US20170068827A1 - Live privacy policy method and apparatus - Google Patents

Live privacy policy method and apparatus Download PDF

Info

Publication number
US20170068827A1
US20170068827A1 US15/256,082 US201615256082A US2017068827A1 US 20170068827 A1 US20170068827 A1 US 20170068827A1 US 201615256082 A US201615256082 A US 201615256082A US 2017068827 A1 US2017068827 A1 US 2017068827A1
Authority
US
United States
Prior art keywords
user
real
privacy
information
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/256,082
Inventor
Christopher David Sachs
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SwimIt Inc
Original Assignee
SwimIt Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SwimIt Inc filed Critical SwimIt Inc
Priority to US15/256,082 priority Critical patent/US20170068827A1/en
Assigned to Swim.IT Inc. reassignment Swim.IT Inc. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SACHS, CHRISTOPER DAVID
Publication of US20170068827A1 publication Critical patent/US20170068827A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0277Online advertisement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/70Routing based on monitoring results
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/214Monitoring or handling of messages using selective forwarding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5069Address allocation for group communication, multicast communication or broadcast communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1004Server selection for load balancing
    • H04L67/101Server selection for load balancing based on network conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • H04L43/0894Packet rate
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • H04L47/125Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/234Monitoring or handling of messages for tracking messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4541Directories for service discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden

Definitions

  • the present invention relates to the field of privacy and security. More specifically, the present invention relates to website privacy and security.
  • Interaction model refers to the flow of data and control between various entities. Browsers displaying the web application or website user interfaces directly interact with many types of systems on the internet (e.g., advertiser systems). The common perception is that the website or web application is driven from the software residing on enterprise servers. This might be the case for enterprises that are business-centric, but consumer-centric enterprises work with many partners and affiliates (e.g., Google Analytics, a data collector), and therefore the data and control flow is dynamically constructed based on the consumer activity on the website or web application.
  • This dynamic interaction model is important for implementation of today's business strategies. Unfortunately, there are people and businesses that are taking advantage of this model to collect and misuse consumer data that can lead to privacy and security issues.
  • a live privacy policy method and system enables enterprises to update in real-time their privacy policy declaration by monitoring the third-party activities using the invention described herein. Once the software is integrated into the website and web applications, third-party related activities are captured continuously and used to build a live profile that is also updated continuously. This allows enterprises adhere to privacy policy regulations without any delays. This also benefits consumers who are able to view the data being collected to determine if they want to opt out.
  • FIG. 1 illustrates a block diagram of the live privacy policy system according to some embodiments.
  • FIG. 2 illustrates a flowchart of an implementation of the live privacy policy method according to some embodiments.
  • FIG. 3 illustrates a block diagram of an exemplary computing device configured to implement the live privacy policy method according to some embodiments.
  • a privacy policy is a legal statement made by businesses to declare their policy regarding collection, use, dissemination, and maintenance of user/consumer/client (“Consumer”) personally identifiable information (PII) during the course of normal business conducted using the software applications or website of the business. Businesses are required to provide this legal statement to protect Consumer privacy.
  • PII personally identifiable information
  • Businesses have developed websites and web applications to support the interactive and highly interconnected environment in which people live and work today. These implementations involve: sourcing of content that is displayed in realtime when a user (e.g., Consumer) is interacting with the software; sourcing of content that is personalized to a user. Personalizations are based on: location of a user, profile/personality of the user, usage history, customer data from other sources and more; sourcing content from a multitude of sources; first party content where a first party is the website or web application owner that has the direct relationship with the user;
  • third party content refers to: a business that is a separate legal entity from the first party, a business not affiliated by a common ownership or corporate control with the first party, a business that has access to first party resources (websites, web applications and data sources), if that business is authorized to use the information gathered from the resources for marketing or other purposes; content generation in realtime using dynamically generated scripts and other techniques, content personalization in realtime, customer data collection by first party or third parties, a large volume of data collection to support profiling and personalization, execution of range of analytics involving personal data to provide insights into individual and group trends, movements, interests, and activities; frequent and complex interactions among various businesses that involve personal data; and global availability of personal data, supported by communications networks and platforms.
  • a third party e.g., advertisement networks
  • a live privacy policy system that is generated by the collaborative efforts of key stakeholders involved in the PII collection, retention, usage, sharing and maintenance, includes: realtime data (who, what data, retention policy, usage policy and sharing policy) for a first party and third parties, consumer restrictions and business compliance information, and regulatory requirements and business compliance information.
  • the live privacy policy system is tailored to a user and reflects the true intent of privacy rights.
  • the key stakeholders responsible for the privacy policy are representatives of the business, Consumers and Third parties. Each of the stakeholders contribute to the generation of the Live Privacy Policy using tools and data that is made available to them.
  • FIG. 1 illustrates a block diagram of the live privacy policy system according to some embodiments.
  • the live privacy policy system 100 identifies the PII and PPI data collection of a business.
  • a suite of tools automatically generates PII data from website and web applications associated with the business.
  • an SDK along with a Privacy API 104 is able to be used to capture the PII and PPI data transacted using the application.
  • the first party data is stored in the first party dataset 104 and the third party data is stored in the third party dataset 106 .
  • PII and PPI data transacted is able to be captured by a browser extension 110 , and the data is saved in first party dataset 104 and in third party dataset 106 .
  • Regulated PII and PPI is captured from the regulations and saved in a dataset 112 .
  • Users/consumers 114 view the first party dataset 104 , third party dataset 106 , regulatory dataset 112 and specify the consumer restrictions on the dataset 116 .
  • a live privacy policy manager 118 forwards restrictions specified by users 114 to a do not track manager 120 .
  • the do not track manager 120 generates the appropriate do not track requests to third parties and to the business applications.
  • the do not track requests are managed and monitored by industry entities such as National Advertising Initiative (NAI) and Digital Advertising Alliance (DAA). They will contact the appropriate company and request them to adhere to the user request.
  • NAI National Advertising Initiative
  • DAA Digital Advertising Alliance
  • the do not track manager 120 will report back to the Live Privacy Profile Manager 118 , and the restriction status will be updated from Pending to Active or will remain in Pending status if a response is not received. In some embodiments, the do not track implementation is automatically executed.
  • PII and PPI from business applications is captured in the business application PII/PPI dataset 122 .
  • the live privacy policy manager 118 reads the first party dataset 104 , third party dataset 106 , consumer restrictions and the business apps dataset 122 to generate the live privacy profile 124 .
  • FIG. 2 illustrates a flowchart of an implementation of the live privacy policy method according to some embodiments.
  • step 200 data collection is monitored from enterprise mobile and web applications.
  • the data collection is able to be monitored by integration of enterprise mobile applications with the privacy API using the SDK and/or offering consumers using enterprise web applications and websites to install browser extension.
  • step 202 once the software is integrated and installed, users using the mobile and web applications are able to perform actions regarding privacy. For example, users are able to observe the data being collected. This is reflected in the enterprise privacy policy. Users are also able to restrict the data the enterprise and third parties are able to collect, use and share. The restrictions are implemented by the software by forwarding do not track requests. Users are also able to have a live privacy policy profile generated which provides privacy information specific to the user. In some embodiments, fewer or additional steps are implemented. In some embodiments, the order of the steps is modified.
  • FIG. 3 illustrates a block diagram of an exemplary computing device configured to implement the live privacy policy method according to some embodiments.
  • the computing device 300 is able to be used to acquire, store, compute, process, communicate and/or display information.
  • a hardware structure suitable for implementing the computing device 300 includes a network interface 302 , a memory 304 , a processor 306 , I/O device(s) 308 , a bus 310 and a storage device 312 .
  • the choice of processor is not critical as long as a suitable processor with sufficient speed is chosen.
  • the memory 304 is able to be any conventional computer memory known in the art.
  • the storage device 312 is able to include a hard drive, CDROM, CDRW, DVD, DVDRW, High Definition disc/drive, ultra-HD drive, flash memory card or any other storage device.
  • the computing device 300 is able to include one or more network interfaces 302 .
  • An example of a network interface includes a network card connected to an Ethernet or other type of LAN.
  • the I/O device(s) 308 are able to include one or more of the following: keyboard, mouse, monitor, screen, printer, modem, touchscreen, button interface and other devices.
  • Live privacy policy application(s) 330 used to perform the live privacy policy method are likely to be stored in the storage device 312 and memory 304 and processed as applications are typically processed. More or fewer components shown in FIG.
  • live privacy policy hardware 320 is included.
  • the computing device 300 in FIG. 3 includes applications 330 and hardware 320 for the live privacy policy method, the live privacy policy method is able to be implemented on a computing device in hardware, firmware, software or any combination thereof.
  • the live privacy policy method applications 330 are programmed in a memory and executed using a processor.
  • the live privacy policy hardware 320 is programmed hardware logic including gates specifically designed to implement the live privacy policy method.
  • the live privacy policy application(s) 330 include several applications and/or modules. In some embodiments, modules include one or more sub-modules as well. In some embodiments, fewer or additional modules are able to be included.
  • suitable computing devices include a personal computer, a laptop computer, a computer workstation, a server, a mainframe computer, a handheld computer, a personal digital assistant, a cellular/mobile telephone, a smart appliance, a gaming console, a digital camera, a digital camcorder, a camera phone, a smart phone, a portable music player, a tablet computer, a mobile device, a video player, a video disc writer/player (e.g., DVD writer/player, high definition disc writer/player, ultra high definition disc writer/player), a television, an augmented reality device, a virtual reality device, a home entertainment system, smart jewelry (e.g., smart watch) or any other suitable computing device.
  • a personal computer e.g., a laptop computer, a computer workstation, a server, a mainframe computer, a handheld computer, a personal digital assistant, a cellular/mobile telephone, a smart appliance, a gaming console, a digital camera, a digital camcorder, a camera phone,
  • data collection is monitored from enterprise mobile and web applications. Once software is integrated and installed, users using the mobile and web applications are able to: observe the data being collected and restrict the data the enterprise and third parties are able to collect, use and share.
  • live privacy policy method and system provides many advantages:
  • Enterprises will provide an accurate and up-to-date privacy policy to the consumers and others who they conduct business with. This will improve the credibility for the enterprise and provide more confidence to consumers and others while conducting online business with the enterprise.
  • Data trackers and advertisers are able to continue to provide valuable personalization services to consumers but with explicit consent from the consumers.
  • This cooperative environment will enable more accurate personalization and reduce the risks of inadvertent data leaks and security issues around personal data.
  • a business is better able to establish and maintain consumer confidence and trust, by: enabling consumer participation in PII activities, viewing PII being collected, providing tools to update or remove inaccurate data, providing a process to allow users to register, track and view progress of complaints, enabling business to monitor and manage data minimization requirements, enabling business to monitor and manage PII including usage, quality and integrity and security, and implementing realtime updates to privacy policy. Businesses and consumers are offered a process to handle Customer “Do Not Track” requests.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Game Theory and Decision Science (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Data Mining & Analysis (AREA)
  • Technology Law (AREA)
  • Automation & Control Theory (AREA)
  • Multimedia (AREA)
  • Medical Informatics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)
  • Environmental & Geological Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A live privacy policy method and system enables enterprises to update in real-time their privacy policy declaration by monitoring the third-party activities using the invention described herein. Once the software is integrated into the website and web applications, third-party related activities are captured continuously and used to build a live profile that is also updated continuously. This allows enterprises adhere to privacy policy regulations without any delays. This also benefits consumers who are able to view the data being collected to determine if they want to opt out.

