WO2013121790A1 - プライバシ情報を扱う情報処理装置、プライバシ情報を扱う情報処理システム、プライバシ情報を扱う情報処理方法及びプログラム - Google Patents
プライバシ情報を扱う情報処理装置、プライバシ情報を扱う情報処理システム、プライバシ情報を扱う情報処理方法及びプログラム Download PDFInfo
- Publication number
- WO2013121790A1 WO2013121790A1 PCT/JP2013/000825 JP2013000825W WO2013121790A1 WO 2013121790 A1 WO2013121790 A1 WO 2013121790A1 JP 2013000825 W JP2013000825 W JP 2013000825W WO 2013121790 A1 WO2013121790 A1 WO 2013121790A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- policy
- privacy information
- service
- identifier
- Prior art date
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 46
- 238000003672 processing method Methods 0.000 title claims description 5
- 238000000605 extraction Methods 0.000 claims abstract description 66
- 238000000034 method Methods 0.000 claims abstract description 26
- 238000004364 calculation method Methods 0.000 claims description 59
- 239000000284 extract Substances 0.000 claims description 11
- 238000010586 diagram Methods 0.000 description 23
- 238000005516 engineering process Methods 0.000 description 13
- 230000005540 biological transmission Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 5
- 230000006399 behavior Effects 0.000 description 4
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 239000000470 constituent Substances 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/11—File system administration, e.g. details of archiving or snapshots
- G06F16/122—File system administration, e.g. details of archiving or snapshots using management policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Definitions
- the present invention relates to a technology for privacy policy, and more particularly to a technology for setting an appropriate policy between a privacy information holder and a privacy information user.
- attribute information and behavior information are privacy information, so if a privacy information user who is a service provider unilaterally acquires or uses attribute information or behavior information, the privacy information holder Privacy will be violated. Therefore, the privacy information holder needs to be able to control how privacy information is handled by the privacy information user (disclosure conditions, data protection requirements, etc.).
- Non-Patent Document 1 Policy-based control method using P3P (Platform for Privacy Preferences) described in Non-Patent Document 1.
- P3P technology controls how privacy information is handled as follows.
- a privacy information user who provides a service sets a policy file (hereinafter referred to as “service policy”) in which privacy information to be collected and a method for handling the privacy information are described in XML.
- the privacy information holder sets a policy file (hereinafter referred to as “user policy”) in which the privacy information to be provided and the data disclosure method are described in XML.
- service policy a policy file
- user policy a policy file
- the P3P technology automatically or semi-automatically makes a data disclosure determination by investigating whether or not the data disclosure conditions match between the user policy and the service policy.
- Non-Patent Document 2 An example of a policy mediation method is described in Non-Patent Document 2.
- the policy arbitration method described in Non-Patent Document 2 includes a privacy information holding terminal and a privacy information using terminal connected by a network.
- Non-Patent Document 2 operates as follows.
- the privacy information use terminal transmits a use policy (service policy) to the privacy information holding terminal.
- the privacy information holding terminal compares the usage policy with the privacy policy (user policy), and if there is no conflict, transmits the attribute information of the privacy information holder.
- the privacy information holding terminal transmits the usage and holding conditions to the privacy information using terminal.
- the privacy information using terminal generates a new usage policy so as to satisfy the condition, and transmits the generated usage policy to the privacy information holding terminal.
- Non-Patent Document 2 performs policy mediation by repeating the above-described policy transmission and comparison, condition transmission, and generation of a new policy until the mutual agreement is formed.
- Patent Document 1 The same technology as in Non-Patent Document 2 is also described in Patent Document 1.
- Patent Document 2 Another technique related to the present invention is described in Patent Document 2.
- Patent Document 2 discloses an access restriction information output device that outputs, as access restriction information, contents of access restriction for information accessible by an information processing terminal.
- the storage means is a user who sets the set access restriction information, which is access restriction information indicating the content of the access restriction that has been set for each item divided based on a predetermined criterion. Remember every time.
- the output request accepting unit accepts an output request for access restriction information and designation of an item to be requested from the terminal device used by the requester.
- the selecting means selects at least one set access restriction information of another person whose content is similar to the set access restriction information of the requester among the set access restriction information stored in the storage means.
- the output means outputs the content corresponding to the designated item among the contents indicated by the selected set access restriction information to the terminal device as the access restriction information.
- the access control information output device described in Patent Document 2 can set access restriction information that meets the requester's policy without trouble by adopting the above-described configuration.
- Non-Patent Document 2 and Patent Document 1 are based on the privacy information holder and the privacy information user by performing multiple dialogues even when a policy conflict occurs between the privacy information holder and the privacy information user.
- a policy can be flexibly agreed between information users.
- Non-Patent Document 2 and Patent Document 1 when a privacy information holder decides a policy with a plurality of privacy information users, it is necessary to perform a plurality of dialogues for each of the plurality of privacy information users, as described in Non-Patent Document 2 and Patent Document 1.
- the technology is laborious and burdensome.
- Patent Document 2 can set access restriction information that meets the requester's policy without much effort.
- Patent Document 2 is a technology related to an access control policy and not a technology related to a privacy policy. Therefore, the technique described in Patent Literature 2 cannot solve the problem of performing policy arbitration when competition occurs between policies.
- an object of the present invention is to provide a technique capable of easily determining a policy without taking time between a privacy information holder and a privacy information user when a conflict occurs between policies. It is.
- the information processing apparatus for handling privacy information in the present invention provides a policy input by a user who is a privacy information holder and a service set in advance for each service provider who is a privacy information user Similar user extraction means for extracting a set of user identifiers of other users similar to the user identifier input by the user when a conflict occurs with the policy of the user, the set of extracted user identifiers, And a policy recommendation means for acquiring and outputting a set of policies based on the service identifier input by the user.
- an information processing system for handling privacy information is selected from an information processing apparatus for handling privacy information and a set of policies output by the policy recommendation means by user input.
