Controlling combination of information submitted to computing system
A computing system and new information technology, applied in the information field, can solve problems that are difficult to imagine
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] specifically refer to Figure 1A-Figure 1D , shows an example of the application of the solution according to the embodiment of the present disclosure.
[0026] From Figure 1A Initially, a user (ie person) 105 uses a client computing system, or simply uses a client 110 to access a server computing system, or simply uses a server 115x providing a corresponding service, eg in the Internet. User 105 may be required to submit personal information to server 115x for utilization of services while authorizing third parties associated with server 115x to use the personal information. The authorization is granted by the user 105 accepting the corresponding privacy terms (for example, by ticking an option in the webpage); at this stage, the user 105 can also authorize the third party to share personal information with other third parties.
[0027]In a solution according to an embodiment of the present disclosure, a user 105 creates one or more sharing rules for his / her personal...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


