Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information privacy system and method

A privacy system and privacy technology, applied to instruments, digital data authentication, computing, etc.

Active Publication Date: 2012-10-24
MICROSOFT TECH LICENSING LLC
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above disadvantages of today's systems are only intended to provide an overview of some of the problems with conventional systems and are not intended to be exhaustive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information privacy system and method
  • Information privacy system and method
  • Information privacy system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] information privacy

[0022] It is to be understood that the non-limiting examples provided herein are not intended to be limited to any information privacy system or environment implementation unless expressly stated otherwise. Furthermore, unless otherwise stated, the appended claims are not intended to be limited to the claimed information privacy systems or methods.

[0023] By further describing one or more non-limiting aspects of information privacy systems and methods, it is revealed that such access to data, programs, and / or devices may be permitted or prevented based on a number of factors considered individually or in combination. systems and methods. By way of example, and not limitation, factors may include time or location of a device configured with an information privacy system, whether an authorized individual other than the device user is within a particular proximity of the user or is logged into a specified network, and / or is within the user's Motio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The subject disclosure relates to systems and methods for providing privacy for information. In one non-limiting embodiment, a system includes an environment monitoring component configured to monitor an aspect of an environment; and a privacy component configured to: determine whether factors associated with the environment are triggered; and obscure access or provide access to data or a program associated with the factors based on determining that the factors are triggered. Factors can be based on the time and the location or network connectivity of a device associated with the system, the detected presence or absence of an authorized person other than the user logged into the device or the privacy state of the user logged into the device. Motion detectors, cameras, biometric sensors and other devices can be employed in the determination of whether to provide or obscure access to the information.

Description

technical field [0001] The present invention generally relates to systems and methods for providing information privacy. Background technique [0002] Conventional devices and systems typically employ password-only protection to allow or prevent access to data, programs, and / or devices accessible by or stored on a device. In cases where password protection is bypassed or determined, unauthorized access to sensitive information may be gained. Furthermore, in situations where the device is properly accessed by an authorized user but signals to and from the device are intercepted, the possibility of unauthorized access to sensitive data, programs and / or devices arises again. However, access to all data, programs and / or devices stored on or accessible by a device is not required in all circumstances. For example, selected data, programs and / or devices do not need to be accessed during certain times of day, or when the device is at a certain location, etc. [0003] The backgro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00
CPCG06F21/00G06F21/35G06F21/40G06F21/6245G06F2221/2111G06F21/10G06F21/31G06F21/62
Inventor A·M·梅巴德
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products