EP2695098A1 - Procédé de paramétrage de règles de diffusion de données personnelles - Google Patents

Procédé de paramétrage de règles de diffusion de données personnelles

Info

Publication number
EP2695098A1
EP2695098A1 EP12708870.6A EP12708870A EP2695098A1 EP 2695098 A1 EP2695098 A1 EP 2695098A1 EP 12708870 A EP12708870 A EP 12708870A EP 2695098 A1 EP2695098 A1 EP 2695098A1
Authority
EP
European Patent Office
Prior art keywords
user
target contact
personal data
data
behavioral
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP12708870.6A
Other languages
German (de)
English (en)
French (fr)
Inventor
David Pergament
Armen Aghasaryan
Jean Gabriel GANASCIA
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alcatel Lucent SAS
Original Assignee
Alcatel Lucent SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alcatel Lucent SAS filed Critical Alcatel Lucent SAS
Publication of EP2695098A1 publication Critical patent/EP2695098A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Definitions

  • the present invention relates to the field of social networks and the dissemination of personal data within these social networks.
  • the invention relates to a method of setting the rules for the distribution of personal data of a user of a social network.
  • the invention also relates to a system for setting up the distribution rules of personal data of a user of a social network, to an application server and to a computer program product.
  • a social network therefore allows its users to enter personal data relating to privacy and to interact with other users.
  • the information likely to be made available to the network mainly concerns the civil status, studies or profession, or centers of interest. This information then makes it possible to find users sharing the same interests.
  • the use of social networks then extends to a simple sharing of personal data, relating to privacy, through photographs, links, or texts for example. But these social networks can also be used to form public groups to publicize institutions, companies or causes. variety. Interactions between members of such groups include the sharing of correspondence and multimedia documents in particular.
  • users' personal data is used by advertisers to send targeted advertisements.
  • Social networks can also legally resell information about their members, not just their profile but also their consumer behavior, in order to better target advertising.
  • Some companies also collect personal data, publicly available, to collect information about their employees. recruiters can also collect information and use it for the selection of their candidates.
  • Political or governmental organizations may also collect information and supplement their files.
  • users also incur a high risk of identity theft. Other users are more cautious and do not wish to insert their personal data lest they be used without their consent or stolen.
  • the invention therefore aims to remedy at least one of the disadvantages of the prior art.
  • the invention aims to make it possible to evaluate the danger that represent a potential contact of a social network user, to propagate personal data deemed sensitive by the user.
  • the subject of the invention is a method for setting up rules for broadcasting personal data of a user of a social network with respect to a target contact, said personal data being classified by categories, said method comprising the steps of:
  • the method allows to assign an evaluation score to the target contact, and to establish a recommendation of parameterization for the user, according to the assessment of the danger that represents the contact target to propagate data.
  • the calculation of the notes is further refined by a collaborative exchange of notes with at least one common contact between said user and said target contact,
  • - issuing a recommendation consists in issuing an alert message proposing to block access to a category of personal data for the said target contact, provided that the overall score obtained for said category of personal data is less than a predetermined threshold value,
  • the threshold value is modified according to a decision of said user to follow or not said recommendation issued
  • the recovery of the behavioral data of said target contact is achieved by means of contacts common to said user and said target contact, and by means of publicly available data,
  • the sensitivity profile of said user is automatically modified according to requests made by said user for a display of the scores assigned to the target contact.
  • the invention also relates to a system for setting up personal data distribution rules of a social network user vis-à-vis a target contact, said personal data being classified by categories, characterized in that that said system comprises:
  • an input means enabling said user to define a sensitivity profile, by ranking said categories of personal data and weighting behavioral factors, according to a degree of importance that the user gives them in relation to 'a public broadcast,
  • a request module adapted to recover behavioral data from said target contact
  • a calculation module capable of estimating and assigning a score to predetermined behavioral factors of said target contact, from said recovered behavioral data, each behavior factor being noted for each category of personal data hierarchical in said profile of sensitivities of said user,
  • an aggregation module capable of aggregating the estimated scores by taking into account the weighting attributed to each of said behavioral factors in said sensitivity profile, in order to obtain an overall score attributed to said target contact for all the categories of data personal hierarchy in the profile of sensitivities, and for each of them, a recommendation module able to issue a recommendation for setting the rules for the distribution of personal data for said user with respect to said target contact based on the overall scores obtained.