Description

    CROSS-REFERENCE TO RELATED APPLICATION(S)
  • This application claims the benefit of U.S. Provisional Patent Application Ser. No. 62/214,786, filed Sep. 4, 2015, and titled “PRIVACY AWARENESS APPLICATION, LIVE PRIVACY POLICY, AND DISTRIBUTED AND MULTIPLEXED PEER TO PEER REAL-TIME MESSAGING UTILIZING BACK PRESSURE SIGNALLING,” which is hereby incorporated by reference in its entirety for all purposes.
  • FIELD OF THE INVENTION
  • The present invention relates to the field of privacy and security. More specifically, the present invention relates to website privacy and security.
  • BACKGROUND OF THE INVENTION
  • Today's websites and web application interaction model involve a browser retrieving data over the Internet (e.g., WWW) from advertisers, data collectors, content delivery networks and enterprise servers. Interaction model refers to the flow of data and control between various entities. Browsers displaying the web application or website user interfaces directly interact with many types of systems on the internet (e.g., advertiser systems). The common perception is that the website or web application is driven from the software residing on enterprise servers. This might be the case for enterprises that are business-centric, but consumer-centric enterprises work with many partners and affiliates (e.g., Google Analytics, a data collector), and therefore the data and control flow is dynamically constructed based on the consumer activity on the website or web application.
  • This dynamic interaction model is important for implementation of today's business strategies. Unfortunately, there are people and businesses that are taking advantage of this model to collect and misuse consumer data that can lead to privacy and security issues.
  • Enterprises are providing free products (e.g., email application) and services in exchange for the right to collect user/consumer information. This was the start of consumer data privacy problems, and today this data collection is being taken advantage of by third-parties (partners, direct and indirect affiliates and others) without direct consent of users/consumers. Key problems associated with data collection are:
    • 1. Users/Consumers do not have an explicit understanding of specific data that is being collected, stored, used, shared and for what purpose. This data is being monetized by the collecting enterprises. If consumers are aware of specifics and the associated opportunity cost then they can make a more informed decision about using these free products and services.
    • 2. Consumers have a very limited or no understanding of data being collected by third-parties. This data is typically Personally Identifiable Information (PII) and Personality Profiling Information (PPI). This data is being monetized and misused by the collecting third-parties. If consumers are aware of what is being collected by these third-parties then they can opt-out or inform the enterprises to stop this data collection.
    SUMMARY OF THE INVENTION
  • A live privacy policy method and system enables enterprises to update in real-time their privacy policy declaration by monitoring the third-party activities using the invention described herein. Once the software is integrated into the website and web applications, third-party related activities are captured continuously and used to build a live profile that is also updated continuously. This allows enterprises adhere to privacy policy regulations without any delays. This also benefits consumers who are able to view the data being collected to determine if they want to opt out.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 illustrates a block diagram of the live privacy policy system according to some embodiments.
  • FIG. 2 illustrates a flowchart of an implementation of the live privacy policy method according to some embodiments.
  • FIG. 3 illustrates a block diagram of an exemplary computing device configured to implement the live privacy policy method according to some embodiments.
  • DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
  • A privacy policy is a legal statement made by businesses to declare their policy regarding collection, use, dissemination, and maintenance of user/consumer/client (“Consumer”) personally identifiable information (PII) during the course of normal business conducted using the software applications or website of the business. Businesses are required to provide this legal statement to protect Consumer privacy. The United States Federal Trade Commission, U.S. state government agencies and similar agencies from other countries have been using a variety of tools to protect consumers' privacy and personal information.
  • Businesses have developed websites and web applications to support the interactive and highly interconnected environment in which people live and work today. These implementations involve: sourcing of content that is displayed in realtime when a user (e.g., Consumer) is interacting with the software; sourcing of content that is personalized to a user. Personalizations are based on: location of a user, profile/personality of the user, usage history, customer data from other sources and more; sourcing content from a multitude of sources; first party content where a first party is the website or web application owner that has the direct relationship with the user;
  • third party content, where a third party (e.g., advertisement networks) refers to: a business that is a separate legal entity from the first party, a business not affiliated by a common ownership or corporate control with the first party, a business that has access to first party resources (websites, web applications and data sources), if that business is authorized to use the information gathered from the resources for marketing or other purposes; content generation in realtime using dynamically generated scripts and other techniques, content personalization in realtime, customer data collection by first party or third parties, a large volume of data collection to support profiling and personalization, execution of range of analytics involving personal data to provide insights into individual and group trends, movements, interests, and activities; frequent and complex interactions among various businesses that involve personal data; and global availability of personal data, supported by communications networks and platforms.
  • These implementations are leading to many problems such as:
    • 1. Privacy profiles that are high level and do not offer Consumers a precise, transparent and easily understandable statement about collection, use, dissemination, and maintenance of PII and Personal Profile Information (PPI).
    • 2. Involvement of numerous third-parties results in Privacy profiles that do not provide a complete purpose specifications that requires disclosure of authority that permits the collection of PII & PPI, intended use of PII & PPI, inability to control the PII and PPI data collection and therefore adhere to the data minimization requirement which involves: businesses collecting PII that is directly relevant and required to accomplish a specified purpose(s), and businesses retaining PII for a duration of time that is necessary to fulfill the specified purpose(s).
    • 3. Dynamic nature and the involvement of third parties causes business difficulty in tracking, accounting and auditing of PII
    • 4. Inability of the businesses to capture and record changes to the privacy profile in a timeframe that reflects the reality.
    • 5. Lack of Consumer participation in a business privacy policy implementation and maintenance due to lack of awareness regarding the PII data collection (what, when, where, who, and more) and inability and lack of technology/tools to offer consent to PII related activities of a business.
    • 6. Security of PII is difficult because of the number of businesses handling the information and distribution to many geographically diverse locations.
    • 7. Inability for industry watchdog groups and law enforcement agencies to monitor and enforce privacy guidelines and laws due to lack of information from the dynamic and realtime network of privacy data collectors and users.
  • A live privacy policy system that is generated by the collaborative efforts of key stakeholders involved in the PII collection, retention, usage, sharing and maintenance, includes: realtime data (who, what data, retention policy, usage policy and sharing policy) for a first party and third parties, consumer restrictions and business compliance information, and regulatory requirements and business compliance information.
  • The live privacy policy system is tailored to a user and reflects the true intent of privacy rights. The key stakeholders responsible for the privacy policy are representatives of the business, Consumers and Third parties. Each of the stakeholders contribute to the generation of the Live Privacy Policy using tools and data that is made available to them.
