CPC G06Q 50/265 (2013.01) [G06F 11/302 (2013.01); G06F 11/3438 (2013.01); G06F 16/9537 (2019.01); G06N 5/043 (2013.01); G06Q 10/10 (2013.01); G06Q 20/1235 (2013.01); G06Q 50/184 (2013.01); H04L 67/146 (2013.01); H04L 67/53 (2022.05); H04L 67/535 (2022.05); G06F 8/30 (2013.01); G06Q 30/0607 (2013.01)] | 20 Claims |
1. A computer-implemented method comprising:
receiving, by a processor of a computer, input from a user requesting monitoring of user data generated by activity of the user on an application or website;
analyzing, by the processor, terms of service of the application or website where the user data is used or generated;
programming, by the processor, a monitoring bot configured to monitor the user data based on the terms of service and the received input;
encrypting, by the processor, the user data using the monitoring bot;
tracking, by the processor, third-party attempt to access the user data using the monitoring bot and based on the terms of service;
notifying, by the processor, the user regarding the tracked third-party attempt to access the encrypted data; and
providing, by the processor, options to the user to monetize the tracked access to the user data.
|