  • the system further comprises a learning module (80) able on the one hand to modify parameterization decision rules, according to a decision by said user to follow or not said recommendation issued and on the other hand, to modify the sensitivity profile of said user according to a request from said user for a display of the scores assigned to the target contact,
  • a learning module 80
  • system further comprises a filtering module adapted to establish a correspondence between the categories of hierarchical personal data of said profile of sensitivities of the user and the behavioral data of said target contact retrieved by said request module.
  • the invention further relates to an application server comprising at least one microprocessor and a memory for implementing the parameterization method as described above.
  • the invention finally relates to a computer program product intended to be loaded into a memory of an application server, the computer program product comprising portions of software code implementing the method such as described above, when the program is executed by an application server processor.
  • the invention improves the confidentiality and / or secure control of the dissemination of personal data about a user without requiring encryption of personal data. Consequently, the invention constitutes a simple and effective alternative that does not require the use of encryption algorithms requiring significant software and hardware resources (in particular in terms of processor and memory) to avoid an anarchic distribution of personal data. It is therefore well adapted to the context of social networks.
  • Other advantages and features of the invention will appear on reading the following description given by way of illustrative and nonlimiting example, with reference to the appended figures which represent:
  • Figure 1 a simplified diagram of a social network on which users meet
  • FIG. 2 a diagram of a system for setting up the distribution rules for the personal data of a social network user vis-à-vis a target contact
  • FIG. 3 a diagram of a graphic interface for displaying the scores estimated by the system of FIG. 2, for a selected target contact,
  • FIG. 4 a flowchart representing the process steps implemented by the system of FIG. 2.
  • the term "user” refers to a social network user who opened an account, created his profile to publish personal data and created a network of contacts including different groups of contacts.
  • a target contact is defined as another user of said social network who wishes to integrate the user's network of contacts, or that the user plans to integrate or that the user has already integrated into his network of contacts.
  • Figure 1 shows a network, through which users U, C, CC connect their respective computers 1, 2, 3 to a remote server RS social network.
  • a user U then encounters C and CC contacts of the social network. He may want to integrate a CC target contact into his contact network.
  • the user connects via an IT telecommunication network to a remote parameter server SP arranged to implement the parameterization method according to the invention.
  • the system shown in Figure 2 helps the user to set his own data dissemination rules, based on an assessment of the danger that the target contact to propagate said data. For this, the system analyzes behavioral data of the target contact.
  • FIG. 2 is described in parallel with FIG. 4 to clarify the role of each functional module of the system in the parameterization process.
  • a first step 300 the user previously defines his profile PROF sensibilities in terms of dissemination of personal data, relating to his private life.
  • an input means 10 for example in the form of a graphical interface that is displayed on the screen of his computer, allows the user to define this PROF profile.
  • the user ranks the categories of personal data that he considers more or less relevant and to which he gives more or less importance vis-à-vis a broadcast.
  • the categories of data deemed important, or sensitive are the categories of data that the user does not want to propagate on a global telecommunication network such as the web.
  • a first group that is taken into account to achieve this profile includes all the topics addressed by the user, according to thematic categories.
  • the user can be vigilant about the dissemination of his personal data concerning thematic categories on his family or politics and gives them a high degree of importance.
  • it may give less or no importance to a category relating to sport, for example.
  • the user classifies the thematic categories in order of importance, in a drop-down menu for example.
  • the user places the subject on the family first, the subject on politics second, while he places the subject on the sport last.
  • a second group groups the types of content, according to different categories that define the means by which data is published. These categories of content types vary from one social network to another. The most common in social networks are for example photos, videos, status, events, or groups. In his profile of sensitivities, the user defines what categories of object types are more or less important for him. Thus, it can give more importance to photos than status. In this case too, it classifies each type of object, according to the importance that it grants him. Moreover, in the definition of its sensitivity profile, the user takes into account, in addition, another group of data, referred to as "behavioral factors". This group groups different categories of behaviors that can have a target contact with respect to privacy.
  • These different categories of behavior are, for example, the fact of easily propagating data that does not belong to the target contact, or the manner in which the target contact disseminates the data, especially if feelings are expressed during the broadcast, or the fact not to set privacy rules when the target contact creates their profile in a social network.
  • the user can give more importance to a propensity factor to propagate, which assesses the dangers of a target contact to propagate personal data.