  • FIG. 1 illustrates a block diagram of the live privacy policy system according to some embodiments. The live privacy policy system 100 identifies the PII and PPI data collection of a business. A suite of tools automatically generates PII data from website and web applications associated with the business. For applications on the web/desktop/mobile 102 that capture PII and PPI data, an SDK along with a Privacy API 104 is able to be used to capture the PII and PPI data transacted using the application. The first party data is stored in the first party dataset 104 and the third party data is stored in the third party dataset 106.
  • For websites 108, PII and PPI data transacted is able to be captured by a browser extension 110, and the data is saved in first party dataset 104 and in third party dataset 106.
  • Regulated PII and PPI is captured from the regulations and saved in a dataset 112.
  • Users/consumers 114 view the first party dataset 104, third party dataset 106, regulatory dataset 112 and specify the consumer restrictions on the dataset 116. A live privacy policy manager 118 forwards restrictions specified by users 114 to a do not track manager 120. The do not track manager 120 generates the appropriate do not track requests to third parties and to the business applications. In some embodiments, the do not track requests are managed and monitored by industry entities such as National Advertising Initiative (NAI) and Digital Advertising Alliance (DAA). They will contact the appropriate company and request them to adhere to the user request. Once a confirmation is received from these entities, the do not track manager 120 will report back to the Live Privacy Profile Manager 118, and the restriction status will be updated from Pending to Active or will remain in Pending status if a response is not received. In some embodiments, the do not track implementation is automatically executed.
  • PII and PPI from business applications is captured in the business application PII/PPI dataset 122.
  • Each time a user 114 requests a live privacy policy from a business, the live privacy policy manager 118 reads the first party dataset 104, third party dataset 106, consumer restrictions and the business apps dataset 122 to generate the live privacy profile 124.
  • FIG. 2 illustrates a flowchart of an implementation of the live privacy policy method according to some embodiments. In the step 200, data collection is monitored from enterprise mobile and web applications. The data collection is able to be monitored by integration of enterprise mobile applications with the privacy API using the SDK and/or offering consumers using enterprise web applications and websites to install browser extension. In the step 202, once the software is integrated and installed, users using the mobile and web applications are able to perform actions regarding privacy. For example, users are able to observe the data being collected. This is reflected in the enterprise privacy policy. Users are also able to restrict the data the enterprise and third parties are able to collect, use and share. The restrictions are implemented by the software by forwarding do not track requests. Users are also able to have a live privacy policy profile generated which provides privacy information specific to the user. In some embodiments, fewer or additional steps are implemented. In some embodiments, the order of the steps is modified.
  • FIG. 3 illustrates a block diagram of an exemplary computing device configured to implement the live privacy policy method according to some embodiments. The computing device 300 is able to be used to acquire, store, compute, process, communicate and/or display information. In general, a hardware structure suitable for implementing the computing device 300 includes a network interface 302, a memory 304, a processor 306, I/O device(s) 308, a bus 310 and a storage device 312. The choice of processor is not critical as long as a suitable processor with sufficient speed is chosen. The memory 304 is able to be any conventional computer memory known in the art. The storage device 312 is able to include a hard drive, CDROM, CDRW, DVD, DVDRW, High Definition disc/drive, ultra-HD drive, flash memory card or any other storage device. The computing device 300 is able to include one or more network interfaces 302. An example of a network interface includes a network card connected to an Ethernet or other type of LAN. The I/O device(s) 308 are able to include one or more of the following: keyboard, mouse, monitor, screen, printer, modem, touchscreen, button interface and other devices. Live privacy policy application(s) 330 used to perform the live privacy policy method are likely to be stored in the storage device 312 and memory 304 and processed as applications are typically processed. More or fewer components shown in FIG. 3 are able to be included in the computing device 300. In some embodiments, live privacy policy hardware 320 is included. Although the computing device 300 in FIG. 3 includes applications 330 and hardware 320 for the live privacy policy method, the live privacy policy method is able to be implemented on a computing device in hardware, firmware, software or any combination thereof. For example, in some embodiments, the live privacy policy method applications 330 are programmed in a memory and executed using a processor. In another example, in some embodiments, the live privacy policy hardware 320 is programmed hardware logic including gates specifically designed to implement the live privacy policy method.
  • In some embodiments, the live privacy policy application(s) 330 include several applications and/or modules. In some embodiments, modules include one or more sub-modules as well. In some embodiments, fewer or additional modules are able to be included.
  • Examples of suitable computing devices include a personal computer, a laptop computer, a computer workstation, a server, a mainframe computer, a handheld computer, a personal digital assistant, a cellular/mobile telephone, a smart appliance, a gaming console, a digital camera, a digital camcorder, a camera phone, a smart phone, a portable music player, a tablet computer, a mobile device, a video player, a video disc writer/player (e.g., DVD writer/player, high definition disc writer/player, ultra high definition disc writer/player), a television, an augmented reality device, a virtual reality device, a home entertainment system, smart jewelry (e.g., smart watch) or any other suitable computing device.
  • To utilize the live privacy policy method and system, data collection is monitored from enterprise mobile and web applications. Once software is integrated and installed, users using the mobile and web applications are able to: observe the data being collected and restrict the data the enterprise and third parties are able to collect, use and share.
  • In operation, live privacy policy method and system provides many advantages:
  • Enterprises will provide an accurate and up-to-date privacy policy to the consumers and others who they conduct business with. This will improve the credibility for the enterprise and provide more confidence to consumers and others while conducting online business with the enterprise.
  • Data trackers and advertisers are able to continue to provide valuable personalization services to consumers but with explicit consent from the consumers. This cooperative environment will enable more accurate personalization and reduce the risks of inadvertent data leaks and security issues around personal data.
  • Consumers get personalized content while controlling what they want to share with enterprises providing products and services.
  • Consumer awareness that is context-specific and transparent, such as identifying: PII and PPI that is collected, third parties involved and their PII and PPI activities and other data sharing relationships among third parties that are not directly attributed to business that have direct consumer relationships. A business is better able to establish and maintain consumer confidence and trust, by: enabling consumer participation in PII activities, viewing PII being collected, providing tools to update or remove inaccurate data, providing a process to allow users to register, track and view progress of complaints, enabling business to monitor and manage data minimization requirements, enabling business to monitor and manage PII including usage, quality and integrity and security, and implementing realtime updates to privacy policy. Businesses and consumers are offered a process to handle Customer “Do Not Track” requests.
  • The present invention has been described in terms of specific embodiments incorporating details to facilitate the understanding of principles of construction and operation of the invention. Such reference herein to specific embodiments and details thereof is not intended to limit the scope of the claims appended hereto. It will be readily apparent to one skilled in the art that other various modifications may be made in the embodiment chosen for illustration without departing from the spirit and scope of the invention as defined by the claims.

