US20170068827A1 - Live privacy policy method and apparatus - Google Patents
Live privacy policy method and apparatus Download PDFInfo
- Publication number
- US20170068827A1 US20170068827A1 US15/256,082 US201615256082A US2017068827A1 US 20170068827 A1 US20170068827 A1 US 20170068827A1 US 201615256082 A US201615256082 A US 201615256082A US 2017068827 A1 US2017068827 A1 US 2017068827A1
- Authority
- US
- United States
- Prior art keywords
- user
- real
- privacy
- information
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0277—Online advertisement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/70—Routing based on monitoring results
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/212—Monitoring or handling of messages using filtering or selective blocking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/214—Monitoring or handling of messages using selective forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5069—Address allocation for group communication, multicast communication or broadcast communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
- H04L67/101—Server selection for load balancing based on network conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0876—Network utilisation, e.g. volume of load or congestion level
- H04L43/0894—Packet rate
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic control in data switching networks
- H04L47/10—Flow control; Congestion control
- H04L47/12—Avoiding congestion; Recovering from congestion
- H04L47/125—Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/21—Monitoring or handling of messages
- H04L51/234—Monitoring or handling of messages for tracking messages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/45—Network directories; Name-to-address mapping
- H04L61/4541—Directories for service discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
Definitions
- the present invention relates to the field of privacy and security. More specifically, the present invention relates to website privacy and security.
- Interaction model refers to the flow of data and control between various entities. Browsers displaying the web application or website user interfaces directly interact with many types of systems on the internet (e.g., advertiser systems). The common perception is that the website or web application is driven from the software residing on enterprise servers. This might be the case for enterprises that are business-centric, but consumer-centric enterprises work with many partners and affiliates (e.g., Google Analytics, a data collector), and therefore the data and control flow is dynamically constructed based on the consumer activity on the website or web application.
- This dynamic interaction model is important for implementation of today's business strategies. Unfortunately, there are people and businesses that are taking advantage of this model to collect and misuse consumer data that can lead to privacy and security issues.
- a live privacy policy method and system enables enterprises to update in real-time their privacy policy declaration by monitoring the third-party activities using the invention described herein. Once the software is integrated into the website and web applications, third-party related activities are captured continuously and used to build a live profile that is also updated continuously. This allows enterprises adhere to privacy policy regulations without any delays. This also benefits consumers who are able to view the data being collected to determine if they want to opt out.
- FIG. 1 illustrates a block diagram of the live privacy policy system according to some embodiments.
- FIG. 2 illustrates a flowchart of an implementation of the live privacy policy method according to some embodiments.
- FIG. 3 illustrates a block diagram of an exemplary computing device configured to implement the live privacy policy method according to some embodiments.
- a privacy policy is a legal statement made by businesses to declare their policy regarding collection, use, dissemination, and maintenance of user/consumer/client (“Consumer”) personally identifiable information (PII) during the course of normal business conducted using the software applications or website of the business. Businesses are required to provide this legal statement to protect Consumer privacy.
- PII personally identifiable information
- Businesses have developed websites and web applications to support the interactive and highly interconnected environment in which people live and work today. These implementations involve: sourcing of content that is displayed in realtime when a user (e.g., Consumer) is interacting with the software; sourcing of content that is personalized to a user. Personalizations are based on: location of a user, profile/personality of the user, usage history, customer data from other sources and more; sourcing content from a multitude of sources; first party content where a first party is the website or web application owner that has the direct relationship with the user;
- third party content refers to: a business that is a separate legal entity from the first party, a business not affiliated by a common ownership or corporate control with the first party, a business that has access to first party resources (websites, web applications and data sources), if that business is authorized to use the information gathered from the resources for marketing or other purposes; content generation in realtime using dynamically generated scripts and other techniques, content personalization in realtime, customer data collection by first party or third parties, a large volume of data collection to support profiling and personalization, execution of range of analytics involving personal data to provide insights into individual and group trends, movements, interests, and activities; frequent and complex interactions among various businesses that involve personal data; and global availability of personal data, supported by communications networks and platforms.
- a third party e.g., advertisement networks
- a live privacy policy system that is generated by the collaborative efforts of key stakeholders involved in the PII collection, retention, usage, sharing and maintenance, includes: realtime data (who, what data, retention policy, usage policy and sharing policy) for a first party and third parties, consumer restrictions and business compliance information, and regulatory requirements and business compliance information.
- the live privacy policy system is tailored to a user and reflects the true intent of privacy rights.
- the key stakeholders responsible for the privacy policy are representatives of the business, Consumers and Third parties. Each of the stakeholders contribute to the generation of the Live Privacy Policy using tools and data that is made available to them.
- FIG. 1 illustrates a block diagram of the live privacy policy system according to some embodiments.
- the live privacy policy system 100 identifies the PII and PPI data collection of a business.
- a suite of tools automatically generates PII data from website and web applications associated with the business.
- an SDK along with a Privacy API 104 is able to be used to capture the PII and PPI data transacted using the application.
- the first party data is stored in the first party dataset 104 and the third party data is stored in the third party dataset 106 .
- PII and PPI data transacted is able to be captured by a browser extension 110 , and the data is saved in first party dataset 104 and in third party dataset 106 .
- Regulated PII and PPI is captured from the regulations and saved in a dataset 112 .
- Users/consumers 114 view the first party dataset 104 , third party dataset 106 , regulatory dataset 112 and specify the consumer restrictions on the dataset 116 .
- a live privacy policy manager 118 forwards restrictions specified by users 114 to a do not track manager 120 .
- the do not track manager 120 generates the appropriate do not track requests to third parties and to the business applications.
- the do not track requests are managed and monitored by industry entities such as National Advertising Initiative (NAI) and Digital Advertising Alliance (DAA). They will contact the appropriate company and request them to adhere to the user request.
