and by means of publicly available data,
- the sensitivity profile of said user is automatically modified according to requests made by said user for a display of the scores assigned to the target contact.
- the invention also relates to a system for setting up personal data distribution rules of a social network user vis-à-vis a target contact, said personal data being classified by categories, characterized in that that said system comprises:
- an input means enabling said user to define a sensitivity profile, by ranking said categories of personal data and weighting behavioral factors, according to a degree of importance that the user gives them in relation to 'a public broadcast,
- a request module adapted to recover behavioral data from said target contact
- a calculation module capable of estimating and assigning a score to predetermined behavioral factors of said target contact, from said recovered behavioral data, each behavior factor being noted for each category of personal data hierarchical in said profile of sensitivities of said user,
- an aggregation module capable of aggregating the estimated scores by taking into account the weighting attributed to each of said behavioral factors in said sensitivity profile, in order to obtain an overall score attributed to said target contact for all the categories of data personal hierarchy in the profile of sensitivities, and for each of them, a recommendation module able to issue a recommendation for setting the rules for the distribution of personal data for said user with respect to said target contact based on the overall scores obtained.
- the system further comprises a learning module (80) able on the one hand to modify parameterization decision rules, according to a decision by said user to follow or not said recommendation issued and on the other hand, to modify the sensitivity profile of said user according to a request from said user for a display of the scores assigned to the target contact,
- a learning module 80
- system further comprises a filtering module adapted to establish a correspondence between the categories of hierarchical personal data of said profile of sensitivities of the user and the behavioral data of said target contact retrieved by said request module.
- the invention further relates to an application server comprising at least one microprocessor and a memory for implementing the parameterization method as described above.
- the invention finally relates to a computer program product intended to be loaded into a memory of an application server, the computer program product comprising portions of software code implementing the method such as described above, when the program is executed by an application server processor.
- the invention improves the confidentiality and / or secure control of the dissemination of personal data about a user without requiring encryption of personal data. Consequently, the invention constitutes a simple and effective alternative that does not require the use of encryption algorithms requiring significant software and hardware resources (in particular in terms of processor and memory) to avoid an anarchic distribution of personal data. It is therefore well adapted to the context of social networks.
- Other advantages and features of the invention will appear on reading the following description given by way of illustrative and nonlimiting example, with reference to the appended figures which represent:
- Figure 1 a simplified diagram of a social network on which users meet
- FIG. 2 a diagram of a system for setting up the distribution rules for the personal data of a social network user vis-à-vis a target contact
- FIG. 3 a diagram of a graphic interface for displaying the scores estimated by the system of FIG. 2, for a selected target contact,
- FIG. 4 a flowchart representing the process steps implemented by the system of FIG. 2.
- the term "user” refers to a social network user who opened an account, created his profile to publish personal data and created a network of contacts including different groups of contacts.
- a target contact is defined as another user of said social network who wishes to integrate the user's network of contacts, or that the user plans to integrate or that the user has already integrated into his network of contacts.
- Figure 1 shows a network, through which users U, C, CC connect their respective computers 1, 2, 3 to a remote server RS social network.
- a user U then encounters C and CC contacts of the social network. He may want to integrate a CC target contact into his contact network.
- the user connects via an IT telecommunication network to a remote parameter server SP arranged to implement the parameterization method according to the invention.
- the system shown in Figure 2 helps the user to set his own data dissemination rules, based on an assessment of the danger that the target contact to propagate said data. For this, the system analyzes behavioral data of the target contact.
- FIG. 2 is described in parallel with FIG. 4 to clarify the role of each functional module of the system in the parameterization process.
- a first step 300 the user previously defines his profile PROF sensibilities in terms of dissemination of personal data, relating to his private life.
- an input means 10 for example in the form of a graphical interface that is displayed on the screen of his computer, allows the user to define this PROF profile.
- the user ranks the categories of personal data that he considers more or less relevant and to which he gives more or less importance vis-à-vis a broadcast.
- the categories of data deemed important, or sensitive are the categories of data that the user does not want to propagate on a global telecommunication network such as the web.
- a first group that is taken into account to achieve this profile includes all the topics addressed by the user, according to thematic categories.
- the user can be vigilant about the dissemination of his personal data concerning thematic categories on his family or politics and gives them a high degree of importance.
- it may give less or no importance to a category relating to sport, for example.
- the user classifies the thematic categories in order of importance, in a drop-down menu for example.
- the user places the subject on the family first, the subject on politics second, while he places the subject on the sport last.
- a second group groups the types of content, according to different categories that define the means by which data is published. These categories of content types vary from one social network to another. The most common in social networks are for example photos, videos, status, events, or groups. In his profile of sensitivities, the user defines what categories of object types are more or less important for him. Thus, it can give more importance to photos than status. In this case too, it classifies each type of object, according to the importance that it grants him. Moreover, in the definition of its sensitivity profile, the user takes into account, in addition, another group of data, referred to as "behavioral factors". This group groups different categories of behaviors that can have a target contact with respect to privacy.
- These different categories of behavior are, for example, the fact of easily propagating data that does not belong to the target contact, or the manner in which the target contact disseminates the data, especially if feelings are expressed during the broadcast, or the fact not to set privacy rules when the target contact creates their profile in a social network.
- the user can give more importance to a propensity factor to propagate, which assesses the dangers of a target contact to propagate personal data.
- Other factors take into account the popularity of the target contact, the way in which it propagates the data, if the target contact quotes other contacts during the data dissemination, etc. These factors are detailed below in relation to the calculation module.
- the user then assigns a weighting, or importance score, for example between 0 and 1, such as 0.4, the lowest score being judged to be less important than the highest score.
- a weighting for example between 0 and 1, such as 0.4, the lowest score being judged to be less important than the highest score.
- the user therefore defines his sensitivity profile by prioritizing the categories of personal data and weighting behavioral factors, according to the importance that the user attaches to said categories of personal data and to said behavioral factors vis-à-vis public broadcasting.
- the user can also associate a theme with an object type. For example, he can define that the data concerning the subject on the family in the object type "photos" is sensitive, while the same subject is not in the object type "status” for example. In this case too, we can attribute to this association a weighting between 0 and 1.
- the sensitivity profile thus defined by the user is advantageously recorded in a storage means 11.
- This storage means may be remote and is for example in the form of a database.
- the user selects, in step 310, a target contact CC1 for which he wishes to evaluate the danger that it represents in terms of data dissemination.
- This selection of the target contact can be done via a graphical interface that appears on the screen of his computer. This graphic interface is referenced 60 in FIGS. 2 and 3.
- the selection of the target contact then triggers the operation of a request module 20.
- This request module 20 is used to recover, in step 320, DC behavioral data relating to the selected target contact, vis-à-vis which the user wants to set the distribution rules of his personal data.
- the module 20 is divided into two entities 21 and 24.
- the first entity 21 collects publicly available data on the web.
- a first collector 22 research on the web if there is available information on the behavior of the target contact, relating to compliance with privacy rules.
- This collector can for example check if the target contact owns a website and if the parameters of this website, in terms of respect for personal data, are high or low.
- Another collector 23 makes it possible to retrieve information from social networks for which the target contact is a member but for which he has not set rules concerning respect for privacy and the dissemination of his personal data.
- This collector 23 can also retrieve information from social networks, and more particularly from public profiles, that is to say non-parametric profiles of users of these networks with which the target contact has interacted.
- the second entity 24 retrieves behavioral data on the target contact from the user's contact network.
- a first collector 25 makes it possible to recover data on the target contact directly on its profile, and visible to the user. In this case, the user must then be in a specific relationship with the target contact, that is to say that he has already integrated it into his network of contacts.
- Another collector 26 consists in collecting data on the target contact from information retrieved from the profiles of the common contacts between the user and the target contact. In this case, the user and the target contact do not need to be in direct contact. It is the information held by the common contacts that will serve.
- this collector 26 can access comments that the target contact has given on topics held by the common contacts.
- another collector 27 can retrieve notes the user's contacts, to qualify the target contact for protection and privacy.
- the calculated and visible scores in the profiles of the common contacts are for example obtained with this same system.
- the data thus recovered are transmitted to a filtering module 30.
- the sensitivity profile recorded in the storage means 1 1 is also transmitted to the filtering module.
- This filtering module 30 makes it possible, from the behavioral data DC recovered by the different data collectors 22, 23, 25, 26, 27 of the request module 20, and data relating to the profile of the user's sensitivities. mapping between the user-prioritized data categories and the DC behavioral data of the selected CC1 target contact.
- the filtering module 30 is optional, it facilitates subsequent estimates by eliminating all the data for which no match could be established. To make its analyzes, to establish its correspondences and to carry out its filtering, the module 30 is based advantageously on techniques of semantic analysis.
