摘要:
A system and method manages and enforces user privacy of user data in a network environment in various manners. The system and method can determine a context for interaction with a party, filter user data to be provided to the party based on the determined context, and transmit the filtered user data to the party. The system and method can further determine an anonymity level at which interaction with the party is to be conducted, and interact with the party at the determined anonymity level. Additionally, to enforce user privacy, a privacy enforcement system can be employed at the receiving party and a trusted supervising authority can be utilized to supervise the access of user data received by the receiving party as well as to provide third party certification.
摘要:
A method, system, and apparatus for protecting personal privacy in a wireless local area network using a framework at both the terminal and the service in the wireless local area network. The terminal includes a memory that stores the profile data for a user. The terminal is coupled by radio frequency to an access point that is also coupled to a wired network such as the Internet. A service operator coupled to the wired network offers a service opportunity to the user by sending a message to the terminal that includes the service opportunity. If the profile data for the user indicates that the user is interested in either this type of service opportunity or this particular service, the user sends at least a portion of the profile data to the service operator. The service operator uses the profile data to personalize the service prior to sending it to the user. If the profile data for the user indicates that the user does not want to disclose the profile data for this service opportunity, the service operator can only respond by sending a default service opportunity or not sending any service opportunity.
摘要:
The user's Bluetooth device substitutes a pseudonym address for the Bluetooth Device Address (BD_ADDR). The pseudonym address is a randomized version of the BD_ADDR. The pseudonym address is used in all the functions of the Bluetooth device that normally use the BD_ADDR, including the frequency hopping sequence, the device access code, the initialization key in link encryption, the authentication code, and the various packet addresses. In this manner, the user's privacy is protected by preventing the user's identity, routes, and activities from being correlated with his/her device's address. In addition to the Bluetooth standard, the technique also applies to other wireless standards.
摘要:
A method and system locate a transponder that has an associated identifier and content data, at a location substantially accessible to a user of the mobile terminal. The transponder is activated by the mobile terminal with a wireless signal. In response, the mobile terminal receives at least the identifier and the content data from the activated transponder at the mobile terminal. From the received identifier and/or content data, the method and system select one or more of the stored data items according to one or more criteria.
摘要:
A method and system locate a transponder that has an associated identifier and content data, at a location substantially accessible to a user of the mobile terminal. The transponder is activated by the mobile terminal with a wireless signal. In response, the mobile terminal receives at least the identifier and the content data from the activated transponder at the mobile terminal. From the received identifier and/or content data, the method and system select one or more of the stored data items according to one or more criteria.
摘要:
A method and system locate a transponder that has an associated identifier and content data, at a location substantially accessible to a user of the mobile terminal. The transponder is activated by the mobile terminal with a wireless signal. In response, the mobile terminal receives at least the identifier and the content data from the activated transponder at the mobile terminal. From the received identifier and/or content data, the method and system select one or more of the stored data items according to one or more criteria.
摘要:
A method and system are provided to evaluate a privacy indication of a request for one or more data items of user information by a requesting party based on at least one privacy attribute of one or more of the requested data items; and to provide to the requesting party one or more of the requested data items according to the evaluated privacy indication.
摘要:
Basic personal data of an individual is stored as different data files based on content or intended use. The selection of personal data for inclusion in a data file may be performed in accordance with service provider requests or by the end user, preferably with the assistance of templates. Each data file is assigned a unique identifier and is preferably stored in a network server (or, alternatively, in the user's mobile device). The data files may be organized into groups according to content or intended use. For each of the stored files, a graphical symbol is stored in the user's mobile device. When displayed to the user, the symbol preferably resembles a card. Moreover, each group of data files is preferably displayed as a pack of cards. In this manner, the organization of the cards is such that the user can easily select a card needed to obtain a service.
摘要:
Basic personal data of an individual is stored as different data files based on content or intended use. The selection of personal data for inclusion in a data file may be performed in accordance with service provider requests or by the end user, preferably with the assistance of templates. Each data file is assigned a unique identifier and is preferably stored in a network server (or, alternatively, in the user's mobile device). The data files may be organized into groups according to content or intended use. For each of the stored files, a graphical symbol is stored in the user's mobile device. When displayed to the user, the symbol preferably resembles a card. Moreover, each group of data files is preferably displayed as a pack of cards. In this manner, the organization of the cards is such that the user can easily select a card needed to obtain a service.
摘要:
Basic personal data of an individual is stored as different data files based on content or intended use. The selection of personal data for inclusion in a data file may be performed in accordance with service provider requests or by the end user, preferably with the assistance of templates. Each data file is assigned a unique identifier and is preferably stored in a network server (or, alternatively, in the user's mobile device). The data files may be organized into groups according to content or intended use. For each of the stored files, a graphical symbol is stored in the user's mobile device. When displayed to the user, the symbol preferably resembles a card. Moreover, each group of data files is preferably displayed as a pack of cards. In this manner, the organization of the cards is such that the user can easily select a card needed to obtain a service.