- NAI National Advertising Initiative
- DAA Digital Advertising Alliance
- the do not track manager 120 will report back to the Live Privacy Profile Manager 118 , and the restriction status will be updated from Pending to Active or will remain in Pending status if a response is not received. In some embodiments, the do not track implementation is automatically executed.
- PII and PPI from business applications is captured in the business application PII/PPI dataset 122 .
- the live privacy policy manager 118 reads the first party dataset 104 , third party dataset 106 , consumer restrictions and the business apps dataset 122 to generate the live privacy profile 124 .
- FIG. 2 illustrates a flowchart of an implementation of the live privacy policy method according to some embodiments.
- step 200 data collection is monitored from enterprise mobile and web applications.
- the data collection is able to be monitored by integration of enterprise mobile applications with the privacy API using the SDK and/or offering consumers using enterprise web applications and websites to install browser extension.
- step 202 once the software is integrated and installed, users using the mobile and web applications are able to perform actions regarding privacy. For example, users are able to observe the data being collected. This is reflected in the enterprise privacy policy. Users are also able to restrict the data the enterprise and third parties are able to collect, use and share. The restrictions are implemented by the software by forwarding do not track requests. Users are also able to have a live privacy policy profile generated which provides privacy information specific to the user. In some embodiments, fewer or additional steps are implemented. In some embodiments, the order of the steps is modified.
- FIG. 3 illustrates a block diagram of an exemplary computing device configured to implement the live privacy policy method according to some embodiments.
- the computing device 300 is able to be used to acquire, store, compute, process, communicate and/or display information.
- a hardware structure suitable for implementing the computing device 300 includes a network interface 302 , a memory 304 , a processor 306 , I/O device(s) 308 , a bus 310 and a storage device 312 .
- the choice of processor is not critical as long as a suitable processor with sufficient speed is chosen.
- the memory 304 is able to be any conventional computer memory known in the art.
- the storage device 312 is able to include a hard drive, CDROM, CDRW, DVD, DVDRW, High Definition disc/drive, ultra-HD drive, flash memory card or any other storage device.
- the computing device 300 is able to include one or more network interfaces 302 .
- An example of a network interface includes a network card connected to an Ethernet or other type of LAN.
- the I/O device(s) 308 are able to include one or more of the following: keyboard, mouse, monitor, screen, printer, modem, touchscreen, button interface and other devices.
- Live privacy policy application(s) 330 used to perform the live privacy policy method are likely to be stored in the storage device 312 and memory 304 and processed as applications are typically processed. More or fewer components shown in FIG.
- live privacy policy hardware 320 is included.
- the computing device 300 in FIG. 3 includes applications 330 and hardware 320 for the live privacy policy method, the live privacy policy method is able to be implemented on a computing device in hardware, firmware, software or any combination thereof.
- the live privacy policy method applications 330 are programmed in a memory and executed using a processor.
- the live privacy policy hardware 320 is programmed hardware logic including gates specifically designed to implement the live privacy policy method.
- the live privacy policy application(s) 330 include several applications and/or modules. In some embodiments, modules include one or more sub-modules as well. In some embodiments, fewer or additional modules are able to be included.
- suitable computing devices include a personal computer, a laptop computer, a computer workstation, a server, a mainframe computer, a handheld computer, a personal digital assistant, a cellular/mobile telephone, a smart appliance, a gaming console, a digital camera, a digital camcorder, a camera phone, a smart phone, a portable music player, a tablet computer, a mobile device, a video player, a video disc writer/player (e.g., DVD writer/player, high definition disc writer/player, ultra high definition disc writer/player), a television, an augmented reality device, a virtual reality device, a home entertainment system, smart jewelry (e.g., smart watch) or any other suitable computing device.
- a personal computer e.g., a laptop computer, a computer workstation, a server, a mainframe computer, a handheld computer, a personal digital assistant, a cellular/mobile telephone, a smart appliance, a gaming console, a digital camera, a digital camcorder, a camera phone,
- data collection is monitored from enterprise mobile and web applications. Once software is integrated and installed, users using the mobile and web applications are able to: observe the data being collected and restrict the data the enterprise and third parties are able to collect, use and share.
- live privacy policy method and system provides many advantages:
- Enterprises will provide an accurate and up-to-date privacy policy to the consumers and others who they conduct business with. This will improve the credibility for the enterprise and provide more confidence to consumers and others while conducting online business with the enterprise.
- Data trackers and advertisers are able to continue to provide valuable personalization services to consumers but with explicit consent from the consumers.
- This cooperative environment will enable more accurate personalization and reduce the risks of inadvertent data leaks and security issues around personal data.
- a business is better able to establish and maintain consumer confidence and trust, by: enabling consumer participation in PII activities, viewing PII being collected, providing tools to update or remove inaccurate data, providing a process to allow users to register, track and view progress of complaints, enabling business to monitor and manage data minimization requirements, enabling business to monitor and manage PII including usage, quality and integrity and security, and implementing realtime updates to privacy policy. Businesses and consumers are offered a process to handle Customer “Do Not Track” requests.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Marketing (AREA)
- Game Theory and Decision Science (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Data Mining & Analysis (AREA)
- Technology Law (AREA)
- Automation & Control Theory (AREA)
- Multimedia (AREA)
- Medical Informatics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
- Environmental & Geological Engineering (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
A live privacy policy method and system enables enterprises to update in real-time their privacy policy declaration by monitoring the third-party activities using the invention described herein. Once the software is integrated into the website and web applications, third-party related activities are captured continuously and used to build a live profile that is also updated continuously. This allows enterprises adhere to privacy policy regulations without any delays. This also benefits consumers who are able to view the data being collected to determine if they want to opt out.
Description
- This application claims the benefit of U.S. Provisional Patent Application Ser. No. 62/214,786, filed Sep. 4, 2015, and titled “PRIVACY AWARENESS APPLICATION, LIVE PRIVACY POLICY, AND DISTRIBUTED AND MULTIPLEXED PEER TO PEER REAL-TIME MESSAGING UTILIZING BACK PRESSURE SIGNALLING,” which is hereby incorporated by reference in its entirety for all purposes.