Claims (30)

What is claimed is:
1. A method programmed in a non-transitory memory of a device comprising:
a. collecting real-time data associated with a company's website ecosystem partners and affiliates; and
b. generating a dynamic privacy document which is updated based on the real-time data.
2. The method of claim 1 wherein the real-time data comprises a user's privacy data including Personally Identifiable Information (PII) and Personal Profiling Information (PPI).
3. The method of claim 1 wherein the user's privacy data includes the user's name, address, phone number, websites visited, location, or purchase history.
4. The method of claim 1 further comprising displaying the dynamic privacy document.
5. The method of claim 1 further comprising enabling a user to provide input regarding the collection of the real-time privacy data.
6. The method of claim 5 wherein enabling a user to provide input includes collaborating with the company's advertisement ecosystem and affiliates regarding private data collection, processing and storage of private data.
7. The method of claim 5 further comprising enabling a user to receive personalized content, and enabling the user to control what information is shared and how the information is used.
8. The method of claim 1 further comprising:
identifying personally identifiable information and personality profiling information; and
forwarding a restriction specified by a user to a do not track manager based on reviewing the personally identifiable information and the personality profiling information.
9. The method of claim 1 wherein collecting the real-time data is with a software developer kit along with a privacy application programming interface.
10. The method of claim 1 wherein collecting the real-time data is with a browser extension.
11. An apparatus comprising:
a. a non-transitory memory for storing an application, the application configured for:
i. collecting real-time data associated with a company's website ecosystem partners and affiliates; and
ii. generating a dynamic privacy document which is updated based on the real-time data; and
b. a processor for processing the application.
12. The apparatus of claim 11 wherein the real-time data comprises a user's privacy data including Personally Identifiable Information (PII) and Personal Profiling Information (PPI).
13. The apparatus of claim 11 wherein the user's privacy data includes the user's name, address, phone number, websites visited, location, or purchase history.
14. The apparatus of claim 11 further comprising a display for displaying the dynamic privacy document.
15. The apparatus of claim 11 the application further configured for enabling a user to provide input regarding the collection of the real-time privacy data.
16. The apparatus of claim 15 wherein enabling a user to provide input includes collaborating with the company's advertisement ecosystem and affiliates regarding private data collection, processing and storage of private data.
17. The apparatus of claim 15 the application further configured for enabling a user to receive personalized content, and enabling the user to control what information is shared and how the information is used.
18. The apparatus of claim 11 the application further configured for:
identifying personally identifiable information and personality profiling information; and
forwarding a restriction specified by a user to a do not track manager based on reviewing the personally identifiable information and the personality profiling information.
19. The apparatus of claim 11 wherein collecting the real-time data is with a software developer kit along with a privacy application programming interface.
20. The apparatus of claim 11 wherein collecting the real-time data is with a browser extension.
21. A system comprising:
a. a client device configured for collecting real-time data associated with a company's website ecosystem partners and affiliates; and
b. a server device configured for generating a dynamic privacy document which is updated based on the real-time data.
22. The system of claim 21 wherein the real-time data comprises a user's privacy data including Personally Identifiable Information (PII) and Personal Profiling Information (PPI).
23. The system of claim 21 wherein the user's privacy data includes the user's name, address, phone number, websites visited, location or purchase history.
24. The system of claim 21 wherein the client device is configured for displaying the dynamic privacy document.
25. The system of claim 21 wherein the client device is configured for enabling a user to provide input regarding the collection of the real-time privacy data.
26. The system of claim 25 wherein enabling a user to provide input includes collaborating with the company's advertisement ecosystem and affiliates regarding private data collection, processing and storage of private data.
27. The system of claim 25 further comprising enabling a user to receive personalized content, and enabling the user to control what information is shared and how the information is used.
28. The system of claim 21 wherein the client device is configured for:
identifying personally identifiable information and personality profiling information; and
forwarding a restriction specified by a user to a do not track manager based on reviewing the personally identifiable information and the personality profiling information.
29. The system of claim 21 wherein collecting the real-time data is with a software developer kit along with a privacy application programming interface.
30. The system of claim 21 wherein collecting the real-time data is with a browser extension.
US15/256,082 2015-09-04 2016-09-02 Live privacy policy method and apparatus Abandoned US20170068827A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/256,082 US20170068827A1 (en) 2015-09-04 2016-09-02 Live privacy policy method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201562214786P 2015-09-04 2015-09-04
US15/256,082 US20170068827A1 (en) 2015-09-04 2016-09-02 Live privacy policy method and apparatus

Publications (1)

Publication Number Publication Date
US20170068827A1 true US20170068827A1 (en) 2017-03-09

Family

ID=58188681

Family Applications (3)

Application Number Title Priority Date Filing Date
US15/256,055 Active US10362067B2 (en) 2015-09-04 2016-09-02 Method of and system for privacy awareness
US15/256,112 Active 2037-02-23 US10367852B2 (en) 2015-09-04 2016-09-02 Multiplexed demand signaled distributed messaging
US15/256,082 Abandoned US20170068827A1 (en) 2015-09-04 2016-09-02 Live privacy policy method and apparatus

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US15/256,055 Active US10362067B2 (en) 2015-09-04 2016-09-02 Method of and system for privacy awareness
US15/256,112 Active 2037-02-23 US10367852B2 (en) 2015-09-04 2016-09-02 Multiplexed demand signaled distributed messaging

Country Status (3)

Country Link
US (3) US10362067B2 (en)
EP (1) EP3341841A4 (en)
WO (1) WO2017040997A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11017118B2 (en) 2018-11-30 2021-05-25 International Business Machines Corporation Cognitive survey policy management
US11062025B1 (en) 2018-11-30 2021-07-13 BlueOwl, LLC SAS solution to automatically control data footprint
US20220414259A1 (en) * 2021-06-25 2022-12-29 Qonsent Inc. Systems and Methods for Electronic Data Privacy, Consent, and Control in Electronic Transactions
US20250148122A1 (en) * 2023-11-03 2025-05-08 Google Llc Data collection analysis for privacy risk assessment

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10303035B2 (en) 2009-12-22 2019-05-28 View, Inc. Self-contained EC IGU
US20210063836A1 (en) 2017-04-26 2021-03-04 View, Inc. Building network
US12105394B2 (en) 2011-03-16 2024-10-01 View, Inc. Commissioning window networks
US11054792B2 (en) 2012-04-13 2021-07-06 View, Inc. Monitoring sites containing switchable optical devices and controllers
US10989977B2 (en) 2011-03-16 2021-04-27 View, Inc. Onboard controller for multistate windows
US10989976B2 (en) 2011-03-16 2021-04-27 View, Inc. Commissioning window networks
WO2015134789A1 (en) 2014-03-05 2015-09-11 View, Inc. Monitoring sites containing switchable optical devices and controllers
US11868103B2 (en) 2014-03-05 2024-01-09 View, Inc. Site monitoring system
US10481459B2 (en) 2014-06-30 2019-11-19 View, Inc. Control methods and systems for networks of optically switchable windows during reduced power availability
US11740948B2 (en) 2014-12-08 2023-08-29 View, Inc. Multiple interacting systems at a site
US12366111B2 (en) 2015-09-18 2025-07-22 View Operating Corporation Trunk line window controllers
EP3426874B1 (en) 2016-03-09 2022-07-13 View, Inc. Method of commissioning electrochromic windows
US10574540B2 (en) * 2016-09-17 2020-02-25 Anand Sambandam Method and system for facilitating management of service agreements for consumer clarity over multiple channels
US12147142B2 (en) 2017-04-26 2024-11-19 View, Inc. Remote management of a facility
US20190166031A1 (en) * 2017-11-29 2019-05-30 LogicMonitor, Inc. Robust monitoring of it infrastructure performance
US11303601B2 (en) 2017-12-14 2022-04-12 Meta Platforms, Inc. Systems and methods for sharing content
US10873558B2 (en) 2017-12-14 2020-12-22 Facebook, Inc. Systems and methods for sharing content
US20190362069A1 (en) * 2018-05-22 2019-11-28 Allstate Insurance Company Digital Visualization and Perspective Manager
US11494502B2 (en) 2018-10-25 2022-11-08 Microsoft Technology Licensing, Llc Privacy awareness for personal assistant communications
EP3966963A2 (en) 2019-05-09 2022-03-16 View, Inc. Antenna systems for controlled coverage in buildings
CA3164250A1 (en) 2019-12-05 2021-06-10 Liveramp, Inc. Multi-controller opt-out system and method
TW202206925A (en) 2020-03-26 2022-02-16 美商視野公司 Access and messaging in a multi client network
US11809602B2 (en) * 2020-09-02 2023-11-07 International Business Machines Corporation Privacy verification for electronic communications
US12326949B2 (en) 2021-11-12 2025-06-10 Microsoft Technology Licensing, Llc Privacy data management in distributed computing systems
US12314425B2 (en) * 2021-11-12 2025-05-27 Microsoft Technology Licensing, Llc Privacy data management in distributed computing systems
US12153713B1 (en) * 2022-03-23 2024-11-26 Gen Digital Inc. Systems and methods for protecting user data privacy by detecting the extension of tracker coverage of website browsing sessions through indirect data disclosure

