Sign In to Follow Application
View All Documents & Correspondence

Systems And Methods For Ensuring Data Privacy In Smart Devices

Abstract: Systems and methods of the present disclosure provide a fine-grained access to sensitive data available on smart devices by assigning a desired level of granularity to permissions requested by applications to ensure data privacy. User preferred level of granularity is logged and analyzed with detected unwanted flow of data from smart devices to recommend level of granularity for one or more permissions by an application. Flow of data from the smart device is validated based on pre-defined requirements pertaining to permissible flow of data in one or more of End User License Agreement, application description, application category, application vulnerabilities and destination URL address type to ensure only permissible flow of data is enabled by the smart device.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
18 March 2016
Publication Number
38/2017
Publication Type
INA
Invention Field
MECHANICAL ENGINEERING
Status
Email
iprdel@lakshmisri.com
Parent Application
Patent Number
Legal Status
Grant Date
2024-01-01
Renewal Date

Applicants

TATA CONSULTANCY SERVICES LIMITED
Nirmal Building, 9th Floor, Nariman Point, Mumbai-400021, Maharashtra, India

Inventors

1. MADDALI, Lakshmi Padmaja
Tata Consultancy Services Limited, Plot No 1, Deccan Park, Software Units Layout, Madhapur, Hyderabad, Telangana 500081, India
2. CHAMARTY, Sitaram Venkata
Tata Consultancy Services Limited, Plot No 1, Deccan Park, Software Units Layout, Madhapur, Hyderabad, Telangana 500081, India
3. DAS, Batsayan
Tata Consultancy Services Limited, Building 1B, Ecospace, Innovation Labs, Kolkata-STP Kolkata, West Bengal-700156, India
4. NALLAGONDA, Harshita Vani
Tata Consultancy Services Limited, Plot No 1, Deccan Park, Software Units Layout, Madhapur, Hyderabad, Telangana 500081, India

Specification

Claims:1. A method comprising:
logging for each user, by one or more processors, a user preferred level of granularity for one or more permissions by an application, for managing data in a smart device, the user preferred level of granularity being associated with a selectable pre-defined user profile;
detecting, by the one or more processors, an unwanted flow of data from the application; and
analyzing, by the one or more processors, the user preferred level of granularity with the unwanted flow of data to automatically assign a recommended level of granularity for the one or more permissions.

2. The method of claim 1, wherein logging for each user, a user preferred level of granularity comprises:
receiving user preferences for access control to be associated with the one or more permissions;
associating a level of granularity selected from the group consisting of empty, bogus, anonymized, partial and trusted based on the user preferences; and
generating a user preferred per-permission granularity matrix based on the one or more permissions and the level of granularity associated thereof.

3. The method of claim 2, wherein detecting an unwanted flow of data comprises:
analyzing, by one or more static and dynamic code analyses tools, flow of data from the smart device;
collating output from the one or more static and dynamic code analyses tools to generate a report of flow of data from the smart device;
validating the report of flow of data based on pre-defined requirements pertaining to permissible flow of data in one or more of End-User License Agreement (EULA), application description, application category, application vulnerabilities and destination URL address type to generate a privacy disclosure report; and
generating an actual per-permission granularity matrix based on the privacy disclosure report and corresponding to one or more pre-defined privacy modes.

4. The method of claim 3, wherein analyzing the user preferred level of granularity with the unwanted flow of data comprises generating a matrix for the recommended level of granularity corresponding to the one or more pre-defined privacy modes, based on the user preferred per-permission granularity matrix and the actual per-permission granularity matrix.

5. The method of claim 4 further comprising receiving an over-riding level of granularity over the automatically assigned recommended level of granularity.

6. The method of claim 5 further comprising receiving a selected user profile associated with the over-riding level of granularity.

7. The method of claim 6 further comprising generating a heuristic model based on the user preferred per-permission granularity matrix; the actual per-permission granularity matrix; the matrix for the recommended level of granularity; and the over-riding level of granularity and the selected user profile thereof.

8. A system comprising:
one or more processors;
one or more data storage devices operatively coupled to the one or more processors and configured to store instructions configured for execution by the one or more processors to:
log, for each user a user preferred level of granularity for one or more permissions by an application, for managing data in a smart device, the user preferred level of granularity being associated with a selectable pre-defined user profile;
detect an unwanted flow of data from the application;
analyze the user preferred level of granularity with the unwanted flow of data to automatically assign a recommended level of granularity for the one or more permissions.

9. The system of claim 8, wherein the one or more processors are further configured to log for each user, a user preferred level of granularity by:
receiving user preferences for access control to be associated with the one or more permissions;
associating a level of granularity selected from the group consisting of empty, bogus, anonymized, partial and trusted based on the user preferences; and
generating a user preferred per-permission granularity matrix based on the one or more permissions and the level of granularity associated thereof.

10. The system of claim 9, wherein the one or more processors are further configured to detect an unwanted flow of data by:
analyzing, by one or more static and dynamic code analyses tools, flow of data from the smart device;
collating, output from the one or more static and dynamic code analyses tools to generate a report of flow of data from the smart device;
validating the report of flow of data based on pre-defined requirements pertaining to permissible flow of data in one or more of End User License Agreement (EULA), application description, application category, application vulnerabilities and destination URL address type to generate a privacy disclosure report; and
generating an actual per-permission granularity matrix based on the privacy disclosure report and corresponding to one or more pre-defined privacy modes.

11. The system of claim 10, wherein the one or more processors are further configured to generate a matrix for the recommended level of granularity corresponding to the one or more pre-defined privacy modes, based on the user preferred per-permission granularity matrix and the actual per-permission granularity matrix.

12. The system of claim 11, wherein the one or more processors are further configured to receive an over-riding level of granularity over the automatically assigned recommended level of granularity.

13. The system of claim 12, wherein the one or more processors are further configured to receive a selected user profile associated with the over-riding level of granularity.

14. The system of claim 13, wherein the one or more processors are further configured to generate a heuristic model based on the user preferred per-permission granularity matrix; the actual per-permission granularity matrix; the matrix for the recommended level of granularity; and the over-riding level of granularity and the selected user profile thereof.
, Description:As Attached

Documents

Application Documents

# Name Date
1 Form 5 [18-03-2016(online)].pdf 2016-03-18
2 Form 3 [18-03-2016(online)].pdf 2016-03-18
3 Form 18 [18-03-2016(online)].pdf 2016-03-18
4 Drawing [18-03-2016(online)].pdf 2016-03-18
5 Description(Complete) [18-03-2016(online)].pdf 2016-03-18
6 201621009557-Power of Attorney-220416.pdf 2018-08-11
7 201621009557-Form 1-130416.pdf 2018-08-11
8 201621009557-Correspondence-220416.pdf 2018-08-11
9 201621009557-Correspondence-130416.pdf 2018-08-11
10 201621009557-FER.pdf 2020-03-19
11 201621009557-OTHERS [18-09-2020(online)].pdf 2020-09-18
12 201621009557-FER_SER_REPLY [18-09-2020(online)].pdf 2020-09-18
13 201621009557-DRAWING [18-09-2020(online)].pdf 2020-09-18
14 201621009557-CLAIMS [18-09-2020(online)].pdf 2020-09-18
15 201621009557-PatentCertificate01-01-2024.pdf 2024-01-01
16 201621009557-IntimationOfGrant01-01-2024.pdf 2024-01-01

Search Strategy

1 2020-03-1816-27-36E_18-03-2020.pdf

ERegister / Renewals

3rd: 08 Feb 2024

From 18/03/2018 - To 18/03/2019

4th: 08 Feb 2024

From 18/03/2019 - To 18/03/2020

5th: 08 Feb 2024

From 18/03/2020 - To 18/03/2021

6th: 08 Feb 2024

From 18/03/2021 - To 18/03/2022

7th: 08 Feb 2024

From 18/03/2022 - To 18/03/2023

8th: 08 Feb 2024

From 18/03/2023 - To 18/03/2024

9th: 08 Feb 2024

From 18/03/2024 - To 18/03/2025

10th: 12 Mar 2025

From 18/03/2025 - To 18/03/2026