- the user terminal according to the present invention selects a policy selected by a user input from a set of policies output by the policy recommendation unit of the information processing apparatus that handles the privacy information. The information is transmitted to an information processing apparatus that handles the privacy information.
- the information processing method for handling privacy information in the present invention is preset for each policy provided by a user who is a privacy information holder and for each service provider who is a privacy information user.
- a set of user identifiers of other users similar to the user identifier input by the user is extracted, and the set of extracted user identifiers and input by the user Based on the service identifier thus obtained, a set of policies is acquired and output.
- the program according to the present invention includes a policy input by a user who is a privacy information holder, and a service policy preset for each service provider who is a privacy information user.
- a conflict occurs, a set of user identifiers of other users similar to the user identifier input by the user is extracted, and the extracted set of user identifiers and the service identifier input by the user are extracted.
- the computer is caused to execute a process of acquiring and outputting a set of policies.
- FIG. 4 is a block diagram showing details of a similar user extraction unit 103.
- FIG. It is a flowchart figure which shows operation
- It is a figure which shows an example of the policy in a present Example. 4 is a diagram illustrating an example of data stored in a policy storage unit 101.
- the policy describes data attributes and actions for each data attribute (how to handle privacy information).
- the data attribute is a value that identifies the nature of the data including attribute information such as name, age, and address, and behavior information such as position information and purchase information.
- the action for each data attribute describes how to handle privacy information.
- the privacy information is handled in such a way that privacy information is “provided” or “not provided”, and “privacy information is protected and provided”.
- ways of handling such as “provide after encryption” and “provide by adding noise”.
- FIG. 1 is a block diagram showing a configuration of a privacy policy recommendation system 1000 according to the first embodiment of the present invention.
- the privacy policy recommendation system 1000 includes a privacy policy recommendation device 100 and a user terminal 200.
- the privacy policy recommendation device 100 includes a policy storage unit 101, a competition determination unit 102, a similar user extraction unit 103, a policy recommendation unit 104, and a policy reception unit 105.
- the policy storage unit 101 defines a user identifier for identifying a privacy information holder as a user, a service identifier for identifying a privacy information user as a service provider, and handling of privacy information for each user identifier and service identifier. Policy.
- the conflict determination unit 102 determines whether or not there is a conflict between the data policy input by the user and the service policy preset for each service provider. Note that “input by user”, “input by... By user”, and “input by user” described in this specification are other than the user's input. An input reflecting the user's will is also included.
- the contention determination unit 102 defines the handling of the user identifier of the user, the service identifier of the service that the user wants to receive, and the privacy information of the user by the user via the user terminal 200. User policy is input.
- the conflict determination unit 102 acquires a service policy of the service identifier input by the user from the service provider.
- the conflict determination unit 102 determines whether or not there is a conflict between the user policy input by the user and the service policy acquired from the service provider. When it is determined that there is a conflict, the conflict determination unit 102 outputs the user identifier input by the user, the service identifier, and an execution command for extraction processing to the similar user extraction unit 103. If it is determined that there is no conflict, the conflict determination unit 102 prompts the service provider to provide the service and waits for the next data input by the user.
- the similar user extraction unit 103 receives an execution instruction for extraction processing when the competition determination unit 102 determines that there is a conflict, and stores a set of user identifiers of other users similar to the user identifier input by the user in the policy Extract from the unit 101.
- the similar user extraction unit 103 may determine whether or not the user identifier is similar depending on whether or not the service identifier and the policy corresponding to the user identifier are similar.
- the similar user extraction unit 103 includes a service identifier and a policy similar to the service identifier and policy corresponding to the user identifier input by the user among the data stored in the policy storage unit 101. Are extracted as a corresponding set.
- the similar user extraction unit 103 determines whether or not the service identifier and the policy are similar if the service identifier is the same and the policy is similar, and the similar user extraction unit 103 determines that the service identifier and the policy are similar. If they are not similar, it may be determined that they are not similar.
- the similar user extraction unit 103 outputs the extracted set of user identifiers to the policy recommendation unit 104. In addition, the similar user extraction unit 103 outputs the service identifier input by the user to the policy recommendation unit 104.
- the policy recommendation unit 104 acquires a set of policies from the policy storage unit 101 based on the set of user identifiers input from the similar user extraction unit 103 and the service identifier input by the user.
- the policy recommendation unit 104 outputs a set of policies acquired from the policy storage unit 101 to the user terminal 200.
- the policy receiving unit 105 receives the policy selected by the user from the set of policies output from the policy recommendation unit 104, and stores it in the policy storage unit 101 in association with the user identifier and the service identifier.
- the user terminal 200 receives the user identifier, service identifier, and user policy input described above.
- the user terminal 200 outputs the user identifier, service identifier, and user policy input by the user to the contention determination unit 102.
- the user terminal 200 receives a set of policies from the policy recommendation unit 104. For example, the user terminal 200 displays a set of policies on a display or the like, and accepts a policy selection by the user. The user terminal 200 transmits the selected policy to the policy receiving unit 105.
- FIG. 20 is a block diagram illustrating a configuration of the user terminal 200 according to the first embodiment.
- the user terminal 200 includes a control unit 201 and a transmission / reception unit 202.
- the transmission / reception unit 202 of the user terminal 200 receives the set of policies output by the policy recommendation unit 104 of the information processing apparatus 100.
- the control unit 201 of the user terminal 200 displays the received policy set on the display (not shown) of the user terminal 200 and prompts the user to select a policy from the received policy set.
- the policy selected by the user via the input unit (not shown) of the user terminal 200 is transmitted to the information processing apparatus 100 that handles privacy information by the transmission / reception unit 202.
- FIG. 2 is a block diagram showing details of the similar user extraction unit 103. As illustrated in FIG. 2, the similar user extraction unit 103 includes a user extraction unit 106 and a similarity calculation unit 107.
- the user extraction unit 106 extracts from the policy storage unit 101 a set of service identifiers and policies corresponding to the user identifier input by the user and a set of user identifiers corresponding to the service identifier input by the user.