- The present invention relates to the field of privacy and security. More specifically, the present invention relates to website privacy and security.
- Today's websites and web application interaction model involve a browser retrieving data over the Internet (e.g., WWW) from advertisers, data collectors, content delivery networks and enterprise servers. Interaction model refers to the flow of data and control between various entities. Browsers displaying the web application or website user interfaces directly interact with many types of systems on the internet (e.g., advertiser systems). The common perception is that the website or web application is driven from the software residing on enterprise servers. This might be the case for enterprises that are business-centric, but consumer-centric enterprises work with many partners and affiliates (e.g., Google Analytics, a data collector), and therefore the data and control flow is dynamically constructed based on the consumer activity on the website or web application.
- This dynamic interaction model is important for implementation of today's business strategies. Unfortunately, there are people and businesses that are taking advantage of this model to collect and misuse consumer data that can lead to privacy and security issues.
- Enterprises are providing free products (e.g., email application) and services in exchange for the right to collect user/consumer information. This was the start of consumer data privacy problems, and today this data collection is being taken advantage of by third-parties (partners, direct and indirect affiliates and others) without direct consent of users/consumers. Key problems associated with data collection are:
- 1. Users/Consumers do not have an explicit understanding of specific data that is being collected, stored, used, shared and for what purpose. This data is being monetized by the collecting enterprises. If consumers are aware of specifics and the associated opportunity cost then they can make a more informed decision about using these free products and services.
- 2. Consumers have a very limited or no understanding of data being collected by third-parties. This data is typically Personally Identifiable Information (PII) and Personality Profiling Information (PPI). This data is being monetized and misused by the collecting third-parties. If consumers are aware of what is being collected by these third-parties then they can opt-out or inform the enterprises to stop this data collection.
- A live privacy policy method and system enables enterprises to update in real-time their privacy policy declaration by monitoring the third-party activities using the invention described herein. Once the software is integrated into the website and web applications, third-party related activities are captured continuously and used to build a live profile that is also updated continuously. This allows enterprises adhere to privacy policy regulations without any delays. This also benefits consumers who are able to view the data being collected to determine if they want to opt out.
-
FIG. 1 illustrates a block diagram of the live privacy policy system according to some embodiments. -
FIG. 2 illustrates a flowchart of an implementation of the live privacy policy method according to some embodiments. -
FIG. 3 illustrates a block diagram of an exemplary computing device configured to implement the live privacy policy method according to some embodiments. - A privacy policy is a legal statement made by businesses to declare their policy regarding collection, use, dissemination, and maintenance of user/consumer/client (“Consumer”) personally identifiable information (PII) during the course of normal business conducted using the software applications or website of the business. Businesses are required to provide this legal statement to protect Consumer privacy. The United States Federal Trade Commission, U.S. state government agencies and similar agencies from other countries have been using a variety of tools to protect consumers' privacy and personal information.
- Businesses have developed websites and web applications to support the interactive and highly interconnected environment in which people live and work today. These implementations involve: sourcing of content that is displayed in realtime when a user (e.g., Consumer) is interacting with the software; sourcing of content that is personalized to a user. Personalizations are based on: location of a user, profile/personality of the user, usage history, customer data from other sources and more; sourcing content from a multitude of sources; first party content where a first party is the website or web application owner that has the direct relationship with the user;
- third party content, where a third party (e.g., advertisement networks) refers to: a business that is a separate legal entity from the first party, a business not affiliated by a common ownership or corporate control with the first party, a business that has access to first party resources (websites, web applications and data sources), if that business is authorized to use the information gathered from the resources for marketing or other purposes; content generation in realtime using dynamically generated scripts and other techniques, content personalization in realtime, customer data collection by first party or third parties, a large volume of data collection to support profiling and personalization, execution of range of analytics involving personal data to provide insights into individual and group trends, movements, interests, and activities; frequent and complex interactions among various businesses that involve personal data; and global availability of personal data, supported by communications networks and platforms.
- These implementations are leading to many problems such as:
- 1. Privacy profiles that are high level and do not offer Consumers a precise, transparent and easily understandable statement about collection, use, dissemination, and maintenance of PII and Personal Profile Information (PPI).
- 2. Involvement of numerous third-parties results in Privacy profiles that do not provide a complete purpose specifications that requires disclosure of authority that permits the collection of PII & PPI, intended use of PII & PPI, inability to control the PII and PPI data collection and therefore adhere to the data minimization requirement which involves: businesses collecting PII that is directly relevant and required to accomplish a specified purpose(s), and businesses retaining PII for a duration of time that is necessary to fulfill the specified purpose(s).
- 3. Dynamic nature and the involvement of third parties causes business difficulty in tracking, accounting and auditing of PII
- 4. Inability of the businesses to capture and record changes to the privacy profile in a timeframe that reflects the reality.
- 5. Lack of Consumer participation in a business privacy policy implementation and maintenance due to lack of awareness regarding the PII data collection (what, when, where, who, and more) and inability and lack of technology/tools to offer consent to PII related activities of a business.
- 6. Security of PII is difficult because of the number of businesses handling the information and distribution to many geographically diverse locations.
- 7. Inability for industry watchdog groups and law enforcement agencies to monitor and enforce privacy guidelines and laws due to lack of information from the dynamic and realtime network of privacy data collectors and users.
- A live privacy policy system that is generated by the collaborative efforts of key stakeholders involved in the PII collection, retention, usage, sharing and maintenance, includes: realtime data (who, what data, retention policy, usage policy and sharing policy) for a first party and third parties, consumer restrictions and business compliance information, and regulatory requirements and business compliance information.
