Intelligently transferring privacy settings between devices based on proximity
    1.
    发明授权
    Intelligently transferring privacy settings between devices based on proximity 有权
    基于接近度在设备之间智能转移隐私设置

    公开(公告)号:US09565557B2

    公开(公告)日:2017-02-07

    申请号:US14298235

    申请日:2014-06-06

    Applicant: Google Inc.

    CPC classification number: H04W12/02 H04W4/023

    Abstract: Disclosed are methods, computing devices, and computer-readable mediums for transferring privacy settings. For example, a method includes determining location information indicative of a location of a computing device. Further, the method includes determining one or more applications installed on the computing device and on one or more other computing devices that are configured to access the location information. Yet further, the method includes transferring a privacy setting of the computing device to the one or more other computing devices. In addition, the method includes determining accesses of the one or more applications to the location information indicative of the location of the computing device.

    Abstract translation: 公开了用于传送隐私设置的方法,计算设备和计算机可读介质。 例如,一种方法包括确定指示计算设备的位置的位置信息。 此外,该方法包括确定安装在计算设备上的一个或多个应用以及被配置为访问位置信息的一个或多个其他计算设备。 此外,该方法包括将计算设备的隐私设置传送到一个或多个其他计算设备。 此外,该方法包括确定一个或多个应用程序对指示计算设备的位置的位置信息的访问。

    Methods and systems for controlling permission requests for applications on a computing device

    公开(公告)号:US09836596B2

    公开(公告)日:2017-12-05

    申请号:US14794170

    申请日:2015-07-08

    Applicant: Google Inc.

    CPC classification number: G06F21/52 G06F9/468 G06F21/6209 G06F2221/033

    Abstract: Examples described may relate to methods and systems for controlling permission requests for applications running on a computing device to access resources provided by the computing device. A computing device may maintain in memory for a given application responses to permission requests. The computing device may receive responses to a first permission request that includes two selectable options to either allow or deny access to a particular resource. The computing device may determine whether a number of the responses to the first request that indicate to deny access exceeds a predefined threshold. If the number exceeds the threshold, the computing device may provide, at a run-time of the application subsequent to presentation of the first request, and based on the application attempting to access the resource, a modified permission request that includes, in addition to the two selectable options, a selectable option to prevent requesting permission to access the resource.

    Methods And Systems For Controlling Permission Requests For Applications On A Computing Device
    3.
    发明申请
    Methods And Systems For Controlling Permission Requests For Applications On A Computing Device 有权
    用于控制计算设备上应用程序的权限请求的方法和系统

    公开(公告)号:US20170011215A1

    公开(公告)日:2017-01-12

    申请号:US14794170

    申请日:2015-07-08

    Applicant: Google Inc.

    CPC classification number: G06F21/52 G06F9/468 G06F21/6209 G06F2221/033

    Abstract: Examples described may relate to methods and systems for controlling permission requests for applications running on a computing device to access resources provided by the computing device. A computing device may maintain in memory for a given application responses to permission requests. The computing device may receive responses to a first permission request that includes two selectable options to either allow or deny access to a particular resource. The computing device may determine whether a number of the responses to the first request that indicate to deny access exceeds a predefined threshold. If the number exceeds the threshold, the computing device may provide, at a run-time of the application subsequent to presentation of the first request, and based on the application attempting to access the resource, a modified permission request that includes, in addition to the two selectable options, a selectable option to prevent requesting permission to access the resource.

    Abstract translation: 所描述的示例可以涉及用于控制在计算设备上运行的应用程序的许可请求以访问由计算设备提供的资源的方法和系统。 计算设备可以在存储器中维持给定应用对许可请求的响应。 计算设备可以接收对包括两个可选择选项的第一许可请求的响应,以允许或拒绝对特定资源的访问。 计算设备可以确定指示拒绝访问的对第一请求的响应的数量是否超过预定义的阈值。 如果数量超过阈值,则计算设备可以在呈现第一请求之后的应用的运行时,并且基于尝试访问资源的应用,提供修改的许可请求,该修改的许可请求除了 两个可选择的选项,一个可选择的选项,以防止请求访问资源的权限。

    Intelligently Transferring Privacy Settings Between Devices Based on Proximity
    4.
    发明申请
    Intelligently Transferring Privacy Settings Between Devices Based on Proximity 有权
    基于近似智能传输设备之间的隐私设置

    公开(公告)号:US20150358812A1

    公开(公告)日:2015-12-10

    申请号:US14298235

    申请日:2014-06-06

    Applicant: Google Inc.

    CPC classification number: H04W12/02 H04W4/023

    Abstract: Disclosed are methods, computing devices, and computer-readable mediums for transferring privacy settings. For example, a method includes determining location information indicative of a location of a computing device. Further, the method includes determining one or more applications installed on the computing device and on one or more other computing devices that are configured to access the location information. Yet further, the method includes transferring a privacy setting of the computing device to the one or more other computing devices. In addition, the method includes determining accesses of the one or more applications to the location information indicative of the location of the computing device.

    Abstract translation: 公开了用于传送隐私设置的方法,计算设备和计算机可读介质。 例如,一种方法包括确定指示计算设备的位置的位置信息。 此外,该方法包括确定安装在计算设备上的一个或多个应用以及被配置为访问位置信息的一个或多个其他计算设备。 此外,该方法包括将计算设备的隐私设置传送到一个或多个其他计算设备。 此外,该方法包括确定一个或多个应用程序对指示计算设备的位置的位置信息的访问。

    Methods And Systems For Controlling Permission Requests For Applications On A Computing Device

    公开(公告)号:US20180039775A1

    公开(公告)日:2018-02-08

    申请号:US15787197

    申请日:2017-10-18

    Applicant: Google Inc.

    CPC classification number: G06F21/52 G06F9/468 G06F21/6209 G06F2221/033

    Abstract: Examples described may relate to methods and systems for controlling permission requests for applications running on a computing device to access resources provided by the computing device. A computing device may maintain in memory for a given application responses to permission requests. The computing device may receive responses to a first permission request that includes two selectable options to either allow or deny access to a particular resource. The computing device may determine whether a number of the responses to the first request that indicate to deny access exceeds a predefined threshold. If the number exceeds the threshold, the computing device may provide, at a run-time of the application subsequent to presentation of the first request, and based on the application attempting to access the resource, a modified permission request that includes, in addition to the two selectable options, a selectable option to prevent requesting permission to access the resource.

Patent Agency Ranking