- the user extraction unit 106 outputs the extracted set of service identifiers and policies and the set of user identifiers to the similarity calculation unit 105.
- the similarity calculation unit 107 calculates the service identifier similarity based on the service identifier and policy set extracted by the user extraction unit 106 and the user identifier set. The similarity calculation unit 107 calculates the similarity between user identifiers based on the calculated similarity of service identifiers.
- the similarity calculation unit 107 calculates the similarity of service identifiers based on the reciprocal of the distance between policies for each service identifier, and calculates the similarity between user identifiers by summing up the similarities for each service identifier. You may do it. Further, the similarity calculation unit 107 may calculate the distance between policies as the number of data attributes in which the handling method for each data attribute does not match between the two policies.
- the similarity calculation unit 107 extracts a set of user identifiers having a high similarity from the policy storage unit 101 based on the calculation result of the similarity between user identifiers.
- the similarity calculation unit 107 outputs the extracted set of user identifiers to the policy recommendation unit 104.
- FIG. 3 is a flowchart showing the operation of the privacy policy recommendation system 100 in the first embodiment.
- a user identifier, a service identifier, and a user policy are input from the user terminal 200 to the conflict determination unit 102.
- the conflict determination unit 102 acquires the service policy of the service provider indicated by the input service identifier, and determines whether or not there is a conflict between the user policy and the service policy (step A1).
- step A2-Yes If it is determined that there is a conflict (step A2-Yes), the process proceeds to A3. If it is determined that there is no conflict (step A2-No), it waits for data to be input from the user again.
- the competition determination unit 102 passes the user identifier and service identifier to the similar user extraction unit 103, and orders the execution of the extraction process (step A3).
- the similar user extraction unit 103 acquires a set of user identifiers similar to the policy storage unit 101 and the input user identifier (step A4). Specifically, the similar user extraction unit 103 is set between service identifiers among data stored in the policy storage unit 101 and having the same service identifier as the service identifier corresponding to the input user identifier. A set of user identifiers of data having similar policies is acquired.
- the policy recommendation unit 104 acquires a set of policies recommended to the user from the policy storage unit 101 based on the user identifier set extracted by the similar user extraction unit 103 and the service identifier input by the user (step A5). .
- the policy recommendation unit 104 transmits the acquired set of policies to the user terminal 200 and recommends it to the user (step A6). Specifically, the policy recommendation unit 104 controls the user terminal 200 to display a set of policies on the display.
- the policy receiving unit 105 receives the policy selected by the user and transmitted from the user terminal 200, and stores it in the policy storage unit 101 (step A7).
- FIG. 4 is a flowchart showing an operation in which the similar user extraction unit 103 acquires a user identifier set.
- the user extraction unit 106 acquires a set of (service identifier, policy) sets corresponding to the user identifier input by the user from the policy storage unit 101 (step B1).
- the user extraction unit 106 acquires a set of user identifiers corresponding to the service identifier input by the user from the policy storage unit 101 (step B2).
- the user extraction unit 106 acquires a set of (service identifier, policy) pairs corresponding to the set of user identifiers acquired in step B2 from the policy storage unit 101, and sets the (user identifier, (service identifier, policy) set. Set) is acquired (step B3).
- the user extraction unit 106 sets a set of (service identifier, policy) corresponding to the input user identifier and a set of (user identifier, (service identifier, policy) set) corresponding to the set of user identifiers. Are output to the similarity calculation unit 107.
- the similarity calculation unit 107 includes a set of (service identifier, policy) set corresponding to the input user identifier and a set of (user identifier, (service identifier, policy) set) corresponding to the user identifier set. Based on the set of sets, the similarity between the user identifiers is calculated (step B4).
- the similarity calculation unit 107 acquires a certain number of user identifiers having a high degree of similarity and outputs them to the policy recommendation unit 104 as a user set (step B5).
- FIG. 5 is a flowchart showing an operation in which the similarity calculation unit 107 calculates the similarity of the user identifier.
- two sets of sets (service identifiers, policies) S1 and S2 are input (step C1).
- S1 is a set of a set of (service identifier, policy) corresponding to the user identifier input by the user.
- S2 is one user identifier included in a set of (user identifier, set of (service identifier, policy) set) corresponding to a set of user identifiers (set of user identifiers acquired in step B2). Is a set of sets of (service identifier, policy) corresponding to.
- the similarity calculation unit 107 repeats steps C3 to C5 described below for the predetermined service identifier included in S1.
- it is a predetermined service identifier, in order for the similarity calculation unit 107 to calculate the similarity of the user identifier, all service identifiers may be targeted, or some service identifiers may be targeted.
- the similarity calculation unit 107 acquires policies P1 and P2 corresponding to the service identifier from S1 and S2 for one of the service identifiers included in S1 (step C3).
- the similarity calculation unit 107 calculates the distance d between the two policies P1 and P2 (step C4).
- the distance between policies may be calculated, for example, by a different number of actions for data attributes in the policy, and is not limited to this, and may be calculated by other methods. In the present embodiment, it is assumed that the similarity calculation unit 107 calculates the distance between policies with different numbers of actions for data attributes in the policy.
- the similarity of service identifiers is not limited to the above, and may be calculated by other methods.
- the similarity calculation unit 107 calculates the similarity between user identifiers by summing up the similarities for each service identifier.
- the similarity between user identifiers is not limited to the above, and may be calculated by other methods.
- FIG. 6 is a diagram illustrating an example of a policy in the present embodiment.
- XML is described as a policy that can set two values, “provide” and “do not provide”, for an action with respect to a data attribute using an ACTION tag.
- the policy shown in FIG. 6 uses the user's “name”, “address”, “location information”, and “purchase information” as privacy information, and determines whether to provide each service information to the service provider. Represents.
- FIG. 6 is an example of a policy in which “name” is “provided”, “address” is “not provided”, “location information” is “not provided”, and “purchasing information” is “provided”. is there.
- FIG. 7 is a diagram illustrating an example of data stored in the policy storage unit 101.
