Patent
Secure system and method for enforcement of privacy policy and protection of confidentiality
Sastry S. Duri,Marco Gruteser,Xuan Liu,Paul A. Moskowitz,Ronald Perez,Edith Schonberg,Moninder Singh,Jung-Mu Tang,Charles Tresser +8 more
Reads0
Chats0
TLDR
In this paper, the authors present a method for securely enforcing a privacy policy between two enterprises, comprising of creating a message at a first enterprise, wherein the message includes a request for data concerning a third party and privacy policy of the first enterprise; sending the message to a second enterprise; and running a privacy rules engine at the second enterprise to compare the privacy policy with a set of privacy rules for the third party.Abstract:
The invention includes various systems, architectures, frameworks and methodologies that can securely enforce a privacy policy. A method is include for securely guaranteeing a privacy policy between two enterprises, comprising: creating a message at a first enterprise, wherein the message includes a request for data concerning a third party and a privacy policy of the first enterprise; signing and certifying the message that the first enterprise has a tamper-proof system with a privacy rules engine and that the privacy policy of the first entity will be enforced by the privacy rules engine of the first enterprise; sending the message to a second enterprise; and running a privacy rules engine at the second enterprise to compare the privacy policy of the first enterprise with a set of privacy rules for the third party.read more
Citations
More filters
Patent
Lithium-ion battery
TL;DR: In this article, a battery includes a positive electrode having a current collector and a first active material and a negative electrode having an auxiliary electrode having two active materials and a third active material.
Patent
Telecommunications device security
TL;DR: In this paper, an interface controller is provided in the secure execution environment and intercepts all communications directed to the authentication-means to control access to access control by these communications.
Patent
Trusted monitoring system and method
TL;DR: In this article, the authors describe methods and apparatus for monitoring remotely located objects with a system comprised of at least one master data collection unit, any number of remote sensor units, and a central data collection server.
Patent
Automatic enforcement of obligations according to a data-handling policy
Rema Ananthanarayanan,Mukesh K. Mohania,Ajay Gupta,Calvin S. Powers,Sachindra Joshi,Manish A. Bhide +5 more
TL;DR: In this paper, a determination is made whether any obligations apply to each data item requested in accordance with the data handling policy, and the determination may relate to whether rules having associated obligations identified in the data-handling policy apply to data items requested by a user.
Patent
Profile and consent accrual
TL;DR: In this paper, a user interface is provided to the user via a browser of the client to collect the requested user information that is not included in the user profile and the consent to share the requested users' information from the user.
References
More filters
Patent
Systems and Methods for Secure Transaction Management and Electronic Rights Protection
TL;DR: In this article, the authors proposed a secure content distribution method for a configurable general-purpose electronic commercial transaction/distribution control system, which includes a process for encapsulating digital information in one or more digital containers, a process of encrypting at least a portion of digital information, a protocol for associating at least partially secure control information for managing interactions with encrypted digital information and/or digital container, and a process that delivering one or multiple digital containers to a digital information user.
Patent
System for controlling access and distribution of digital property
TL;DR: In this article, a method and device are provided for controlling access to data, where portions of the data are protected and rules concerning access rights to data are determined, and a method is also provided for distributing data for subsequent controlled use of those data.
Patent
System and method for secure electronic commerce transactions
Barbara L. Fox,Lester L. Waters,Jeffrey F. Spelman,Robert B. Seidensticker,Matthew W. Thomlinson +4 more
TL;DR: In this article, an electronic commerce system has a credential binding server at a trusted credential authority, multiple computing units at associated participants, and a communication system interconnecting the credential bounding server and the multiple computation units.
Patent
Customer-based product design module
TL;DR: In this paper, a two-way interactive media enables relationships to be built with individual customers and groups of customers throughout a product's or service's life cycle, which can be embedded in products or services that contain a microprocessor and a facility for communication.
Patent
Personal information security and exchange tool
Kevin P. O'Neil,Glenn R. Seidman +1 more
TL;DR: The E-Metro Community and Personal Information Agents (EMIA) as discussed by the authors is an agent-rule based command and control of informational assets in a networked computer environment, providing a trusted means to author, secure, search, process, and exchange personal and/or confidential information.