US 11,989,329 B2
System and method for privacy policy enforcement
Yoseph Koren, Ganey-Tikva (IL); and Yehonatan Wasserman, Kiryat-Ono (IL)
Assigned to Privacy Rating Ltd., Ganey-Tikva (IL)
Filed by Privacy Rating Ltd., Ganey-Tikva (IL)
Filed on May 18, 2021, as Appl. No. 17/322,962.
Application 17/322,962 is a continuation of application No. 16/301,746, granted, now 11,023,617, previously published as PCT/IL2017/050522, filed on May 11, 2017.
Claims priority of provisional application 62/336,764, filed on May 16, 2016.
Prior Publication US 2021/0271776 A1, Sep. 2, 2021
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 29/06 (2006.01); G06F 21/60 (2013.01); G06F 21/62 (2013.01); H04L 41/50 (2022.01); H04L 41/5003 (2022.01)
CPC G06F 21/6272 (2013.01) [G06F 21/602 (2013.01); G06F 21/606 (2013.01); H04L 41/5003 (2013.01); H04L 41/508 (2013.01); G06F 2221/2107 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for privacy policy enforcement to ensure reconciliation between users communicating via an open system interconnection (OSI) communication architecture, the method comprising:
receiving a privacy policy for at least one user's device of a first user;
receiving a usage policy for a user's device of a second user;
modifying the privacy policy by the first user, such that the received usage policy is to allow access to data and content of the at least one user's device of a first user;
receiving by a first server at least one dataset from the first user's device to be sent to the second user's device, wherein the at least one dataset comprises at least one data segment;
encrypting by the first server the received at least one data segment based on received encryption codes;
receiving a privacy policy enforcement vector, having selective decryption keys corresponding to the encryption codes and configured to allow decryption of at least one data segment when a match between the modified privacy policy and the usage policy occurs to decrypt the at least one data segment; and
performing selective decryption, by a second server, for each data segment based on the privacy policy enforcement vector,
wherein at least one of the first server and the second server is external to the first user's device and second user's device, and
wherein the decrypted at least one data segment passes through a privacy layer added to OSI architecture, the privacy layer being in communication with the first user's device.