- the policy storage unit 101 stores a user identifier, a service identifier, and a policy in association with each other.
- the policy mediation has already been completed between the privacy information holder and the privacy information user.
- the user terminal 200 outputs the user identifier, the service identifier, and the user policy input by the user to the contention determination unit 102 of the privacy policy recommendation device 100.
- the conflict determination unit 102 determines whether or not there is a conflict between the user policy shown in FIG. 8 and the service policy shown in FIG.
- the above determination method is an example, and the conflict determination unit 102 may determine the presence of conflict using various other indicators.
- predetermined privacy information all the privacy information may be sufficient, or a part of privacy information may be sufficient.
- the conflict determination unit 102 determines that there is a conflict between the user policy and the service policy (step A2-Yes).
- the user extraction unit 106 acquires a set of (service identifier, policy) sets corresponding to the input user identifier from the policy storage unit 101 (step B1).
- FIG. 10 is a diagram illustrating a set of sets (service identifiers and policies) extracted by the user extraction unit 106.
- the user extraction unit 106 acquires a set of user identifiers corresponding to the input service identifier from the policy storage unit 101 (step B2).
- the user extraction unit 106 acquires a set of (service identifier, policy) pairs corresponding to the set of user identifiers from the policy storage unit 101, and sets a set of (user identifier, (service identifier, policy) sets. ) Is acquired (step B3).
- the user extraction unit 106 corresponds to the set of service identifiers (policy) corresponding to the input user identifier (FIG. 10) and one user identifier included in the set of user identifiers (service identifier).
- the similarity calculation unit 107 calculates the similarity of the user identifier (step B4).
- the similarity calculation unit 107 receives two sets (S1 and S2) of sets (service identifier, policy) (step C1).
- S1 is a set (FIG. 10) of a set of (service identifier, policy) corresponding to the input user identifier.
- FIG. 12 is a diagram illustrating an example of S1 and S2 input to the similarity calculation unit 107.
- the similarity calculation unit 107 receives data as shown in FIG.
- the similarity calculation unit 107 repeats steps C3 to C5 described below for the predetermined service identifier included in S1.
- the similarity calculation unit 107 acquires policies P1 and P2 corresponding to the service identifiers included in S1 and S2 for one service identifier (step C3).
- the similarity calculation unit 107 calculates the distance d between the two policies P1 and P2 (step C4).
- a method for calculating the distance between policies a number of different actions for data attributes in the policy is used.
- P1 is set such that “name” is “not provided”, “address” is “not provided”, “location information” is “not provided”, and “purchasing information” is “provided”.
- Steps C3 to C5 are repeated for the predetermined service identifier included in S1.
- FIG. 14 is a diagram illustrating a distance for each service identifier with respect to a predetermined user identifier that is a target of similarity calculation.
- the target for which the similarity calculation unit 107 calculates the similarity of the user identifier may be all user identifiers or some user identifiers.
- the similarity calculation unit 107 acquires a predetermined number of user identifiers with high similarity and outputs them as a set of similar user identifiers (step B5, step A4).
- the similarity calculation unit 107 outputs a user identifier set ⁇ “2”, “4” ⁇ .
- FIG. 16 is a diagram illustrating an example of a policy set recommended to the user.
- the policy recommendation unit 104 transmits the acquired policy set to the user terminal 200 and recommends it to the user (step A6).
- FIG. 17 is a diagram showing a state where the data in the policy storage unit 101 is updated according to the present invention.
- name is set to “provide”
- address is set to “do not provide”
- location information is set to “provide”
- purchase information is set to “do not provide”.
- policies can be determined.
- the conflict determination unit 102 determines that there is a conflict between policies
- the similar user extraction unit 103 sets a policy similar to that of the privacy information holder and sets other privacy information holders. This is because the policy recommendation unit 104 extracts and recommends a policy set by a privacy information user who has a similar policy tendency as a privacy information user.
- the privacy policy recommendation system 1000 determines that a conflict has occurred, the policy information has already been properly and appropriately managed without performing complicated policy arbitration for each privacy information user. You can set a completed policy.
- FIG. 18 is a block diagram showing a configuration of the privacy policy recommendation device 300 according to the second embodiment. As shown in FIG. 18, the privacy policy recommendation device 300 includes a similar user extraction unit 301 and a policy recommendation unit 302.
- the similar user extraction unit 301 conflicts between a policy input by a user who is a privacy information holder and a service policy which is set in advance for each service provider who is a privacy information user Then, an extraction process for extracting a set of user identifiers of other users similar to the user identifier input by the user is executed.
- the policy recommendation unit 302 acquires and outputs a set of policies based on the set of user identifiers extracted by the similar user extraction unit 301 and the service identifier input by the user.
- the privacy policy recommendation device 300 when there is a conflict between policies, it is easy without any effort between the privacy information holder and the privacy information user.
- the policy can be determined.
- FIG. 19 is a block diagram illustrating an example of a hardware configuration of the privacy policy recommendation devices 100 and 300 according to the second embodiment.
- each part constituting the privacy policy recommendation device includes a CPU 1 (Central Processing Unit 1), a network connection communication IF 2 (communication interface 2), a memory 3, a hard disk for storing a program, and the like. It is realized by a computer device including a storage device 4 and connected to an input device 5 and an output device 6 through a bus.
- the configuration of the privacy policy recommendation device is not limited to the computer device shown in FIG.
- CPU 1 operates the operating system to control the entire privacy policy recommendation device 300. Further, the CPU 1 reads a program and data from a recording medium mounted on, for example, a drive device to the memory 3 and executes various processes according to the program and data.
- the competition determination unit, the similar user extraction unit, the policy recommendation unit, and the policy reception unit may be realized by the CPU 1 and a program.
- the recording device 4 is, for example, an optical disk, a flexible disk, a magnetic optical disk, an external hard disk, a semiconductor memory, etc., and records a computer program so that it can be read by a computer.
- the computer program may be downloaded from an external computer (not shown) connected to the communication network.