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040139025A1 (en) * 2001-05-08 2004-07-15 Coleman Thomas E. Privacy protection system and method
US20070026627A1 (en) * 2005-07-26 2007-02-01 Kim Sung M Well photoresist pattern of semiconductor device and method for forming the same
US20070266079A1 (en) * 2006-04-10 2007-11-15 Microsoft Corporation Content Upload Safety Tool
US20070282832A1 (en) * 2006-06-01 2007-12-06 Microsoft Corporation Automatic tracking of user data and reputation checking
US7761568B1 (en) * 2004-02-03 2010-07-20 Xweb, Inc. Data transmission verification and identification system and method
US20110017307A1 (en) * 2008-03-05 2011-01-27 Dresser-Rand Company Compressor assembly including separator and ejector pump
US20110202881A1 (en) * 2010-02-16 2011-08-18 Yahoo! Inc. System and method for rewarding a user for sharing activity information with a third party
US20120084349A1 (en) * 2009-12-30 2012-04-05 Wei-Yeh Lee User interface for user management and control of unsolicited server operations
WO2014205431A2 (en) * 2013-06-21 2014-12-24 Wifiname, Inc. Wireless network and mac address device detection system and methods
US20160232570A1 (en) * 2015-02-11 2016-08-11 Aol Inc. Systems and methods for opting-out of targeted advertising in an online advertising environment

Family Cites Families (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6275824B1 (en) 1998-10-02 2001-08-14 Ncr Corporation System and method for managing data privacy in a database management system
US7478157B2 (en) * 2001-11-07 2009-01-13 International Business Machines Corporation System, method, and business methods for enforcing privacy preferences on personal-data exchanges across a network
US20030131052A1 (en) * 2002-01-10 2003-07-10 International Business Machines Corporatioin Method and system for HTTP time-on-page monitoring without client-side installation
US7284067B2 (en) * 2002-02-20 2007-10-16 Hewlett-Packard Development Company, L.P. Method for integrated load balancing among peer servers
US7937493B2 (en) * 2003-08-14 2011-05-03 Oracle International Corporation Connection pool use of runtime load balancing service performance advisories
EP1781123A1 (en) * 2004-08-23 2007-05-09 U.S. Smokeless Tobacco Company Nicotiana compositions
EP1847071A4 (en) * 2005-01-26 2010-10-20 Internet Broadcasting Corp B V MULTI-DIFFUSION IN LAYERS AND EXACT ATTRIBUTION OF BANDWIDTH AND PRIORIZATION OF PACKETS
US9384345B2 (en) 2005-05-03 2016-07-05 Mcafee, Inc. Providing alternative web content based on website reputation assessment
WO2007144611A1 (en) 2006-06-12 2007-12-21 Enigmatec Corporation Self-managed distributed mediation networks
US7672235B1 (en) * 2006-06-14 2010-03-02 Roxbeam Media Network Corporation System and method for buffering real-time streaming content in a peer-to-peer overlay network
US8745151B2 (en) 2006-11-09 2014-06-03 Red Hat, Inc. Web page protection against phishing
US8346753B2 (en) 2006-11-14 2013-01-01 Paul V Hayes System and method for searching for internet-accessible content
US7657648B2 (en) * 2007-06-21 2010-02-02 Microsoft Corporation Hybrid tree/mesh overlay for data delivery
US20090100322A1 (en) * 2007-10-11 2009-04-16 International Business Machines Corporation Retrieving data relating to a web page prior to initiating viewing of the web page
CN102216947A (en) * 2008-10-08 2011-10-12 阿德基佩尔公司 Managing internet advertising and promotional content
US20100094860A1 (en) 2008-10-09 2010-04-15 Google Inc. Indexing online advertisements
US8364713B2 (en) * 2009-01-20 2013-01-29 Titanium Fire Ltd. Personal data manager systems and methods
US20120023133A1 (en) * 2009-04-01 2012-01-26 Woodt Inc. Document searching system and method
US9135629B2 (en) * 2009-06-23 2015-09-15 Simeon S. Simeonov User targeting management, monitoring and enforcement
US9172706B2 (en) * 2009-11-23 2015-10-27 At&T Intellectual Property I, L.P. Tailored protection of personally identifiable information
US9361631B2 (en) 2010-01-06 2016-06-07 Ghostery, Inc. Managing and monitoring digital advertising
US20110295988A1 (en) * 2010-05-28 2011-12-01 Le Jouan Herve Managing data on computer and telecommunications networks
CN107608755A (en) 2010-07-01 2018-01-19 纽戴纳公司 Split process between cluster by process type to optimize the use of cluster particular configuration
US8181254B1 (en) * 2011-10-28 2012-05-15 Google Inc. Setting default security features for use with web applications and extensions
US20130151547A1 (en) * 2011-12-09 2013-06-13 Sap Ag Method and system for generating document recommendations
EP2798523A4 (en) * 2011-12-28 2015-09-09 Intel Corp Persona manager for network communications
US9535755B2 (en) * 2012-03-09 2017-01-03 Google Inc. Tiers of data storage for web applications and browser extensions
WO2013163652A2 (en) * 2012-04-27 2013-10-31 Privowny, Inc. Managing data on computer and telecommunications networks
US9524198B2 (en) 2012-07-27 2016-12-20 Google Inc. Messaging between web applications
KR20150105359A (en) * 2013-01-09 2015-09-16 에버님, 인크. Systems and methods for access-controlled interactions
US9672223B2 (en) * 2013-04-25 2017-06-06 Google Inc. Geo photo searching based on current conditions at a location
US10574766B2 (en) 2013-06-21 2020-02-25 Comscore, Inc. Clickstream analysis methods and systems related to determining actionable insights relating to a path to purchase
US9703988B1 (en) * 2013-07-12 2017-07-11 Abine, Inc. Internet privacy tool for mitigating third party transaction tracking
US10445769B2 (en) * 2013-12-24 2019-10-15 Google Llc Systems and methods for audience measurement
US8898808B1 (en) * 2014-01-10 2014-11-25 Ghostery, Inc. System and method for assessing effectiveness of online advertising
US20160300231A1 (en) * 2015-04-10 2016-10-13 Abine, Inc. Push notification authentication platform for secured form filling
US9904916B2 (en) 2015-07-01 2018-02-27 Klarna Ab Incremental login and authentication to user portal without username/password
US9510036B1 (en) 2015-10-26 2016-11-29 Google Inc. Systems and methods for providing content in a content list

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040139025A1 (en) * 2001-05-08 2004-07-15 Coleman Thomas E. Privacy protection system and method
US7761568B1 (en) * 2004-02-03 2010-07-20 Xweb, Inc. Data transmission verification and identification system and method
US20070026627A1 (en) * 2005-07-26 2007-02-01 Kim Sung M Well photoresist pattern of semiconductor device and method for forming the same
US20070266079A1 (en) * 2006-04-10 2007-11-15 Microsoft Corporation Content Upload Safety Tool
US20070282832A1 (en) * 2006-06-01 2007-12-06 Microsoft Corporation Automatic tracking of user data and reputation checking
US20110017307A1 (en) * 2008-03-05 2011-01-27 Dresser-Rand Company Compressor assembly including separator and ejector pump
US20120084349A1 (en) * 2009-12-30 2012-04-05 Wei-Yeh Lee User interface for user management and control of unsolicited server operations
US20110202881A1 (en) * 2010-02-16 2011-08-18 Yahoo! Inc. System and method for rewarding a user for sharing activity information with a third party
WO2014205431A2 (en) * 2013-06-21 2014-12-24 Wifiname, Inc. Wireless network and mac address device detection system and methods
US20160232570A1 (en) * 2015-02-11 2016-08-11 Aol Inc. Systems and methods for opting-out of targeted advertising in an online advertising environment

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11017118B2 (en) 2018-11-30 2021-05-25 International Business Machines Corporation Cognitive survey policy management
US11062025B1 (en) 2018-11-30 2021-07-13 BlueOwl, LLC SAS solution to automatically control data footprint
US11544376B2 (en) 2018-11-30 2023-01-03 BlueOwl, LLC SAS solution to automatically control data footprint
US11734424B2 (en) 2018-11-30 2023-08-22 BlueOwl, LLC SAS solution to automatically control data footprint
US12197569B2 (en) 2018-11-30 2025-01-14 Quanata, Llc SAS solution to automatically control data footprint
US20220414259A1 (en) * 2021-06-25 2022-12-29 Qonsent Inc. Systems and Methods for Electronic Data Privacy, Consent, and Control in Electronic Transactions
US20250148122A1 (en) * 2023-11-03 2025-05-08 Google Llc Data collection analysis for privacy risk assessment

Also Published As

Publication number Publication date
US10367852B2 (en) 2019-07-30
US20170070457A1 (en) 2017-03-09
EP3341841A4 (en) 2019-04-10
US20170070539A1 (en) 2017-03-09
WO2017040997A1 (en) 2017-03-09
US10362067B2 (en) 2019-07-23
EP3341841A1 (en) 2018-07-04

Similar Documents

Publication Publication Date Title
US20170068827A1 (en) Live privacy policy method and apparatus
US12299169B2 (en) Dynamic management of data with context-based processing
US9838839B2 (en) Repackaging media content data with anonymous identifiers
US10841364B2 (en) Using and comparing known and current activity states to determine receptiveness
US11074625B2 (en) Bidding based on the relative value of identifiers
US10839100B2 (en) Reverse-tiered model to manage temporal access to data
US12216775B2 (en) Systems and methods for mediating permissions
WO2014146099A1 (en) Cross-domain id synchronization in online advertisement
US11470057B2 (en) Systems and methods for protecting internet advertising data
US20190156351A1 (en) Brand follower tracking using social media data
US9910737B2 (en) Implementing change data capture by interpreting published events as a database recovery log
JP2024515476A (en) Enhancing user identification with privacy protection across multiple web servers - Patents.com
US20220086115A1 (en) System and method for promoting user engagement
US10891648B1 (en) Systems and methods for tracking the flow of user information over a network
US20190333103A1 (en) Method and system for distribution of advertisement fraud data to third parties
US10044823B2 (en) Social content aggregation
US11900398B1 (en) Call management system
Salner Digital Privacy: Personal Data Collection Methods and the Myth of Online Privacy
US20150106160A1 (en) Telecommunication system, apparatus, and method for capture, certification, distribution, and contact of online generated sales leads
US20140164615A1 (en) Systems and methods for enterprise cloud multi-site application targeting

Legal Events

Date Code Title Description
AS Assignment

Owner name: SWIM.IT INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SACHS, CHRISTOPER DAVID;REEL/FRAME:040190/0528

Effective date: 20161031

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION