Browse Prior Art Database

Method for sharing photos on social networking service by preserving user's privacy

IP.com Disclosure Number: IPCOM000244171D
Publication Date: 2015-Nov-19
Document File: 5 page(s) / 205K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is a system that preserves user's privacy by controlling partial read permissions of photos based on a relationship of web service users.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 54% of the total text.

Page 01 of 5

Method for sharing photos on social networking service by preserving user's privacy
Disclosed is a system that preserves user's privacy by controlling partial read permissions of photos based on a relationship of web service users.

In social networking services, member can upload any photos so member cannot stop other member uploading photo that intrudes one's privacy. Disclosed system solves this issue by controlling partial read permissions of photos based on a relationship of web service users. Fig.
1 shows the components of disclosed system and Fig. 2 shows the example of data model of disclosed system. Fig. 3 shows flowchart when taking a photo and posting to the web service. Fig. 4 shows flowchart when viewing the photo. With face recognition technology, member can specify area and set the permission automatically.  Preliminarily, members input their face information and permission to expose their face. The permission can be set based on member's relationship. A camera device recognize faces and the device request the web service to search member profiles. If the web service find faces, the device associate the web service member information with those who are in a photo. Once taking a photo, the web service encrypt their face automatically and member can post to the web service. When viewing timeline, faces are decrypted based on their permission settings. In case not using the face recognition, a user can select any areas to encrypt and permissions to decrypt.

Following is one of the use cases of using this system. See Fig. 5 for details.

Take a photo


1.

Whenever a camera device recognize faces, the device request SNS to search member profiles. If SNS find faces, the device associate SNS member information with those who are in a photo.

Encrypt faces


2.

Generate secret key correspond to the number of faces and encrypt a photo.

Preview


3.

If a member who take a photo has permissions to decrypt their faces, the member can see their faces. By changing permission settings, the member can see their faces on SNS later. In this case, Member D and E have to change their permissions to view their faces.

Post encrypted photo and secret keys


4.

U...