- the policy storage unit may be realized by the recording device 4.
- the input device 5 is, for example, a mouse or a keyboard.
- the output device 6 is, for example, a display.
- the privacy policy recommendation device itself may include an input device and an output device, or a user terminal that communicates via the communication IF 2.
- the block diagrams (FIGS. 1, 2, and 18) of the respective embodiments described so far show functional unit blocks, not hardware unit configurations. These functional blocks are realized by any combination of hardware and software.
- the means for realizing the constituent parts of the privacy policy recommendation device is not particularly limited. In other words, the privacy policy recommendation device may be realized by one physically coupled device, or two or more physically separated devices are connected by wire or wirelessly and realized by these plural devices. Also good.
- the present invention is not limited to this, and the information processing device that handles privacy information or privacy information is handled.
- the present invention is applicable to any information processing system.
- " ⁇ Other expressions of the embodiment> In each of the above-described embodiments, a characteristic configuration of an information processing apparatus that handles privacy information as described below, an information processing system that handles privacy information, an information processing method that handles privacy information, and a program is described (hereinafter referred to as the following) Is not limited to this).
- the program of this invention should just be a program which makes a computer perform each operation
- (Appendix 1) When a conflict occurs between a policy entered by a user who is a privacy information holder and a service policy set in advance for each service provider who is a privacy information user, it is entered by the user. Similar user extraction means for extracting a set of user identifiers of other users similar to the user identifier; Policy recommendation means for obtaining and outputting a set of policies based on the extracted set of user identifiers and the service identifier input by the user; Information processing apparatus that handles privacy information including (Appendix 2) Conflict determination means for determining whether or not there is a conflict between a policy input by a user who is a privacy information holder and a service policy preset for each service provider who is a privacy information user When, Further including An information processing apparatus that handles the privacy information according to attachment 1.
- (Appendix 3) Stores a user identifier that identifies a user who is a privacy information holder, a service identifier that identifies a service provider who is a privacy information user, and a policy that regulates the handling of privacy information for each user identifier and service identifier.
- Policy storage means Further including The similar user extracting unit resembles a service identifier corresponding to the user identifier input by the user from the policy storage unit and a set of service identifiers similar to the policy and user identifiers of other users set with the policy. Extract as a set of user identifiers, The policy recommendation means acquires the set of policies from the policy storage means.
- An information processing apparatus that handles the privacy information according to attachment 1 or 2.
- a policy receiving means for receiving a policy selected by the user from a set of policies output from the policy recommendation means, and storing the policy in association with a user identifier and a service identifier in the policy storage means;
- the information processing apparatus which handles the privacy information of Additional remark 3 which contains further.
- the policy stored in the policy storage means is: Specify the handling of privacy information by describing the data attribute that defines the type of data and the method of handling that data attribute. An information processing apparatus that handles the privacy information according to attachment 3 or 4.
- the similar user extraction means includes: A user extraction means for extracting from the policy storage means a set of service identifiers and policies corresponding to the user identifier input by the user; and a set of user identifiers corresponding to the service identifier input by the user; Similarity calculating means for calculating the similarity between user identifiers based on the similarity of service identifiers calculated based on the extracted set of service identifiers and policies and the set of user identifiers; An information processing apparatus that handles privacy information according to any one of appendices 3 to 5 including: (Appendix 7)
- the similarity calculation means includes: Calculating the similarity of the service identifiers based on the reciprocal of the distance between policies for each service identifier, and calculating the similarity between the user identifiers by summing up the similarities for each service identifier; An information processing apparatus that handles the privacy information according to attachment 6.
- the similarity calculation means includes: Calculating the distance between the policies as the number of data attributes for which the handling method for each data attribute is inconsistent between the two policies; An information processing apparatus that handles the privacy information according to attachment 7.
- the present invention can be applied to uses such as a recommendation service using privacy information and a privacy policy setting in an SNS service.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Tourism & Hospitality (AREA)
- Databases & Information Systems (AREA)
- Entrepreneurship & Innovation (AREA)
- Data Mining & Analysis (AREA)
- Software Systems (AREA)
- General Business, Economics & Management (AREA)
- Economics (AREA)
- Marketing (AREA)
- Medical Informatics (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Primary Health Care (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
また、上記目的を達成するため、本発明におけるユーザ端末は、前記プライバシ情報を扱う情報処理装置の前記ポリシレコメンド手段によって出力されたポリシの集合の中から、ユーザの入力により選択されたポリシを、前記プライバシ情報を扱う情報処理装置へ送信する。
本発明の第1実施形態について図面を参照して詳細に説明する。
<実施形態の他の表現>
上記の各実施の形態においては、以下に示すようなプライバシ情報を扱う情報処理装置、プライバシ情報を扱う情報処理システム、プライバシ情報を扱う情報処理方法及びプログラムの特徴的構成が示されている(以下のように限定されるわけではない)。なお、本発明のプログラムは、上記の各実施形態で説明した各動作を、コンピュータに実行させるプログラムであれば良い。
(付記1)
プライバシ情報保有者であるユーザによって入力されたポリシと、プライバシ情報利用者であるサービス提供者毎に予め設定されているサービスのポリシとの間に競合が生じた場合に、当該ユーザによって入力されたユーザ識別子と類似する他ユーザのユーザ識別子の集合を抽出する類似ユーザ抽出手段と、
前記抽出したユーザ識別子の集合と、前記ユーザによって入力されたサービス識別子と、に基づいてポリシの集合を取得して出力するポリシレコメンド手段と、
を含むプライバシ情報を扱う情報処理装置。
(付記2)
プライバシ情報保有者であるユーザによって入力されたポリシと、プライバシ情報利用者であるサービス提供者毎に予め設定されているサービスのポリシとの間に競合が存在するか否かを判定する競合判定手段と、
をさらに含む、
付記1に記載のプライバシ情報を扱う情報処理装置。
(付記3)
プライバシ情報保有者であるユーザを識別するユーザ識別子と、プライバシ情報利用者であるサービス提供者を識別するサービス識別子と、ユーザ識別子及びサービス識別子ごとのプライバシ情報の取り扱いを規定するポリシと、を格納するポリシ格納手段と、
をさらに含み、
前記類似ユーザ抽出手段は、前記ポリシ格納手段から、前記ユーザによって入力されたユーザ識別子に対応するサービス識別子及びポリシと類似するサービス識別子及びポリシが設定された他ユーザのユーザ識別子の集合を、類似するユーザ識別子の集合として抽出し、
前記ポリシレコメンド手段は、前記ポリシの集合を前記ポリシ格納手段から取得する、
付記1又は2に記載のプライバシ情報を扱う情報処理装置。
(付記4)
前記ポリシレコメンド手段から出力されたポリシの集合から前記ユーザが選択したポリシを受信し、ユーザ識別子及びサービス識別子と対応付けて前記ポリシ格納手段へ格納するポリシ受信手段と、
をさらに含む付記3に記載のプライバシ情報を扱う情報処理装置。
(付記5)
前記ポリシ格納手段に格納されるポリシは、
データの種類を規定するデータ属性と、当該データ属性に対する取り扱いの方法を記述することによってプライバシ情報の取り扱いを規定する、
付記3又は4に記載のプライバシ情報を扱う情報処理装置。
(付記6)
前記類似ユーザ抽出手段は、
前記ユーザによって入力されたユーザ識別子に対応するサービス識別子及びポリシの集合と、前記ユーザによって入力されたサービス識別子に対応するユーザ識別子の集合と、を前記ポリシ格納手段から抽出するユーザ抽出手段と、
前記抽出された、サービス識別子及びポリシの集合と、ユーザ識別子の集合とに基づいて計算されるサービス識別子の類似度に基づいて、ユーザ識別子間の類似度を計算する類似度計算手段と、
を含む付記3~5のいずれか1項に記載のプライバシ情報を扱う情報処理装置。
(付記7)
前記類似度計算手段は、
前記サービス識別子の類似度を、サービス識別子毎にポリシ間の距離の逆数に基づいて計算し、当該サービス識別子毎の類似度を総積することで前記ユーザ識別子間の類似度を計算する、
付記6に記載のプライバシ情報を扱う情報処理装置。
(付記8)
前記類似度計算手段は、
前記ポリシ間の距離を、2つのポリシの間でデータ属性ごとの取り扱い方法が不一致であるデータ属性の数として計算する、
付記7に記載のプライバシ情報を扱う情報処理装置。
(付記9)
付記1~8のいずれか1項に記載のプライバシ情報を扱う情報処理装置と、
前記ポリシレコメンド手段によって出力されたポリシの集合の中からユーザの入力により選択されたポリシを、前記プライバシ情報を扱う情報処理装置へ送信するユーザ端末と、
を含むプライバシ情報を扱う情報処理システム。
(付記10)
プライバシ情報保有者であるユーザによって入力されたポリシと、プライバシ情報利用者であるサービス提供者毎に予め設定されているサービスのポリシとの間に競合が生じた場合に、当該ユーザによって入力されたユーザ識別子と類似する他ユーザのユーザ識別子の集合を抽出する抽出処理を実行し、
前記抽出したユーザ識別子の集合と、前記ユーザによって入力されたサービス識別子とに基づいてポリシの集合を取得して出力する、
プライバシ情報を扱う情報処理方法。
(付記11)
プライバシ情報保有者であるユーザによって入力されたポリシと、プライバシ情報利用者であるサービス提供者毎に予め設定されているサービスのポリシとの間に競合が生じた場合に、当該ユーザによって入力されたユーザ識別子と類似する他ユーザのユーザ識別子の集合を抽出する抽出処理を実行し、
前記抽出したユーザ識別子の集合と、前記ユーザによって入力されたサービス識別子とに基づいてポリシの集合を取得して出力する、
処理をコンピュータに実行させるプログラム。
(付記12)
付記1に記載のプライバシ情報を扱う情報処理装置の前記ポリシレコメンド手段によって出力されたポリシの集合の中から、ユーザの入力により選択されたポリシを、前記プライバシ情報を扱う情報処理装置へ送信するユーザ端末。
この出願は、2012年2月17日に出願された日本出願特願2012-32991を基礎出願とする優先権を主張し、その開示の全てをここに取り込む。
2 通信IF
3 メモリ
4 記憶装置
5 入力装置
6 出力装置
100、300 プライバシポリシレコメンド装置
101 ポリシ格納部
102 競合判定部
103、301 類似ユーザ抽出部
104、302 ポリシレコメンド部
105 ポリシ受信部
106 ユーザ抽出部
107 類似度計算部
200 ユーザ端末
