Process used to protect the privacy of users connected to the network
A user and network technology, applied in network data management, location-based services, electrical components, etc., can solve problems such as users unaware of privacy issues, unawareness, and attempts to void them.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0034] In conjunction with this figure, a process for protecting the privacy of a user connected to a network through a terminal, such as an architecture for implementing such a process, will be described below, the terminal comprising a geographical position Geolocation information about the geolocation device.
[0035] The user's terminal may in particular be a mobile terminal such as a smartphone, and the geolocation means may be embedded in a dedicated module implemented to said terminal, such as a GPS module (for Global Positioning System). Furthermore, the geolocation information provided by such geolocation means may be geographic coordinates of the user's geographic location.
[0036] A user is connected in particular to a network for sending over said network a packet 1 comprising in particular data provided by a specific application implemented on said user's terminal, such as for example a multimedia player application . Specifically, packet 1 may be encoded in a ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