  • Other factors take into account the popularity of the target contact, the way in which it propagates the data, if the target contact quotes other contacts during the data dissemination, etc. These factors are detailed below in relation to the calculation module.
  • the user then assigns a weighting, or importance score, for example between 0 and 1, such as 0.4, the lowest score being judged to be less important than the highest score.
  • a weighting for example between 0 and 1, such as 0.4, the lowest score being judged to be less important than the highest score.
  • the user therefore defines his sensitivity profile by prioritizing the categories of personal data and weighting behavioral factors, according to the importance that the user attaches to said categories of personal data and to said behavioral factors vis-à-vis public broadcasting.
  • the user can also associate a theme with an object type. For example, he can define that the data concerning the subject on the family in the object type "photos" is sensitive, while the same subject is not in the object type "status” for example. In this case too, we can attribute to this association a weighting between 0 and 1.
  • the sensitivity profile thus defined by the user is advantageously recorded in a storage means 11.
  • This storage means may be remote and is for example in the form of a database.
  • the user selects, in step 310, a target contact CC1 for which he wishes to evaluate the danger that it represents in terms of data dissemination.
  • This selection of the target contact can be done via a graphical interface that appears on the screen of his computer. This graphic interface is referenced 60 in FIGS. 2 and 3.
  • the selection of the target contact then triggers the operation of a request module 20.
  • This request module 20 is used to recover, in step 320, DC behavioral data relating to the selected target contact, vis-à-vis which the user wants to set the distribution rules of his personal data.
  • the module 20 is divided into two entities 21 and 24.
  • the first entity 21 collects publicly available data on the web.
  • a first collector 22 research on the web if there is available information on the behavior of the target contact, relating to compliance with privacy rules.
  • This collector can for example check if the target contact owns a website and if the parameters of this website, in terms of respect for personal data, are high or low.
  • Another collector 23 makes it possible to retrieve information from social networks for which the target contact is a member but for which he has not set rules concerning respect for privacy and the dissemination of his personal data.
  • This collector 23 can also retrieve information from social networks, and more particularly from public profiles, that is to say non-parametric profiles of users of these networks with which the target contact has interacted.
  • the second entity 24 retrieves behavioral data on the target contact from the user's contact network.
  • a first collector 25 makes it possible to recover data on the target contact directly on its profile, and visible to the user. In this case, the user must then be in a specific relationship with the target contact, that is to say that he has already integrated it into his network of contacts.
  • Another collector 26 consists in collecting data on the target contact from information retrieved from the profiles of the common contacts between the user and the target contact. In this case, the user and the target contact do not need to be in direct contact. It is the information held by the common contacts that will serve.
  • this collector 26 can access comments that the target contact has given on topics held by the common contacts.
  • another collector 27 can retrieve notes the user's contacts, to qualify the target contact for protection and privacy.
  • the calculated and visible scores in the profiles of the common contacts are for example obtained with this same system.
  • the data thus recovered are transmitted to a filtering module 30.
  • the sensitivity profile recorded in the storage means 1 1 is also transmitted to the filtering module.
  • This filtering module 30 makes it possible, from the behavioral data DC recovered by the different data collectors 22, 23, 25, 26, 27 of the request module 20, and data relating to the profile of the user's sensitivities. mapping between the user-prioritized data categories and the DC behavioral data of the selected CC1 target contact.
  • the filtering module 30 is optional, it facilitates subsequent estimates by eliminating all the data for which no match could be established. To make its analyzes, to establish its correspondences and to carry out its filtering, the module 30 is based advantageously on techniques of semantic analysis.
  • a calculation module 40 then makes it possible, in step 330, to estimate and assign a note N F / di to predetermined behavioral factors of the target contact CC1. For this, the calculation module 40 is based on the data transmitted by the filtering module 30.
  • a behavior factor is associated with each category of personal data prioritized in the sensitivity profile and, for each of these associations, it is assigned to it a note N F / di so for each theme and each type of object selected by the user in its sensitivities profile, a note is estimated and assigned to the propensity factor of the target contact spread the data, and so continued for each behavioral factor.
  • the calculation module 40 counts, from the data supplied to it, the number of times the target contact has commented or tagged for example objects, such as photo or video links or status, do not not belonging. The more the target contact often does, the higher the score assigned to the factor. For example, when dealing with the propagation of a status, the intensity of the propagation is measured by taking into account the number of times that the target contact propagated the object, the number of times that other users also propagated the object, and the number of users who saw the object without spreading it. Thus, when the target contact has sent three comments on a status for example, the note of the propensity factor to propagate the type of object "status" will be higher than when it sends only one comment.
  • the popularity factor represents the popularity of the target contact in comparison with reference measurements. These reference measurements can for example be defined as the average behavior of the user's contacts.
  • the rating given to this popularity factor is based on the number of contacts the target contact has in their relationship network, on the percentage of people in an "event" object that the target contact has created, or on the number of times an object type is propagated.
  • the sensitivity factor represents the degree of neutrality of a sentence.
  • the measure of the degree of neutrality can be achieved by conventional techniques of extracting emotions, such as the detection of smileys for example, which are stylized drawings of faces used to express emotions.
  • the analysis of the degree of neutrality of all the terms of a sentence can also be carried out using statistical dictionaries, such as, for example, the dictionary "SentiWordnet" (registered mark) which can be consulted at the internet address. http://sentiwornet.isti.cnr.it.
  • the aggregation of the score assigned to each of the terms of a sentence gives the note of the sentence. The more extreme the note is, that is, close to 0 or 1, the more sensitive the sentence is.
  • a score of 0.5 means that the target contact remains neutral in the propagation of his messages and does not transmit his feelings. This factor is important because it reveals the quality of the spread when personal feelings are spread.
  • the exposure factor makes it possible to deduce if the target contact has configured its personal data distribution parameters in a private or public sense. It helps the user to know if he can interact with the target contact without risk.
  • the calculation module is based on the number of times that the data of the target contact speak of third parties. For that, it bases for example on the contents of the messages evoking thirds as well as the photos which are marked, or tagged, with its contacts. In this case, the calculation module analyzes the percentage of contacts involved, the number of times they are cited, etc.
  • the proximity factor represents the proximity of the target contact to the user.
  • the propensity factor to facilitate diffusion makes it possible to know if the target contact facilitated access to already propagated data.
  • the notes N F d i thus estimated are then transferred to an aggregator module 50.
  • This module makes it possible to calculate (step 340) a global evaluation score NGdi associated with the target contact CC1, for all the categories of data. personal hierarchy in the profile of sensitivities, and also for each of these categories of personal data.
  • This overall rating NG d i reflects the behavior of the target contact CC1 selected, vis-à-vis the protection of personal data, that is to say, it assesses the dangerousness of the target contact to propagate data the user's personal details.
  • This aggregator module 50 in a variant embodiment can be confused with the calculation module 40. It calculates an overall score by aggregating all the scores estimated by the module calculator 40 for each behavioral factor associated with a category of personal data.
  • the aggregation takes into account the weighting of each behavioral factor as defined in the user's sensitivity profile. The higher the weighting of behavioral factors in the sensitivity profile, the more sensitive they are to the user, and the more they affect the value of the overall score. The calculation is therefore weighted according to the importance given to the various behavioral factors by the user.
  • the notes can also be estimated collaboratively. Indeed, two users in contact, who have a relationship of great confidence and who share a lot of data can exchange the notes they have estimated for the same target contact and combine them to further refine their estimates. Therefore, optionally, and with the agreement of his / her contact (s), the user retrieves the score assigned to the target contact by his / her contact (s) and checks whether the information is relevant to him / her. . It can for example take into account the number of contacts that took into account this collaborative calculation, or the added value of this note, to include it in a significant way in its estimate. In return, the user sends the note he estimated to his (her) contact (s). This recovery of the notes for a collaborative calculation is performed by the collector 27 of the request module 20 as described above.
  • This storage means 51 may for example be a database.
  • This database also stores the context in which the estimates were made. For example, context can include contacts that contributed to rating estimates.
  • context can include contacts that contributed to rating estimates.
  • this database can allow to resume a note when it is necessary to recalculate. This may for example be the case when the user integrates into his network new contacts common to the target contact.
  • the notes thus obtained are advantageously displayed, for example through the graphical interface 60, which is displayed on the computer screen of the user.
  • This interface 60 is the one that has previously been used to select the CC1 target contact. It is represented diagrammatically in FIG. 3. It makes it possible to display to the user the scores attributed to the target contact that he plans to integrate into his contact network.
  • the operation of the system is triggered by this interface.
  • the user can use this interface after receiving an invitation from a target contact unknown to him, or if he wants to obtain more information about a person who is already in his network of contacts. This makes it possible to better regulate its distribution parameters of its personal data.
  • a first field 62 displays the overall score NG obtained for the target contact CC1 for all categories of personal data.
  • the overall score NG assigned to the target contact CC1 is equal to 0.35.
  • Other fields 63a, 63b, 63c display the overall scores NG d i obtained according to the themes and types of objects.
  • the field 63a displays a note equal to 0.4 for the type of object "photo”.
  • the field 63b displays a score of 0.1 for the subject relating to the family Fam and the field 63c displays a note equal to 0.7 for the object type "event" EV.
  • These three notes therefore mean that the selected target contact CC1 tends to propagate the data about the subject very broadly on the family, it also broadcasts the photos, but it diffuse less the type of object "event".
  • These fields 63 display in particular the notes in an order corresponding to the preferences of the user, that is to say according to the themes and types of objects that are most relevant to him. The results are also displayed according to their values.
  • This interface also allows the user to view all the notes that have been estimated and not only the most relevant, thanks to drop-down menus.
  • a first window 64 displays the public data Dl belonging to the target contact and obtained directly on the profile of the target contact or on other public sites.
  • the window can for example display the percentage of photos that the target contact has tagged, 78% in the example of Figure 3, and the percentage, 23% in the example of Figure 3, of common contacts CCom tagged .
  • This window can also display a status for example to reveal some of the data that allowed the generation of the note.
  • a second window 65 displays the behavioral data of the target contact not belonging to the target contact and obtained through the CCI common contacts with which it has interaction.
  • the notes thus obtained are both transmitted to a recommendation module 70 and to a learning module 80.
  • the user's browsing history in the display interface 60 of the notes is advantageously transmitted. to the learning module Ap 80.
  • the data of the display history make it possible to better understand and apprehend the sensitivities of the user. Indeed, if the user often asks to display information on a particular theme that was not considered important in his profile 1 1 of sensitivities, its importance will then be raised and updated in its profile 1 1 of PROF sensitivities , so that this data is displayed in the first the following times.
  • the operation of the recommendation module 70 in turn is triggered by the interface 60, when the user requests to display recommendations to configure its settings options rules for the dissemination of his personal data.
  • This module 70 thus makes it possible to establish a recommendation strategy by comparing the scores assigned to the target contact with predefined threshold values in decision rules, contained in a storage means 81 such as a database for example.
  • This database 81 contains basic decision rules that can be applied by default. Such a rule can for example consist in saying that if the note NG d i obtained, for a particular type of object, is lower than a threshold value If, for example 0.75, then the target contact can not have access to the data of this type of object. Otherwise, there may be access.
  • the decision rules, stored in the database 81, are transmitted to the recommendation module 70 and, depending on the notes transmitted to it, it issues one or more recommendation (s) REC1 (di), REC2 (di) to destination of the user (steps 350, 351, 352). So, in one example, the note NGdi obtained for the photo object is 0.4 and below a predefined threshold value Si of 0.75 for this object (step 350). In this case, the recommendation module 70 issues a recommendation REC1 (step 351) to say that access to the photo object CC1 should not be given.
  • the recommendation module 70 issues a recommendation REC2 for the object.
  • an event object consisting in saying that the user can give access to this object to the target contact CC1 (step 352).
  • the recommendations issued in terms of setting up the rules for distributing personal data with respect to the target contact are then displayed in another window 91 of another graphical interface 90 which is displayed on the screen of the user. 'user.
  • the user can then follow these recommendations (step 360) and, in this case, his own distribution rules vis-à-vis the target contact, stored in a database type of storage means 92, will be automatically updated (step 370). He can also refuse the recommendation.
  • the learning module 80 is informed of the decision of the user (step 380) and updates (step 390) the decision rules contained in the database 81, so that next time the behavior of the system better corresponds to the wishes of the user. For example, if a recommendation is to prevent the target contact from accessing the object type "photo" and still giving the user access, the threshold value Si of the note for this type of object is lowered in the corresponding decision rule.
  • the two storage means 1 and 81 respectively of the user's sensitivity profile and decision rules can be collected in a single database.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Human Resources & Organizations (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Accounting & Taxation (AREA)
  • Data Mining & Analysis (AREA)
  • Bioethics (AREA)
  • Tourism & Hospitality (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Primary Health Care (AREA)
  • Computing Systems (AREA)
  • Game Theory and Decision Science (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Mathematical Physics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Information Transfer Between Computers (AREA)
EP12708870.6A 2011-04-05 2012-03-16 Procédé de paramétrage de règles de diffusion de données personnelles Withdrawn EP2695098A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1152934A FR2973906B1 (fr) 2011-04-05 2011-04-05 Procede de parametrage de regles de diffusion de donnees personnelles
PCT/EP2012/054718 WO2012136462A1 (fr) 2011-04-05 2012-03-16 Procédé de paramétrage de règles de diffusion de données personnelles

Publications (1)

Publication Number Publication Date
EP2695098A1 true EP2695098A1 (fr) 2014-02-12

Family

ID=45833431

Family Applications (1)

Application Number Title Priority Date Filing Date
EP12708870.6A Withdrawn EP2695098A1 (fr) 2011-04-05 2012-03-16 Procédé de paramétrage de règles de diffusion de données personnelles

Country Status (7)

Country Link
US (1) US20140026184A1 (zh)
EP (1) EP2695098A1 (zh)
JP (1) JP5864720B2 (zh)
KR (1) KR101519401B1 (zh)
CN (1) CN103562929B (zh)
FR (1) FR2973906B1 (zh)
WO (1) WO2012136462A1 (zh)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9110998B2 (en) 2011-12-22 2015-08-18 Google Technology Holdings LLC Hierarchical behavioral profile
US8943015B2 (en) 2011-12-22 2015-01-27 Google Technology Holdings LLC Hierarchical behavioral profile
WO2014073214A1 (ja) * 2012-11-12 2014-05-15 日本電気株式会社 パーソナル情報を分析する情報処理システム及びパーソナル情報分析方法
US10212986B2 (en) 2012-12-09 2019-02-26 Arris Enterprises Llc System, apparel, and method for identifying performance of workout routines
US9278255B2 (en) 2012-12-09 2016-03-08 Arris Enterprises, Inc. System and method for activity recognition
EP2747371B1 (en) 2012-12-24 2018-02-07 Alcatel Lucent Access policy definition with respect to a data object
US20160092773A1 (en) * 2014-09-26 2016-03-31 Microsoft Corporation Inference-based individual profile
WO2016149929A1 (en) * 2015-03-26 2016-09-29 Nokia Technologies Oy Method, apparatus and computer program product for identifying a vulnerable friend for privacy protection in a social network
US9894076B2 (en) 2015-10-09 2018-02-13 International Business Machines Corporation Data protection and sharing
US10475144B2 (en) 2016-02-26 2019-11-12 Microsoft Technology Licensing, Llc Presenting context-based guidance using electronic signs
US20170289794A1 (en) * 2016-04-02 2017-10-05 Microsoft Technology Licensing, Llc Rules-Based Identity Broadcast
CN107918740A (zh) * 2017-12-02 2018-04-17 北京明朝万达科技股份有限公司 一种敏感数据决策判决方法及系统
CN111460495B (zh) * 2020-03-27 2023-06-23 北京锐安科技有限公司 一种数据分级管理系统和方法

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003223394A (ja) * 2001-11-20 2003-08-08 Matsushita Electric Ind Co Ltd 交渉機能を有する装置と合意形成システム
JP2004192353A (ja) * 2002-12-11 2004-07-08 Nippon Telegr & Teleph Corp <Ntt> 個人情報開示制御システム及び個人情報開示制御方法
US7606772B2 (en) * 2003-11-28 2009-10-20 Manyworlds, Inc. Adaptive social computing methods
JP2007193611A (ja) * 2006-01-19 2007-08-02 Looops Communications Inc 会員制コミュニティサイトにおけるプロフィール情報管理方式
US8234688B2 (en) * 2009-04-03 2012-07-31 International Business Machines Corporation Managing privacy settings for a social network
US20100280965A1 (en) * 2009-04-30 2010-11-04 Nokia Corporation Method and apparatus for intuitive management of privacy settings
US9704203B2 (en) 2009-07-31 2017-07-11 International Business Machines Corporation Providing and managing privacy scores

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
None *
See also references of WO2012136462A1 *

Also Published As

Publication number Publication date
JP2014515855A (ja) 2014-07-03
FR2973906B1 (fr) 2015-07-31
US20140026184A1 (en) 2014-01-23
KR101519401B1 (ko) 2015-05-12
JP5864720B2 (ja) 2016-02-17
KR20140002025A (ko) 2014-01-07
CN103562929A (zh) 2014-02-05
FR2973906A1 (fr) 2012-10-12
CN103562929B (zh) 2017-03-15
WO2012136462A1 (fr) 2012-10-11

Similar Documents

Publication Publication Date Title
WO2012136462A1 (fr) Procédé de paramétrage de règles de diffusion de données personnelles
Dhir et al. Why do adolescents untag photos on Facebook?
US10673988B2 (en) Creation, publication and display of content on a social media network
US20170286539A1 (en) User profile stitching
US10091324B2 (en) Content feed for facilitating topic discovery in social networking environments
Salathé et al. The dynamics of health behavior sentiments on a large online social network
JP6408014B2 (ja) ニュースフィード内でソーシャル・ネットワーキング・システム・ユーザに提示するためにコンテンツ・アイテムを選択すること
US8819009B2 (en) Automatic social graph calculation
US20110264531A1 (en) Watching a user&#39;s online world
RU2571401C2 (ru) Способ, система для отображения действий друзей и компьютерная запоминающая среда
JP2018010669A (ja) ソーシャルネットワーキングシステムでの主張の評価
EP3035647B1 (fr) Procédé de choix d&#39;au moins un service et dispositif associé
US9830668B1 (en) Identifying top fans
FR2983610A1 (fr) Reseau de communication a trafic de connexion ameliore
Sotoudeh et al. Effects of the peer metagenomic environment on smoking behavior
Zhang et al. Structurally embedded news consumption on mobile news applications
Magnani et al. Friendfeed breaking news: death of a public figure
WO2016198635A1 (fr) Gestion de noms de domaine du reseau internet
WO2018024999A1 (fr) Moyens de diffusion d&#39;un contenu personnalisé dans un réseau de communication
US20110264525A1 (en) Searching a user&#39;s online world
WO2016092218A1 (fr) Moyens pour déterminer un niveau de pertinence d&#39;une ressource dans un système de traitement d&#39;informations
FR2875929A1 (fr) Systeme et procede interactif intelligent de gestion d&#39;information
FR2973133A1 (fr) Procedes d’actualisation et de creation de profils d&#39;utilisateur, de recommandation de contenu et de construction d&#39;une liste de contenus
FR2952204A1 (fr) Procede de generation d&#39;un flux web et un systeme associe
FR3091602A1 (fr) Procédé de création d’avatars pour protéger des données sensibles

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20131105

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

DAX Request for extension of the european patent (deleted)
111Z Information provided on other rights and legal means of execution

Free format text: AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

Effective date: 20140516

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: ALCATEL LUCENT

D11X Information provided on other rights and legal means of execution (deleted)
RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: ALCATEL LUCENT

17Q First examination report despatched

Effective date: 20190821

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20200303