1000 プライバシポリシレコメンドシステム
Claims (11)
- プライバシ情報保有者であるユーザによって入力されたポリシと、プライバシ情報利用者であるサービス提供者毎に予め設定されているサービスのポリシとの間に競合が生じた場合に、当該ユーザによって入力されたユーザ識別子と類似する他ユーザのユーザ識別子の集合を抽出する類似ユーザ抽出手段と、
前記抽出したユーザ識別子の集合と、前記ユーザによって入力されたサービス識別子と、に基づいてポリシの集合を取得して出力するポリシレコメンド手段と、
を含むプライバシ情報を扱う情報処理装置。 - プライバシ情報保有者であるユーザによって入力されたポリシと、プライバシ情報利用者であるサービス提供者毎に予め設定されているサービスのポリシとの間に競合が存在するか否かを判定する競合判定手段と、
をさらに含む、
請求項1に記載のプライバシ情報を扱う情報処理装置。 - プライバシ情報保有者であるユーザを識別するユーザ識別子と、プライバシ情報利用者であるサービス提供者を識別するサービス識別子と、ユーザ識別子及びサービス識別子ごとのプライバシ情報の取り扱いを規定するポリシと、を格納するポリシ格納手段と、
をさらに含み、
前記類似ユーザ抽出手段は、前記ポリシ格納手段から、前記ユーザによって入力されたユーザ識別子に対応するサービス識別子及びポリシと類似するサービス識別子及びポリシが設定された他ユーザのユーザ識別子の集合を、類似するユーザ識別子の集合として抽出し、
前記ポリシレコメンド手段は、前記ポリシの集合を前記ポリシ格納手段から取得する、
請求項1に記載のプライバシ情報を扱う情報処理装置。 - 前記ポリシレコメンド手段から出力されたポリシの集合から前記ユーザが選択したポリシを受信し、ユーザ識別子及びサービス識別子と対応付けて前記ポリシ格納手段へ格納するポリシ受信手段と、
をさらに含む請求項3に記載のプライバシ情報を扱う情報処理装置。 - 前記ポリシ格納手段に格納されるポリシは、
データの種類を規定するデータ属性と、当該データ属性に対する取り扱いの方法を記述することによってプライバシ情報の取り扱いを規定する、
請求項3に記載のプライバシ情報を扱う情報処理装置。 - 前記類似ユーザ抽出手段は、
前記ユーザによって入力されたユーザ識別子に対応するサービス識別子及びポリシの集合と、前記ユーザによって入力されたサービス識別子に対応するユーザ識別子の集合と、を前記ポリシ格納手段から抽出するユーザ抽出手段と、
前記抽出された、サービス識別子及びポリシの集合と、ユーザ識別子の集合とに基づいて計算されるサービス識別子の類似度に基づいて、ユーザ識別子間の類似度を計算する類似度計算手段と、
を含む請求項3に記載のプライバシ情報を扱う情報処理装置。 - 前記類似度計算手段は、
前記サービス識別子の類似度を、サービス識別子毎にポリシ間の距離の逆数に基づいて計算し、当該サービス識別子毎の類似度を総積することで前記ユーザ識別子間の類似度を計算する、
請求項6に記載のプライバシ情報を扱う情報処理装置。 - 請求項1に記載のプライバシ情報を扱う情報処理装置と、
前記ポリシレコメンド手段によって出力されたポリシの集合の中からユーザの入力により選択されたポリシを、前記プライバシ情報を扱う情報処理装置へ送信するユーザ端末と、
を含むプライバシ情報を扱う情報処理システム。 - 請求項1に記載のプライバシ情報を扱う情報処理装置の前記ポリシレコメンド手段によって出力されたポリシの集合の中から、ユーザの入力により選択されたポリシを、前記プライバシ情報を扱う情報処理装置へ送信するユーザ端末。
- プライバシ情報保有者であるユーザによって入力されたポリシと、プライバシ情報利用者であるサービス提供者毎に予め設定されているサービスのポリシとの間に競合が生じた場合に、当該ユーザによって入力されたユーザ識別子と類似する他ユーザのユーザ識別子の集合を抽出し、
前記抽出したユーザ識別子の集合と、前記ユーザによって入力されたサービス識別子とに基づいてポリシの集合を取得して出力する、
プライバシ情報を扱う情報処理方法。 - プライバシ情報保有者であるユーザによって入力されたポリシと、プライバシ情報利用者であるサービス提供者毎に予め設定されているサービスのポリシとの間に競合が生じた場合に、当該ユーザによって入力されたユーザ識別子と類似する他ユーザのユーザ識別子の集合を抽出し、
前記抽出したユーザ識別子の集合と、前記ユーザによって入力されたサービス識別子とに基づいてポリシの集合を取得して出力する、
処理をコンピュータに実行させるプログラム。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/379,427 US9418233B2 (en) | 2012-02-17 | 2013-02-15 | Information processing device for handling privacy information, information processing system for handling privacy information, and information processing method and program for handling privacy information |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2012032991 | 2012-02-17 | ||
JP2012-032991 | 2012-02-17 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013121790A1 true WO2013121790A1 (ja) | 2013-08-22 |
Family
ID=48983920
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2013/000825 WO2013121790A1 (ja) | 2012-02-17 | 2013-02-15 | プライバシ情報を扱う情報処理装置、プライバシ情報を扱う情報処理システム、プライバシ情報を扱う情報処理方法及びプログラム |
Country Status (3)
Country | Link |
---|---|
US (1) | US9418233B2 (ja) |
JP (1) | JPWO2013121790A1 (ja) |
WO (1) | WO2013121790A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017033937A1 (ja) * | 2015-08-24 | 2017-03-02 | アセンブローグ株式会社 | 情報処理装置、情報処理方法及びプログラム |
WO2020144735A1 (ja) * | 2019-01-08 | 2020-07-16 | 三菱電機株式会社 | プライバシーリスク分析システム、プライバシーリスク分析方法及びプライバシーリスク分析プログラム |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10445513B2 (en) * | 2015-03-06 | 2019-10-15 | Nokia Technologies Oy | Privacy management |
US9390285B1 (en) * | 2015-06-09 | 2016-07-12 | Hortonworks, Inc. | Identifying inconsistent security policies in a computer cluster |
US10929467B2 (en) * | 2018-12-11 | 2021-02-23 | Colby Greene | Method for custom-tagging and recognizing recycled data |
CN114979253B (zh) * | 2022-05-06 | 2024-03-12 | 蚂蚁区块链科技(上海)有限公司 | 数据推送决策方法、装置、介质及设备 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009258826A (ja) * | 2008-04-14 | 2009-11-05 | Nec Corp | アクセス制限情報出力装置及びアクセス制限情報提示システム等 |
US20120204222A1 (en) * | 2009-10-16 | 2012-08-09 | Nokia Siemens Networks Oy | Privacy policy management method for a user device |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7401352B2 (en) * | 2002-08-30 | 2008-07-15 | International Business Machines Corporation | Secure system and method for enforcement of privacy policy and protection of confidentiality |
JP2004171343A (ja) * | 2002-11-21 | 2004-06-17 | Nippon Telegr & Teleph Corp <Ntt> | 個人情報の分散開示制御方法及びシステム |
JP2004192353A (ja) | 2002-12-11 | 2004-07-08 | Nippon Telegr & Teleph Corp <Ntt> | 個人情報開示制御システム及び個人情報開示制御方法 |
JP2006309737A (ja) * | 2005-03-28 | 2006-11-09 | Ntt Communications Kk | 開示情報提示装置、個人特定度算出装置、id度取得装置、アクセス制御システム、開示情報提示方法、個人特定度算出方法、id度取得方法、及びプログラム |
JP5036140B2 (ja) * | 2005-06-10 | 2012-09-26 | 日本電気株式会社 | 個人情報流通管理システム、個人情報流通管理方法、個人情報提供プログラム及び個人情報利用プログラム |
JP2007072581A (ja) * | 2005-09-05 | 2007-03-22 | Nippon Telegr & Teleph Corp <Ntt> | ポリシ集合生成装置とその制御方法 |
US9407662B2 (en) * | 2005-12-29 | 2016-08-02 | Nextlabs, Inc. | Analyzing activity data of an information management system |
US8301902B2 (en) * | 2009-02-12 | 2012-10-30 | International Business Machines Corporation | System, method and program product for communicating a privacy policy associated with a biometric reference template |
US20120054824A1 (en) * | 2009-04-10 | 2012-03-01 | Ryo Furukawa | Access control policy template generating device, system, method and program |
US9424556B2 (en) * | 2010-10-14 | 2016-08-23 | Nokia Technologies Oy | Method and apparatus for linking multiple contact identifiers of an individual |
US8595798B2 (en) * | 2011-06-17 | 2013-11-26 | International Business Machines Corporation | Enforcing data sharing policy through shared data management |
-
2013
- 2013-02-15 WO PCT/JP2013/000825 patent/WO2013121790A1/ja active Application Filing
- 2013-02-15 US US14/379,427 patent/US9418233B2/en active Active
- 2013-02-15 JP JP2014500114A patent/JPWO2013121790A1/ja active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009258826A (ja) * | 2008-04-14 | 2009-11-05 | Nec Corp | アクセス制限情報出力装置及びアクセス制限情報提示システム等 |
US20120204222A1 (en) * | 2009-10-16 | 2012-08-09 | Nokia Siemens Networks Oy | Privacy policy management method for a user device |
Non-Patent Citations (1)
Title |
---|
RYO FURUKAWA: "A Privacy Policy Negotiation Method Based on Policy Ranking", CSS2011 COMPUTER SECURITY SYMPOSIUM 2011 RONBUNSHU HEISAI ANTI-MALWARE ENGINEERING WORKSHOP 2011, IPSJ SYMPOSIUM SERIES, vol. 2011, no. 3, 12 October 2011 (2011-10-12), pages 253 - 258 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017033937A1 (ja) * | 2015-08-24 | 2017-03-02 | アセンブローグ株式会社 | 情報処理装置、情報処理方法及びプログラム |
WO2020144735A1 (ja) * | 2019-01-08 | 2020-07-16 | 三菱電機株式会社 | プライバシーリスク分析システム、プライバシーリスク分析方法及びプライバシーリスク分析プログラム |
JPWO2020144735A1 (ja) * | 2019-01-08 | 2021-02-18 | 三菱電機株式会社 | プライバシーリスク分析システム、プライバシーリスク分析方法及びプライバシーリスク分析プログラム |
Also Published As
Publication number | Publication date |
---|---|
JPWO2013121790A1 (ja) | 2015-05-11 |
US9418233B2 (en) | 2016-08-16 |
US20150012965A1 (en) | 2015-01-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10558684B2 (en) | Auditing database access in a distributed medical computing environment | |
US11663212B2 (en) | Identifying configuration parameters for a query using a metadata catalog | |
WO2013121790A1 (ja) | プライバシ情報を扱う情報処理装置、プライバシ情報を扱う情報処理システム、プライバシ情報を扱う情報処理方法及びプログラム | |
US10917389B2 (en) | Trusted tunnel bridge | |
US20220156267A1 (en) | Revising catalog metadata based on parsing queries | |
US8271615B2 (en) | Centrally managing and monitoring software as a service (SaaS) applications | |
US11392578B1 (en) | Automatically generating metadata for a metadata catalog based on detected changes to the metadata catalog | |
JP6104184B2 (ja) | クラウドストレージシステムのデータ暗号化処理装置及び方法 | |
US20160380933A1 (en) | System and method for providing crowd-based technical support to smartphone users | |
CN108491267A (zh) | 用于生成信息的方法和装置 | |
US9374388B2 (en) | Policy arbitration method, policy arbitration server, and program | |
CN116414370A (zh) | 基于低代码的平台构建方法、装置、介质及电子设备 | |
CN108549586A (zh) | 信息处理方法和装置 | |
CN107430557A (zh) | 多方加密立方体处理设备、方法和系统 | |
JP5942634B2 (ja) | 秘匿化装置、秘匿化プログラムおよび秘匿化方法 | |
CN109992719A (zh) | 用于确定推送优先级信息的方法和装置 | |
US20190180353A1 (en) | Dynamically normalizing product reviews | |
KR20120116772A (ko) | 멀티 테넌시 서비스 플랫폼에서의 테넌트 데이터 캐싱 방법 | |
JP6517521B2 (ja) | 知的財産格付けシステム | |
JP2006209650A (ja) | 利用権発行方法および利用権発行装置 | |
US20220300509A1 (en) | Database system, distributed processing apparatus, database apparatus, distributed processing method and distributed processing program | |
JP6701646B2 (ja) | 情報処理装置、情報処理システム及び情報管理方法 | |
JP5809220B2 (ja) | データセット転送プロトコルを用いた多重要請処理方法 | |
US11467794B1 (en) | Displaying device-associated data in an extended reality environment | |
US11853366B1 (en) | Generating extended reality views based on user-based filters |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13748727 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2014500114 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14379427 Country of ref document: US |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13748727 Country of ref document: EP Kind code of ref document: A1 |