`
`WHAT IS CLAIMEDIS:
`
`1.
`
`A computer-implementable method for performing a privacy operation,
`
`comprising:
`
`monitoring user behavior via an Input/output collector, the Input/output collector
`
`capturing user/device interactions between a user and a device;
`
`determining whether the user/device interactions include sensitive personal
`
`information;
`
`obfuscating the sensitive personal information, the obfuscating preventing viewing of
`
`the sensitive personal information; and,
`
`presenting the sensitive personal information as a sensitive personal information
`
`indication, the sensitive personal information indication indicating the
`
`user/device interactions include sensitive personal information.
`
`2.
`
`The method of claim 1, wherein:
`
`the obfuscating comprises storing the sensitive personal information via a one way
`
`function, the one way function preventing access to the sensitive personal
`
`information.
`
`3.
`
`The method of claim 2, wherein:
`
`the data stream collector comprises a keystroke collector; and,
`
`the monitoring comprises collecting keystrokes resulting from user/device
`
`interactions, the keystrokes corresponding to the sensitive personal
`
`information being addedto the one way function.
`
`4.
`
`The method of claim 1, further comprising:
`
`capturing a context associated with the data streams resulting from user/device
`
`interactions between a user and a corresponding endpoint device; and,
`
`presenting the context along with the sensitive personal information token.
`
`OoOoSsDBwnFBPWYNNO
`
`eSwe—-©
`
`&Wwbd
`
`nA&WwWN
`
`— BW
`
`wWbd
`
`-46-
`
`
`
`nAB&BWDNOnABBWwWb
`OoOoSsDBwnFBPWYNNO
`SeSeSeSeSeeeSDOnBPWYNYKFOS
`
`Attorney Docket No.: FP0005
`
`5.
`
`The method of claim 1, further comprising:
`
`offering the user an opportunity to enroll user sensitive personal information in a
`
`privacy protection system, so enrolling the user sensitive personal information
`
`provides the user with an assurance that inadvertent display of sensitive
`
`personal information in a company security system would be prevented.
`
`6.
`
`The method of claim 1, further comprising:
`
`developing sensitive personal information obfuscation policies; and,
`
`using the sensitive personal information obfuscation policies to determine whether the
`
`user/device interactions include sensitive personal information and which
`
`sensitive personal information to obfuscate.
`
`7.
`
`A system comprising:
`
`a processor,
`
`a data bus coupled to the processor; and
`
`a non-transitory, computer-readable storage medium embodying computer program
`
`code, the non-transitory, computer-readable storage medium being coupled to
`
`the data bus, the computer program codeinteracting with a plurality of
`
`computer operations and comprising instructions executable by the processor
`
`and configured for:
`
`monitoring user behavior via an Input/output collector, the Input/output
`
`collector capturing user/device interactions between a user and a
`
`device;
`
`determining whetherthe user/device interactions include sensitive personal
`
`information;
`
`obfuscating the sensitive personal information, the obfuscating preventing
`
`viewing of the sensitive personal information; and,
`
`presenting the sensitive personal information as a sensitive personal
`
`information indication, the sensitive personal information indication
`
`-47-
`
`
`
`18
`
`19
`
`—nA&WwWNBRWwWWN
`
`BWwWbd
`NHnASFWNY
`
`Attorney Docket No.: FP0005
`
`indicating the user/device interactions include sensitive personal
`
`information.
`
`8.
`
`The system of claim 7, wherein:
`
`the obfuscating comprises storing the sensitive personal information via a one way
`
`function, the one way function preventing access to the sensitive personal
`
`information.
`
`9.
`
`The system of claim 8, wherein:
`
`the data stream collector comprises a keystroke collector; and,
`
`the monitoring comprises collecting keystrokes resulting from user/device
`
`interactions, the keystrokes corresponding to the sensitive personal
`
`information being addedto the one way function.
`
`10.
`
`The system of claim 7, wherein:
`
`capturing a context associated with the data streams resulting from user/device
`
`interactions between a user and a corresponding endpoint device; and,
`
`presenting the context along with the sensitive personal information token.
`
`11.
`
`The system of claim 7, wherein the instructions executable by the processor
`
`are further configured for:
`
`offering the user an opportunity to enroll user sensitive personal information in a
`
`privacy protection system, so enrolling the user sensitive personal information
`
`provides the user with an assurance that inadvertent display of sensitive
`
`personal information in a companysecurity system.
`
`12.
