US 11,689,916 B2
Privacy enhanced location verification for improved transaction security
Jonathan H. Connell, II, Cortlandt-Manor, NY (US); Jae-Eun Park, Wappingers Falls, NY (US); and Nalini K. Ratha, Yorktown Heights, NY (US)
Assigned to International Business Machines Corporation, Armonk, NY (US)
Filed by International Business Machines Corporation, Armonk, NY (US)
Filed on Mar. 18, 2019, as Appl. No. 16/356,462.
Prior Publication US 2020/0304993 A1, Sep. 24, 2020
Int. Cl. H04W 12/02 (2009.01); H04W 8/22 (2009.01); H04W 64/00 (2009.01)
CPC H04W 12/02 (2013.01) [H04W 8/22 (2013.01); H04W 64/003 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, in a data processing system comprising a processor and a memory, the memory comprising instructions executed by the processor to configure the processor to implement a privacy enhanced location service, the method comprising:
receiving, by the privacy enhanced location service, from a requestor computing device, a location query requesting location information for a subject;
retrieving, by the privacy enhanced location service, a selected subject privacy policy data structure, selected from a set of subject privacy policy data structures corresponding to the subject identified in the location query;
applying, by the privacy enhanced location service, the selected subject privacy policy data structure to location information associated with the subject to generate modified location information having a granularity of location information specified in the selected subject privacy policy data structure; and
transmitting, by the privacy enhanced location service, the modified location information to the requestor computing device, wherein the selected subject privacy policy data structure comprises at least one negotiation limit criterion specifying a limit to increasing a specificity of the location information in response to an automated negotiation operation between the data processing system and the requestor computing device, and wherein applying the selected subject privacy policy data structure comprises executing an automated negotiation operation between the data processing system and the requestor computing device based on the at least one negotiation limit criterion.