- The live privacy policy system is tailored to a user and reflects the true intent of privacy rights. The key stakeholders responsible for the privacy policy are representatives of the business, Consumers and Third parties. Each of the stakeholders contribute to the generation of the Live Privacy Policy using tools and data that is made available to them.
-
FIG. 1 illustrates a block diagram of the live privacy policy system according to some embodiments. The liveprivacy policy system 100 identifies the PII and PPI data collection of a business. A suite of tools automatically generates PII data from website and web applications associated with the business. For applications on the web/desktop/mobile 102 that capture PII and PPI data, an SDK along with aPrivacy API 104 is able to be used to capture the PII and PPI data transacted using the application. The first party data is stored in thefirst party dataset 104 and the third party data is stored in thethird party dataset 106. - For
websites 108, PII and PPI data transacted is able to be captured by abrowser extension 110, and the data is saved infirst party dataset 104 and inthird party dataset 106. - Regulated PII and PPI is captured from the regulations and saved in a
dataset 112. - Users/
consumers 114 view thefirst party dataset 104,third party dataset 106,regulatory dataset 112 and specify the consumer restrictions on thedataset 116. A liveprivacy policy manager 118 forwards restrictions specified byusers 114 to a do not trackmanager 120. The do not trackmanager 120 generates the appropriate do not track requests to third parties and to the business applications. In some embodiments, the do not track requests are managed and monitored by industry entities such as National Advertising Initiative (NAI) and Digital Advertising Alliance (DAA). They will contact the appropriate company and request them to adhere to the user request. Once a confirmation is received from these entities, the do not trackmanager 120 will report back to the LivePrivacy Profile Manager 118, and the restriction status will be updated from Pending to Active or will remain in Pending status if a response is not received. In some embodiments, the do not track implementation is automatically executed. - PII and PPI from business applications is captured in the business application PII/
PPI dataset 122. - Each time a
user 114 requests a live privacy policy from a business, the liveprivacy policy manager 118 reads thefirst party dataset 104,third party dataset 106, consumer restrictions and the business apps dataset 122 to generate thelive privacy profile 124. -
FIG. 2 illustrates a flowchart of an implementation of the live privacy policy method according to some embodiments. In thestep 200, data collection is monitored from enterprise mobile and web applications. The data collection is able to be monitored by integration of enterprise mobile applications with the privacy API using the SDK and/or offering consumers using enterprise web applications and websites to install browser extension. In thestep 202, once the software is integrated and installed, users using the mobile and web applications are able to perform actions regarding privacy. For example, users are able to observe the data being collected. This is reflected in the enterprise privacy policy. Users are also able to restrict the data the enterprise and third parties are able to collect, use and share. The restrictions are implemented by the software by forwarding do not track requests. Users are also able to have a live privacy policy profile generated which provides privacy information specific to the user. In some embodiments, fewer or additional steps are implemented. In some embodiments, the order of the steps is modified. -
FIG. 3 illustrates a block diagram of an exemplary computing device configured to implement the live privacy policy method according to some embodiments. Thecomputing device 300 is able to be used to acquire, store, compute, process, communicate and/or display information. In general, a hardware structure suitable for implementing thecomputing device 300 includes anetwork interface 302, amemory 304, aprocessor 306, I/O device(s) 308, abus 310 and astorage device 312. The choice of processor is not critical as long as a suitable processor with sufficient speed is chosen. Thememory 304 is able to be any conventional computer memory known in the art. Thestorage device 312 is able to include a hard drive, CDROM, CDRW, DVD, DVDRW, High Definition disc/drive, ultra-HD drive, flash memory card or any other storage device. Thecomputing device 300 is able to include one or more network interfaces 302. An example of a network interface includes a network card connected to an Ethernet or other type of LAN. The I/O device(s) 308 are able to include one or more of the following: keyboard, mouse, monitor, screen, printer, modem, touchscreen, button interface and other devices. Live privacy policy application(s) 330 used to perform the live privacy policy method are likely to be stored in thestorage device 312 andmemory 304 and processed as applications are typically processed. More or fewer components shown inFIG. 3 are able to be included in thecomputing device 300. In some embodiments, liveprivacy policy hardware 320 is included. Although thecomputing device 300 inFIG. 3 includesapplications 330 andhardware 320 for the live privacy policy method, the live privacy policy method is able to be implemented on a computing device in hardware, firmware, software or any combination thereof. For example, in some embodiments, the live privacypolicy method applications 330 are programmed in a memory and executed using a processor. In another example, in some embodiments, the liveprivacy policy hardware 320 is programmed hardware logic including gates specifically designed to implement the live privacy policy method. - In some embodiments, the live privacy policy application(s) 330 include several applications and/or modules. In some embodiments, modules include one or more sub-modules as well. In some embodiments, fewer or additional modules are able to be included.
- Examples of suitable computing devices include a personal computer, a laptop computer, a computer workstation, a server, a mainframe computer, a handheld computer, a personal digital assistant, a cellular/mobile telephone, a smart appliance, a gaming console, a digital camera, a digital camcorder, a camera phone, a smart phone, a portable music player, a tablet computer, a mobile device, a video player, a video disc writer/player (e.g., DVD writer/player, high definition disc writer/player, ultra high definition disc writer/player), a television, an augmented reality device, a virtual reality device, a home entertainment system, smart jewelry (e.g., smart watch) or any other suitable computing device.
- To utilize the live privacy policy method and system, data collection is monitored from enterprise mobile and web applications. Once software is integrated and installed, users using the mobile and web applications are able to: observe the data being collected and restrict the data the enterprise and third parties are able to collect, use and share.
- In operation, live privacy policy method and system provides many advantages:
- Enterprises will provide an accurate and up-to-date privacy policy to the consumers and others who they conduct business with. This will improve the credibility for the enterprise and provide more confidence to consumers and others while conducting online business with the enterprise.
- Data trackers and advertisers are able to continue to provide valuable personalization services to consumers but with explicit consent from the consumers. This cooperative environment will enable more accurate personalization and reduce the risks of inadvertent data leaks and security issues around personal data.
- Consumers get personalized content while controlling what they want to share with enterprises providing products and services.
- Consumer awareness that is context-specific and transparent, such as identifying: PII and PPI that is collected, third parties involved and their PII and PPI activities and other data sharing relationships among third parties that are not directly attributed to business that have direct consumer relationships. A business is better able to establish and maintain consumer confidence and trust, by: enabling consumer participation in PII activities, viewing PII being collected, providing tools to update or remove inaccurate data, providing a process to allow users to register, track and view progress of complaints, enabling business to monitor and manage data minimization requirements, enabling business to monitor and manage PII including usage, quality and integrity and security, and implementing realtime updates to privacy policy. Businesses and consumers are offered a process to handle Customer “Do Not Track” requests.
- The present invention has been described in terms of specific embodiments incorporating details to facilitate the understanding of principles of construction and operation of the invention. Such reference herein to specific embodiments and details thereof is not intended to limit the scope of the claims appended hereto. It will be readily apparent to one skilled in the art that other various modifications may be made in the embodiment chosen for illustration without departing from the spirit and scope of the invention as defined by the claims.
Claims (30)
1. A method programmed in a non-transitory memory of a device comprising:
a. collecting real-time data associated with a company's website ecosystem partners and affiliates; and
b. generating a dynamic privacy document which is updated based on the real-time data.
2. The method of claim 1 wherein the real-time data comprises a user's privacy data including Personally Identifiable Information (PII) and Personal Profiling Information (PPI).
3. The method of claim 1 wherein the user's privacy data includes the user's name, address, phone number, websites visited, location, or purchase history.
4. The method of claim 1 further comprising displaying the dynamic privacy document.
5. The method of claim 1 further comprising enabling a user to provide input regarding the collection of the real-time privacy data.
6. The method of claim 5 wherein enabling a user to provide input includes collaborating with the company's advertisement ecosystem and affiliates regarding private data collection, processing and storage of private data.
7. The method of claim 5 further comprising enabling a user to receive personalized content, and enabling the user to control what information is shared and how the information is used.
8. The method of claim 1 further comprising:
identifying personally identifiable information and personality profiling information; and
forwarding a restriction specified by a user to a do not track manager based on reviewing the personally identifiable information and the personality profiling information.
9. The method of claim 1 wherein collecting the real-time data is with a software developer kit along with a privacy application programming interface.
10. The method of claim 1 wherein collecting the real-time data is with a browser extension.
11. An apparatus comprising:
a. a non-transitory memory for storing an application, the application configured for:
i. collecting real-time data associated with a company's website ecosystem partners and affiliates; and
ii. generating a dynamic privacy document which is updated based on the real-time data; and
b. a processor for processing the application.
12. The apparatus of claim 11 wherein the real-time data comprises a user's privacy data including Personally Identifiable Information (PII) and Personal Profiling Information (PPI).
13. The apparatus of claim 11 wherein the user's privacy data includes the user's name, address, phone number, websites visited, location, or purchase history.
14. The apparatus of claim 11 further comprising a display for displaying the dynamic privacy document.
15. The apparatus of claim 11 the application further configured for enabling a user to provide input regarding the collection of the real-time privacy data.
16. The apparatus of claim 15 wherein enabling a user to provide input includes collaborating with the company's advertisement ecosystem and affiliates regarding private data collection, processing and storage of private data.
17. The apparatus of claim 15 the application further configured for enabling a user to receive personalized content, and enabling the user to control what information is shared and how the information is used.
18. The apparatus of claim 11 the application further configured for:
identifying personally identifiable information and personality profiling information; and
forwarding a restriction specified by a user to a do not track manager based on reviewing the personally identifiable information and the personality profiling information.
19. The apparatus of claim 11 wherein collecting the real-time data is with a software developer kit along with a privacy application programming interface.
20. The apparatus of claim 11 wherein collecting the real-time data is with a browser extension.
21. A system comprising:
a. a client device configured for collecting real-time data associated with a company's website ecosystem partners and affiliates; and
b. a server device configured for generating a dynamic privacy document which is updated based on the real-time data.
22. The system of claim 21 wherein the real-time data comprises a user's privacy data including Personally Identifiable Information (PII) and Personal Profiling Information (PPI).
23. The system of claim 21 wherein the user's privacy data includes the user's name, address, phone number, websites visited, location or purchase history.
24. The system of claim 21 wherein the client device is configured for displaying the dynamic privacy document.
25. The system of claim 21 wherein the client device is configured for enabling a user to provide input regarding the collection of the real-time privacy data.
26. The system of claim 25 wherein enabling a user to provide input includes collaborating with the company's advertisement ecosystem and affiliates regarding private data collection, processing and storage of private data.
27. The system of claim 25 further comprising enabling a user to receive personalized content, and enabling the user to control what information is shared and how the information is used.
28. The system of claim 21 wherein the client device is configured for:
identifying personally identifiable information and personality profiling information; and
forwarding a restriction specified by a user to a do not track manager based on reviewing the personally identifiable information and the personality profiling information.
29. The system of claim 21 wherein collecting the real-time data is with a software developer kit along with a privacy application programming interface.
30. The system of claim 21 wherein collecting the real-time data is with a browser extension.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US15/256,082 US20170068827A1 (en) | 2015-09-04 | 2016-09-02 | Live privacy policy method and apparatus |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201562214786P | 2015-09-04 | 2015-09-04 | |
| US15/256,082 US20170068827A1 (en) | 2015-09-04 | 2016-09-02 | Live privacy policy method and apparatus |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20170068827A1 true US20170068827A1 (en) | 2017-03-09 |
Family
ID=58188681
Family Applications (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/256,055 Active US10362067B2 (en) | 2015-09-04 | 2016-09-02 | Method of and system for privacy awareness |
| US15/256,112 Active 2037-02-23 US10367852B2 (en) | 2015-09-04 | 2016-09-02 | Multiplexed demand signaled distributed messaging |
| US15/256,082 Abandoned US20170068827A1 (en) | 2015-09-04 | 2016-09-02 | Live privacy policy method and apparatus |
Family Applications Before (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US15/256,055 Active US10362067B2 (en) | 2015-09-04 | 2016-09-02 | Method of and system for privacy awareness |
| US15/256,112 Active 2037-02-23 US10367852B2 (en) | 2015-09-04 | 2016-09-02 | Multiplexed demand signaled distributed messaging |
Country Status (3)
| Country | Link |
|---|---|
| US (3) | US10362067B2 (en) |
| EP (1) | EP3341841A4 (en) |
| WO (1) | WO2017040997A1 (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11017118B2 (en) | 2018-11-30 | 2021-05-25 | International Business Machines Corporation | Cognitive survey policy management |
| US11062025B1 (en) | 2018-11-30 | 2021-07-13 | BlueOwl, LLC | SAS solution to automatically control data footprint |
| US20220414259A1 (en) * | 2021-06-25 | 2022-12-29 | Qonsent Inc. | Systems and Methods for Electronic Data Privacy, Consent, and Control in Electronic Transactions |
| US20250148122A1 (en) * | 2023-11-03 | 2025-05-08 | Google Llc | Data collection analysis for privacy risk assessment |
Families Citing this family (26)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10303035B2 (en) | 2009-12-22 | 2019-05-28 | View, Inc. | Self-contained EC IGU |
| US20210063836A1 (en) | 2017-04-26 | 2021-03-04 | View, Inc. | Building network |
| US12105394B2 (en) | 2011-03-16 | 2024-10-01 | View, Inc. | Commissioning window networks |
| US11054792B2 (en) | 2012-04-13 | 2021-07-06 | View, Inc. | Monitoring sites containing switchable optical devices and controllers |
| US10989977B2 (en) | 2011-03-16 | 2021-04-27 | View, Inc. | Onboard controller for multistate windows |
| US10989976B2 (en) | 2011-03-16 | 2021-04-27 | View, Inc. | Commissioning window networks |
| WO2015134789A1 (en) | 2014-03-05 | 2015-09-11 | View, Inc. | Monitoring sites containing switchable optical devices and controllers |
| US11868103B2 (en) | 2014-03-05 | 2024-01-09 | View, Inc. | Site monitoring system |
| US10481459B2 (en) | 2014-06-30 | 2019-11-19 | View, Inc. | Control methods and systems for networks of optically switchable windows during reduced power availability |
| US11740948B2 (en) | 2014-12-08 | 2023-08-29 | View, Inc. | Multiple interacting systems at a site |
| US12366111B2 (en) | 2015-09-18 | 2025-07-22 | View Operating Corporation | Trunk line window controllers |
| EP3426874B1 (en) | 2016-03-09 | 2022-07-13 | View, Inc. | Method of commissioning electrochromic windows |
| US10574540B2 (en) * | 2016-09-17 | 2020-02-25 | Anand Sambandam | Method and system for facilitating management of service agreements for consumer clarity over multiple channels |
| US12147142B2 (en) | 2017-04-26 | 2024-11-19 | View, Inc. | Remote management of a facility |
| US20190166031A1 (en) * | 2017-11-29 | 2019-05-30 | LogicMonitor, Inc. | Robust monitoring of it infrastructure performance |
| US11303601B2 (en) | 2017-12-14 | 2022-04-12 | Meta Platforms, Inc. | Systems and methods for sharing content |
| US10873558B2 (en) | 2017-12-14 | 2020-12-22 | Facebook, Inc. | Systems and methods for sharing content |
| US20190362069A1 (en) * | 2018-05-22 | 2019-11-28 | Allstate Insurance Company | Digital Visualization and Perspective Manager |
| US11494502B2 (en) | 2018-10-25 | 2022-11-08 | Microsoft Technology Licensing, Llc | Privacy awareness for personal assistant communications |
| EP3966963A2 (en) | 2019-05-09 | 2022-03-16 | View, Inc. | Antenna systems for controlled coverage in buildings |
| CA3164250A1 (en) | 2019-12-05 | 2021-06-10 | Liveramp, Inc. | Multi-controller opt-out system and method |
| TW202206925A (en) | 2020-03-26 | 2022-02-16 | 美商視野公司 | Access and messaging in a multi client network |
| US11809602B2 (en) * | 2020-09-02 | 2023-11-07 | International Business Machines Corporation | Privacy verification for electronic communications |
| US12326949B2 (en) | 2021-11-12 | 2025-06-10 | Microsoft Technology Licensing, Llc | Privacy data management in distributed computing systems |
| US12314425B2 (en) * | 2021-11-12 | 2025-05-27 | Microsoft Technology Licensing, Llc | Privacy data management in distributed computing systems |
| US12153713B1 (en) * | 2022-03-23 | 2024-11-26 | Gen Digital Inc. | Systems and methods for protecting user data privacy by detecting the extension of tracker coverage of website browsing sessions through indirect data disclosure |
Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040139025A1 (en) * | 2001-05-08 | 2004-07-15 | Coleman Thomas E. | Privacy protection system and method |
| US20070026627A1 (en) * | 2005-07-26 | 2007-02-01 | Kim Sung M | Well photoresist pattern of semiconductor device and method for forming the same |
| US20070266079A1 (en) * | 2006-04-10 | 2007-11-15 | Microsoft Corporation | Content Upload Safety Tool |
| US20070282832A1 (en) * | 2006-06-01 | 2007-12-06 | Microsoft Corporation | Automatic tracking of user data and reputation checking |
| US7761568B1 (en) * | 2004-02-03 | 2010-07-20 | Xweb, Inc. | Data transmission verification and identification system and method |
| US20110017307A1 (en) * | 2008-03-05 | 2011-01-27 | Dresser-Rand Company | Compressor assembly including separator and ejector pump |
| US20110202881A1 (en) * | 2010-02-16 | 2011-08-18 | Yahoo! Inc. | System and method for rewarding a user for sharing activity information with a third party |
| US20120084349A1 (en) * | 2009-12-30 | 2012-04-05 | Wei-Yeh Lee | User interface for user management and control of unsolicited server operations |
| WO2014205431A2 (en) * | 2013-06-21 | 2014-12-24 | Wifiname, Inc. | Wireless network and mac address device detection system and methods |
| US20160232570A1 (en) * | 2015-02-11 | 2016-08-11 | Aol Inc. | Systems and methods for opting-out of targeted advertising in an online advertising environment |
Family Cites Families (38)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6275824B1 (en) | 1998-10-02 | 2001-08-14 | Ncr Corporation | System and method for managing data privacy in a database management system |
| US7478157B2 (en) * | 2001-11-07 | 2009-01-13 | International Business Machines Corporation | System, method, and business methods for enforcing privacy preferences on personal-data exchanges across a network |
| US20030131052A1 (en) * | 2002-01-10 | 2003-07-10 | International Business Machines Corporatioin | Method and system for HTTP time-on-page monitoring without client-side installation |
| US7284067B2 (en) * | 2002-02-20 | 2007-10-16 | Hewlett-Packard Development Company, L.P. | Method for integrated load balancing among peer servers |
| US7937493B2 (en) * | 2003-08-14 | 2011-05-03 | Oracle International Corporation | Connection pool use of runtime load balancing service performance advisories |
| EP1781123A1 (en) * | 2004-08-23 | 2007-05-09 | U.S. Smokeless Tobacco Company | Nicotiana compositions |
| EP1847071A4 (en) * | 2005-01-26 | 2010-10-20 | Internet Broadcasting Corp B V | MULTI-DIFFUSION IN LAYERS AND EXACT ATTRIBUTION OF BANDWIDTH AND PRIORIZATION OF PACKETS |
| US9384345B2 (en) | 2005-05-03 | 2016-07-05 | Mcafee, Inc. | Providing alternative web content based on website reputation assessment |
| WO2007144611A1 (en) | 2006-06-12 | 2007-12-21 | Enigmatec Corporation | Self-managed distributed mediation networks |
| US7672235B1 (en) * | 2006-06-14 | 2010-03-02 | Roxbeam Media Network Corporation | System and method for buffering real-time streaming content in a peer-to-peer overlay network |
| US8745151B2 (en) | 2006-11-09 | 2014-06-03 | Red Hat, Inc. | Web page protection against phishing |
| US8346753B2 (en) | 2006-11-14 | 2013-01-01 | Paul V Hayes | System and method for searching for internet-accessible content |
| US7657648B2 (en) * | 2007-06-21 | 2010-02-02 | Microsoft Corporation | Hybrid tree/mesh overlay for data delivery |
| US20090100322A1 (en) * | 2007-10-11 | 2009-04-16 | International Business Machines Corporation | Retrieving data relating to a web page prior to initiating viewing of the web page |
| CN102216947A (en) * | 2008-10-08 | 2011-10-12 | 阿德基佩尔公司 | Managing internet advertising and promotional content |
| US20100094860A1 (en) | 2008-10-09 | 2010-04-15 | Google Inc. | Indexing online advertisements |
| US8364713B2 (en) * | 2009-01-20 | 2013-01-29 | Titanium Fire Ltd. | Personal data manager systems and methods |
| US20120023133A1 (en) * | 2009-04-01 | 2012-01-26 | Woodt Inc. | Document searching system and method |
| US9135629B2 (en) * | 2009-06-23 | 2015-09-15 | Simeon S. Simeonov | User targeting management, monitoring and enforcement |
| US9172706B2 (en) * | 2009-11-23 | 2015-10-27 | At&T Intellectual Property I, L.P. | Tailored protection of personally identifiable information |
| US9361631B2 (en) | 2010-01-06 | 2016-06-07 | Ghostery, Inc. | Managing and monitoring digital advertising |
| US20110295988A1 (en) * | 2010-05-28 | 2011-12-01 | Le Jouan Herve | Managing data on computer and telecommunications networks |
| CN107608755A (en) | 2010-07-01 | 2018-01-19 | 纽戴纳公司 | Split process between cluster by process type to optimize the use of cluster particular configuration |
| US8181254B1 (en) * | 2011-10-28 | 2012-05-15 | Google Inc. | Setting default security features for use with web applications and extensions |
| US20130151547A1 (en) * | 2011-12-09 | 2013-06-13 | Sap Ag | Method and system for generating document recommendations |
| EP2798523A4 (en) * | 2011-12-28 | 2015-09-09 | Intel Corp | Persona manager for network communications |
| US9535755B2 (en) * | 2012-03-09 | 2017-01-03 | Google Inc. | Tiers of data storage for web applications and browser extensions |
| WO2013163652A2 (en) * | 2012-04-27 | 2013-10-31 | Privowny, Inc. | Managing data on computer and telecommunications networks |
| US9524198B2 (en) | 2012-07-27 | 2016-12-20 | Google Inc. | Messaging between web applications |
| KR20150105359A (en) * | 2013-01-09 | 2015-09-16 | 에버님, 인크. | Systems and methods for access-controlled interactions |
| US9672223B2 (en) * | 2013-04-25 | 2017-06-06 | Google Inc. | Geo photo searching based on current conditions at a location |
| US10574766B2 (en) | 2013-06-21 | 2020-02-25 | Comscore, Inc. | Clickstream analysis methods and systems related to determining actionable insights relating to a path to purchase |
| US9703988B1 (en) * | 2013-07-12 | 2017-07-11 | Abine, Inc. | Internet privacy tool for mitigating third party transaction tracking |
| US10445769B2 (en) * | 2013-12-24 | 2019-10-15 | Google Llc | Systems and methods for audience measurement |
| US8898808B1 (en) * | 2014-01-10 | 2014-11-25 | Ghostery, Inc. | System and method for assessing effectiveness of online advertising |
| US20160300231A1 (en) * | 2015-04-10 | 2016-10-13 | Abine, Inc. | Push notification authentication platform for secured form filling |
| US9904916B2 (en) | 2015-07-01 | 2018-02-27 | Klarna Ab | Incremental login and authentication to user portal without username/password |
| US9510036B1 (en) | 2015-10-26 | 2016-11-29 | Google Inc. | Systems and methods for providing content in a content list |
-
2016
- 2016-09-02 US US15/256,055 patent/US10362067B2/en active Active
- 2016-09-02 EP EP16843111.2A patent/EP3341841A4/en not_active Withdrawn
- 2016-09-02 WO PCT/US2016/050204 patent/WO2017040997A1/en not_active Ceased
- 2016-09-02 US US15/256,112 patent/US10367852B2/en active Active
- 2016-09-02 US US15/256,082 patent/US20170068827A1/en not_active Abandoned
Patent Citations (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20040139025A1 (en) * | 2001-05-08 | 2004-07-15 | Coleman Thomas E. | Privacy protection system and method |
| US7761568B1 (en) * | 2004-02-03 | 2010-07-20 | Xweb, Inc. | Data transmission verification and identification system and method |
| US20070026627A1 (en) * | 2005-07-26 | 2007-02-01 | Kim Sung M | Well photoresist pattern of semiconductor device and method for forming the same |
| US20070266079A1 (en) * | 2006-04-10 | 2007-11-15 | Microsoft Corporation | Content Upload Safety Tool |
| US20070282832A1 (en) * | 2006-06-01 | 2007-12-06 | Microsoft Corporation | Automatic tracking of user data and reputation checking |
| US20110017307A1 (en) * | 2008-03-05 | 2011-01-27 | Dresser-Rand Company | Compressor assembly including separator and ejector pump |
| US20120084349A1 (en) * | 2009-12-30 | 2012-04-05 | Wei-Yeh Lee | User interface for user management and control of unsolicited server operations |
| US20110202881A1 (en) * | 2010-02-16 | 2011-08-18 | Yahoo! Inc. | System and method for rewarding a user for sharing activity information with a third party |
| WO2014205431A2 (en) * | 2013-06-21 | 2014-12-24 | Wifiname, Inc. | Wireless network and mac address device detection system and methods |
| US20160232570A1 (en) * | 2015-02-11 | 2016-08-11 | Aol Inc. | Systems and methods for opting-out of targeted advertising in an online advertising environment |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11017118B2 (en) | 2018-11-30 | 2021-05-25 | International Business Machines Corporation | Cognitive survey policy management |
| US11062025B1 (en) | 2018-11-30 | 2021-07-13 | BlueOwl, LLC | SAS solution to automatically control data footprint |
| US11544376B2 (en) | 2018-11-30 | 2023-01-03 | BlueOwl, LLC | SAS solution to automatically control data footprint |
| US11734424B2 (en) | 2018-11-30 | 2023-08-22 | BlueOwl, LLC | SAS solution to automatically control data footprint |
| US12197569B2 (en) | 2018-11-30 | 2025-01-14 | Quanata, Llc | SAS solution to automatically control data footprint |
| US20220414259A1 (en) * | 2021-06-25 | 2022-12-29 | Qonsent Inc. | Systems and Methods for Electronic Data Privacy, Consent, and Control in Electronic Transactions |
| US20250148122A1 (en) * | 2023-11-03 | 2025-05-08 | Google Llc | Data collection analysis for privacy risk assessment |
Also Published As
| Publication number | Publication date |
|---|---|
| US10367852B2 (en) | 2019-07-30 |
| US20170070457A1 (en) | 2017-03-09 |
| EP3341841A4 (en) | 2019-04-10 |
| US20170070539A1 (en) | 2017-03-09 |
| WO2017040997A1 (en) | 2017-03-09 |
| US10362067B2 (en) | 2019-07-23 |
| EP3341841A1 (en) | 2018-07-04 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20170068827A1 (en) | Live privacy policy method and apparatus | |
| US12299169B2 (en) | Dynamic management of data with context-based processing | |
| US9838839B2 (en) | Repackaging media content data with anonymous identifiers | |
| US10841364B2 (en) | Using and comparing known and current activity states to determine receptiveness | |
| US11074625B2 (en) | Bidding based on the relative value of identifiers | |
| US10839100B2 (en) | Reverse-tiered model to manage temporal access to data | |
| US12216775B2 (en) | Systems and methods for mediating permissions | |
| WO2014146099A1 (en) | Cross-domain id synchronization in online advertisement | |
| US11470057B2 (en) | Systems and methods for protecting internet advertising data | |
| US20190156351A1 (en) | Brand follower tracking using social media data | |
| US9910737B2 (en) | Implementing change data capture by interpreting published events as a database recovery log | |
| JP2024515476A (en) | Enhancing user identification with privacy protection across multiple web servers - Patents.com | |
| US20220086115A1 (en) | System and method for promoting user engagement | |
| US10891648B1 (en) | Systems and methods for tracking the flow of user information over a network | |
| US20190333103A1 (en) | Method and system for distribution of advertisement fraud data to third parties | |
| US10044823B2 (en) | Social content aggregation | |
| US11900398B1 (en) | Call management system | |
| Salner | Digital Privacy: Personal Data Collection Methods and the Myth of Online Privacy | |
| US20150106160A1 (en) | Telecommunication system, apparatus, and method for capture, certification, distribution, and contact of online generated sales leads | |
| US20140164615A1 (en) | Systems and methods for enterprise cloud multi-site application targeting |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: SWIM.IT INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SACHS, CHRISTOPER DAVID;REEL/FRAME:040190/0528 Effective date: 20161031 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |