Transforming sensor data streamed to applications
Abstract:
Methods, systems and computer program products for securing access to sensor data are provided herein. A computer-implemented method includes obtaining sensor data from a user device indicative of user activity, detecting for a first time period activities of the user, generating a transformation key for the first time period, transforming sensor data obtained during the first time period utilizing the transformation key, and streaming the transformed sensor data to a plurality of applications. The method also includes determining whether respective ones of the applications have permitted activities that match the detected activities of the user and, responsive to matching the permitted activities of a given application to the detected activities of the user, providing the transformation key to the given application. The method may include identifying applications associated with the user device, extracting descriptions of the applications, and utilizing the descriptions to generate sets of permitted activities for the applications.
Public/Granted literature
Information query
Patent Agency Ranking
0/0