- a calculation module 40 then makes it possible, in step 330, to estimate and assign a note N F / di to predetermined behavioral factors of the target contact CC1. For this, the calculation module 40 is based on the data transmitted by the filtering module 30.
- a behavior factor is associated with each category of personal data prioritized in the sensitivity profile and, for each of these associations, it is assigned to it a note N F / di so for each theme and each type of object selected by the user in its sensitivities profile, a note is estimated and assigned to the propensity factor of the target contact spread the data, and so continued for each behavioral factor.
- the calculation module 40 counts, from the data supplied to it, the number of times the target contact has commented or tagged for example objects, such as photo or video links or status, do not not belonging. The more the target contact often does, the higher the score assigned to the factor. For example, when dealing with the propagation of a status, the intensity of the propagation is measured by taking into account the number of times that the target contact propagated the object, the number of times that other users also propagated the object, and the number of users who saw the object without spreading it. Thus, when the target contact has sent three comments on a status for example, the note of the propensity factor to propagate the type of object "status" will be higher than when it sends only one comment.
- the popularity factor represents the popularity of the target contact in comparison with reference measurements. These reference measurements can for example be defined as the average behavior of the user's contacts.
- the rating given to this popularity factor is based on the number of contacts the target contact has in their relationship network, on the percentage of people in an "event" object that the target contact has created, or on the number of times an object type is propagated.
- the sensitivity factor represents the degree of neutrality of a sentence.
- the measure of the degree of neutrality can be achieved by conventional techniques of extracting emotions, such as the detection of smileys for example, which are stylized drawings of faces used to express emotions.
- the analysis of the degree of neutrality of all the terms of a sentence can also be carried out using statistical dictionaries, such as, for example, the dictionary "SentiWordnet" (registered mark) which can be consulted at the internet address. http://sentiwornet.isti.cnr.it.
- the aggregation of the score assigned to each of the terms of a sentence gives the note of the sentence. The more extreme the note is, that is, close to 0 or 1, the more sensitive the sentence is.
- a score of 0.5 means that the target contact remains neutral in the propagation of his messages and does not transmit his feelings. This factor is important because it reveals the quality of the spread when personal feelings are spread.
- the exposure factor makes it possible to deduce if the target contact has configured its personal data distribution parameters in a private or public sense. It helps the user to know if he can interact with the target contact without risk.
- the calculation module is based on the number of times that the data of the target contact speak of third parties. For that, it bases for example on the contents of the messages evoking thirds as well as the photos which are marked, or tagged, with its contacts. In this case, the calculation module analyzes the percentage of contacts involved, the number of times they are cited, etc.
- the proximity factor represents the proximity of the target contact to the user.
- the propensity factor to facilitate diffusion makes it possible to know if the target contact facilitated access to already propagated data.
- the notes N F d i thus estimated are then transferred to an aggregator module 50.
- This module makes it possible to calculate (step 340) a global evaluation score NGdi associated with the target contact CC1, for all the categories of data. personal hierarchy in the profile of sensitivities, and also for each of these categories of personal data.
- This overall rating NG d i reflects the behavior of the target contact CC1 selected, vis-à-vis the protection of personal data, that is to say, it assesses the dangerousness of the target contact to propagate data the user's personal details.
- This aggregator module 50 in a variant embodiment can be confused with the calculation module 40. It calculates an overall score by aggregating all the scores estimated by the module calculator 40 for each behavioral factor associated with a category of personal data.
- the aggregation takes into account the weighting of each behavioral factor as defined in the user's sensitivity profile. The higher the weighting of behavioral factors in the sensitivity profile, the more sensitive they are to the user, and the more they affect the value of the overall score. The calculation is therefore weighted according to the importance given to the various behavioral factors by the user.
- the notes can also be estimated collaboratively. Indeed, two users in contact, who have a relationship of great confidence and who share a lot of data can exchange the notes they have estimated for the same target contact and combine them to further refine their estimates. Therefore, optionally, and with the agreement of his / her contact (s), the user retrieves the score assigned to the target contact by his / her contact (s) and checks whether the information is relevant to him / her. . It can for example take into account the number of contacts that took into account this collaborative calculation, or the added value of this note, to include it in a significant way in its estimate. In return, the user sends the note he estimated to his (her) contact (s). This recovery of the notes for a collaborative calculation is performed by the collector 27 of the request module 20 as described above.
- This storage means 51 may for example be a database.
- This database also stores the context in which the estimates were made. For example, context can include contacts that contributed to rating estimates.
- context can include contacts that contributed to rating estimates.
- this database can allow to resume a note when it is necessary to recalculate. This may for example be the case when the user integrates into his network new contacts common to the target contact.
- the notes thus obtained are advantageously displayed, for example through the graphical interface 60, which is displayed on the computer screen of the user.
- This interface 60 is the one that has previously been used to select the CC1 target contact. It is represented diagrammatically in FIG. 3. It makes it possible to display to the user the scores attributed to the target contact that he plans to integrate into his contact network.
- the operation of the system is triggered by this interface.
- the user can use this interface after receiving an invitation from a target contact unknown to him, or if he wants to obtain more information about a person who is already in his network of contacts. This makes it possible to better regulate its distribution parameters of its personal data.
- a first field 62 displays the overall score NG obtained for the target contact CC1 for all categories of personal data.
- the overall score NG assigned to the target contact CC1 is equal to 0.35.
- Other fields 63a, 63b, 63c display the overall scores NG d i obtained according to the themes and types of objects.
- the field 63a displays a note equal to 0.4 for the type of object "photo”.
- the field 63b displays a score of 0.1 for the subject relating to the family Fam and the field 63c displays a note equal to 0.7 for the object type "event" EV.
- These three notes therefore mean that the selected target contact CC1 tends to propagate the data about the subject very broadly on the family, it also broadcasts the photos, but it diffuse less the type of object "event".
- These fields 63 display in particular the notes in an order corresponding to the preferences of the user, that is to say according to the themes and types of objects that are most relevant to him. The results are also displayed according to their values.
- This interface also allows the user to view all the notes that have been estimated and not only the most relevant, thanks to drop-down menus.
- a first window 64 displays the public data Dl belonging to the target contact and obtained directly on the profile of the target contact or on other public sites.
- the window can for example display the percentage of photos that the target contact has tagged, 78% in the example of Figure 3, and the percentage, 23% in the example of Figure 3, of common contacts CCom tagged .
- This window can also display a status for example to reveal some of the data that allowed the generation of the note.
- a second window 65 displays the behavioral data of the target contact not belonging to the target contact and obtained through the CCI common contacts with which it has interaction.
- the notes thus obtained are both transmitted to a recommendation module 70 and to a learning module 80.
- the user's browsing history in the display interface 60 of the notes is advantageously transmitted. to the learning module Ap 80.
- the data of the display history make it possible to better understand and apprehend the sensitivities of the user. Indeed, if the user often asks to display information on a particular theme that was not considered important in his profile 1 1 of sensitivities, its importance will then be raised and updated in its profile 1 1 of PROF sensitivities , so that this data is displayed in the first the following times.
- the operation of the recommendation module 70 in turn is triggered by the interface 60, when the user requests to display recommendations to configure its settings options rules for the dissemination of his personal data.
- This module 70 thus makes it possible to establish a recommendation strategy by comparing the scores assigned to the target contact with predefined threshold values in decision rules, contained in a storage means 81 such as a database for example.
- This database 81 contains basic decision rules that can be applied by default. Such a rule can for example consist in saying that if the note NG d i obtained, for a particular type of object, is lower than a threshold value If, for example 0.75, then the target contact can not have access to the data of this type of object. Otherwise, there may be access.
- the decision rules, stored in the database 81, are transmitted to the recommendation module 70 and, depending on the notes transmitted to it, it issues one or more recommendation (s) REC1 (di), REC2 (di) to destination of the user (steps 350, 351, 352). So, in one example, the note NGdi obtained for the photo object is 0.4 and below a predefined threshold value Si of 0.75 for this object (step 350). In this case, the recommendation module 70 issues a recommendation REC1 (step 351) to say that access to the photo object CC1 should not be given.
- the recommendation module 70 issues a recommendation REC2 for the object.
- an event object consisting in saying that the user can give access to this object to the target contact CC1 (step 352).
- the recommendations issued in terms of setting up the rules for distributing personal data with respect to the target contact are then displayed in another window 91 of another graphical interface 90 which is displayed on the screen of the user. 'user.
- the user can then follow these recommendations (step 360) and, in this case, his own distribution rules vis-à-vis the target contact, stored in a database type of storage means 92, will be automatically updated (step 370). He can also refuse the recommendation.
- the learning module 80 is informed of the decision of the user (step 380) and updates (step 390) the decision rules contained in the database 81, so that next time the behavior of the system better corresponds to the wishes of the user. For example, if a recommendation is to prevent the target contact from accessing the object type "photo" and still giving the user access, the threshold value Si of the note for this type of object is lowered in the corresponding decision rule.
- the two storage means 1 and 81 respectively of the user's sensitivity profile and decision rules can be collected in a single database.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Entrepreneurship & Innovation (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Economics (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Data Mining & Analysis (AREA)
- Bioethics (AREA)
- Tourism & Hospitality (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Quality & Reliability (AREA)
- Computing Systems (AREA)
- Operations Research (AREA)
- Primary Health Care (AREA)
- Game Theory and Decision Science (AREA)
- Mathematical Physics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1152934A FR2973906B1 (en) | 2011-04-05 | 2011-04-05 | METHOD FOR SETTING PERSONAL DATA DISSEMINATION RULES |
PCT/EP2012/054718 WO2012136462A1 (en) | 2011-04-05 | 2012-03-16 | Method of parameterizing rules for broadcasting personal data |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2695098A1 true EP2695098A1 (en) | 2014-02-12 |
Family
ID=45833431
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP12708870.6A Withdrawn EP2695098A1 (en) | 2011-04-05 | 2012-03-16 | Method of parameterizing rules for broadcasting personal data |
Country Status (7)
Country | Link |
---|---|
US (1) | US20140026184A1 (en) |
EP (1) | EP2695098A1 (en) |
JP (1) | JP5864720B2 (en) |
KR (1) | KR101519401B1 (en) |
CN (1) | CN103562929B (en) |
FR (1) | FR2973906B1 (en) |
WO (1) | WO2012136462A1 (en) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9110998B2 (en) | 2011-12-22 | 2015-08-18 | Google Technology Holdings LLC | Hierarchical behavioral profile |
US8943015B2 (en) | 2011-12-22 | 2015-01-27 | Google Technology Holdings LLC | Hierarchical behavioral profile |
JPWO2014073214A1 (en) * | 2012-11-12 | 2016-09-08 | 日本電気株式会社 | Information processing system and personal information analysis method for analyzing personal information |
US9278255B2 (en) | 2012-12-09 | 2016-03-08 | Arris Enterprises, Inc. | System and method for activity recognition |
US10212986B2 (en) | 2012-12-09 | 2019-02-26 | Arris Enterprises Llc | System, apparel, and method for identifying performance of workout routines |
EP2747371B1 (en) | 2012-12-24 | 2018-02-07 | Alcatel Lucent | Access policy definition with respect to a data object |
US20160092773A1 (en) * | 2014-09-26 | 2016-03-31 | Microsoft Corporation | Inference-based individual profile |
WO2016149929A1 (en) * | 2015-03-26 | 2016-09-29 | Nokia Technologies Oy | Method, apparatus and computer program product for identifying a vulnerable friend for privacy protection in a social network |
US9894076B2 (en) | 2015-10-09 | 2018-02-13 | International Business Machines Corporation | Data protection and sharing |
US10475144B2 (en) | 2016-02-26 | 2019-11-12 | Microsoft Technology Licensing, Llc | Presenting context-based guidance using electronic signs |
US20170289794A1 (en) * | 2016-04-02 | 2017-10-05 | Microsoft Technology Licensing, Llc | Rules-Based Identity Broadcast |
CN107918740A (en) * | 2017-12-02 | 2018-04-17 | 北京明朝万达科技股份有限公司 | A kind of sensitive data decision-making decision method and system |
CN111460495B (en) * | 2020-03-27 | 2023-06-23 | 北京锐安科技有限公司 | Data hierarchical management system and method |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003223394A (en) * | 2001-11-20 | 2003-08-08 | Matsushita Electric Ind Co Ltd | Device having negotiation function and agreement formation system |
JP2004192353A (en) * | 2002-12-11 | 2004-07-08 | Nippon Telegr & Teleph Corp <Ntt> | Personal information disclosure control system and its method |
US7606772B2 (en) * | 2003-11-28 | 2009-10-20 | Manyworlds, Inc. | Adaptive social computing methods |
JP2007193611A (en) * | 2006-01-19 | 2007-08-02 | Looops Communications Inc | System for managing profile information in membership community site |
US8234688B2 (en) * | 2009-04-03 | 2012-07-31 | International Business Machines Corporation | Managing privacy settings for a social network |
US20100280965A1 (en) * | 2009-04-30 | 2010-11-04 | Nokia Corporation | Method and apparatus for intuitive management of privacy settings |
US9704203B2 (en) | 2009-07-31 | 2017-07-11 | International Business Machines Corporation | Providing and managing privacy scores |
-
2011
- 2011-04-05 FR FR1152934A patent/FR2973906B1/en not_active Expired - Fee Related
-
2012
- 2012-03-12 US US14/009,968 patent/US20140026184A1/en not_active Abandoned
- 2012-03-16 EP EP12708870.6A patent/EP2695098A1/en not_active Withdrawn
- 2012-03-16 KR KR1020137029167A patent/KR101519401B1/en active IP Right Grant
- 2012-03-16 JP JP2014503054A patent/JP5864720B2/en not_active Expired - Fee Related
- 2012-03-16 WO PCT/EP2012/054718 patent/WO2012136462A1/en active Application Filing
- 2012-03-16 CN CN201280025635.6A patent/CN103562929B/en not_active Expired - Fee Related
Non-Patent Citations (2)
Title |
---|
None * |
See also references of WO2012136462A1 * |
Also Published As
Publication number | Publication date |
---|---|
FR2973906B1 (en) | 2015-07-31 |
FR2973906A1 (en) | 2012-10-12 |
JP2014515855A (en) | 2014-07-03 |
CN103562929B (en) | 2017-03-15 |
US20140026184A1 (en) | 2014-01-23 |
CN103562929A (en) | 2014-02-05 |
WO2012136462A1 (en) | 2012-10-11 |
JP5864720B2 (en) | 2016-02-17 |
KR20140002025A (en) | 2014-01-07 |
KR101519401B1 (en) | 2015-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2695098A1 (en) | Method of parameterizing rules for broadcasting personal data | |
Dhir et al. | Why do adolescents untag photos on Facebook? | |
US10673988B2 (en) | Creation, publication and display of content on a social media network | |
US20170286539A1 (en) | User profile stitching | |
US10091324B2 (en) | Content feed for facilitating topic discovery in social networking environments | |
Salathé et al. | The dynamics of health behavior sentiments on a large online social network | |
US20110264531A1 (en) | Watching a user's online world | |
US8676875B1 (en) | Social media measurement | |
RU2571401C2 (en) | Method, system for displaying activities of friends and computer storage medium | |
EP3035647B1 (en) | Method to jointly select cloud computing and network services | |
US9830668B1 (en) | Identifying top fans | |
Sotoudeh et al. | Effects of the peer metagenomic environment on smoking behavior | |
FR2983610A1 (en) | COMMUNICATION NETWORK WITH IMPROVED CONNECTION TRAFFIC | |
Zhang et al. | Structurally embedded news consumption on mobile news applications | |
FR3091602A1 (en) | Method for creating avatars to protect sensitive data | |
EP3494494A1 (en) | Means for broadcasting a personalized content in a communication network | |
WO2016198635A1 (en) | Management of internet domain names | |
Magnani et al. | Friendfeed breaking news: death of a public figure | |
US20110264525A1 (en) | Searching a user's online world | |
US20190334964A1 (en) | Personalizing a social networking profile page | |
FR2875929A1 (en) | INTERACTIVE INTELLIGENT INFORMATION MANAGEMENT SYSTEM AND METHOD | |
US11036786B2 (en) | Determining user segmentation based on a photo library | |
WO2022043306A1 (en) | System for managing multimedia content published via a social network, the system being configured to adapt the broadcasting duration of a file to be shared based on evaluations | |
FR3040100A1 (en) | METHOD FOR AUTOMATIC DETERMINATION OF RECOMMENDATION (S) OF ACTION (S) TO BE MADE IN PERSONS OF AN ORGANIZATION, AND COMPUTER APPARATUS THEREFOR | |
JP2024042574A (en) | Information processing device, information processing method, and information processing program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20131105 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
DAX | Request for extension of the european patent (deleted) | ||
111Z | Information provided on other rights and legal means of execution |
Free format text: AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR Effective date: 20140516 |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ALCATEL LUCENT |
|
D11X | Information provided on other rights and legal means of execution (deleted) | ||
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ALCATEL LUCENT |
|
17Q | First examination report despatched |
Effective date: 20190821 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20200303 |