`
`The system of claim 7, wherein the instructions executable by the processor
`
`are further configured for:
`
`developing sensitive personal information obfuscation policies; and,
`
`-48-
`
`
`
`Attorney Docket No.: FP0005
`
`using the sensitive personal information obfuscation policies to determine whether the
`
`data streams resulting from user/device interactions include sensitive personal
`
`information and which sensitive personal information to obfuscate.
`
`13.
`
`A non-transitory, computer-readable storage medium embodying computer
`
`program code, the computer program code comprising computer executable instructions
`
`configured for:
`
`monitoring user behavior via an Input/output collector, the Input/output collector
`
`capturing user/device interactions between a user and a device;
`
`determining whether the data streams resulting from user/device interactions include
`
`sensitive personal information;
`
`obfuscating the sensitive personal information, the obfuscating preventing viewing of
`
`the sensitive personal information; and,
`
`presenting the sensitive personal information as a sensitive personal information
`
`indication, the sensitive personal information indication indicating the
`
`user/device interactions include sensitive personal information.
`
`14.
`
`The non-transitory, computer-readable storage medium of claim 13, wherein:
`
`the obfuscating comprises storing the sensitive personal information via a one way
`
`function, the one way function preventing access to the sensitive personal
`
`information.
`
`15.
`
`The non-transitory, computer-readable storage medium of claim 14, wherein:
`
`the data stream collector comprises a keystroke collector; and,
`
`the monitoring comprises collecting keystrokes resulting from user/device
`
`interactions, the keystrokes corresponding to the sensitive personal
`
`information being addedto the one way function.
`
`OoOoSIDBWWBPWWNNO
`
`—eetNyKF&
`
`BWwWbd
`
`nAB&BWwWN
`
`-49-
`
`
`
`Attorney Docket No.: FP0005
`
`—nABBWwWb
`NHnTBBWwWNY
`nAB&BWwWN
`
`16.
`
`The non-transitory, computer-readable storage medium of claim 13, wherein
`
`the computer executable instructions are further configured for:
`
`capturing a context associated with the data streams resulting from user/device
`
`interactions between a user and a corresponding endpoint device; and,
`
`presenting the context along with the sensitive personal information token.
`
`17.
`
`The non-transitory, computer-readable storage medium of claim 13, wherein
`
`the computer executable instructions are further configured for:
`
`offering the user an opportunity to enroll user sensitive personal information in a
`
`privacy protection system, so enrolling the user sensitive personal information
`
`provides the user with an assurance that inadvertent display of sensitive
`
`personal information in a companysecurity system.
`
`18.
`
`The non-transitory, computer-readable storage medium of claim 13, wherein:
`
`developing sensitive personal information obfuscation policies; and,
`
`using the sensitive personal information obfuscation policies to determine whether the
`
`user/device interactions include sensitive personal information and which
`
`sensitive personal information to obfuscate.
`
`19.
`
`The non-transitory, computer-readable storage medium of claim 13, wherein
`
`the computer executable instructions are deployable to a client system from a server system
`
`at a remote location.
`
`20.
`
`The non-transitory, computer-readable storage medium of claim 13, wherein
`
`the computer executable instructions are provided by a service provider to a user on an on-
`
`demandbasis.
`
`-50-
`
`
![](/site_media/img/document_icon.png)
Accessing this document will incur an additional charge of $.
After purchase, you can access this document again without charge.
Accept $ ChargeStill Working On It
This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.
Give it another minute or two to complete, and then try the refresh button.
A few More Minutes ... Still Working
It can take up to 5 minutes for us to download a document if the court servers are running slowly.
Thank you for your continued patience.
![](/site_media/img/error_icon.png)
This document could not be displayed.
We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.
![](/site_media/img/error_icon.png)
Your account does not support viewing this document.
You need a Paid Account to view this document. Click here to change your account type.
![](/site_media/img/error_icon.png)
Your account does not support viewing this document.
Set your membership
status to view this document.
With a Docket Alarm membership, you'll
get a whole lot more, including:
- Up-to-date information for this case.
- Email alerts whenever there is an update.
- Full text search for other cases.
- Get email alerts whenever a new case matches your search.
![](/site_media/img/document_icon.png)
One Moment Please
The filing “” is large (MB) and is being downloaded.
Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.
![](/site_media/img/document_icon.png)
Your document is on its way!
If you do not receive the document in five minutes, contact support at support@docketalarm.com.
![](/site_media/img/error_icon.png)
Sealed Document
We are unable to display this document, it may be under a court ordered seal.
If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.
Access Government Site