![]() System and method for controlling personal data of a user of telecommunications networks
专利摘要:
The invention relates to a system comprising: a databank (103) associated with a user (100) of telecommunications networks, for storing data generated by the user (100) during the use of the networks and data obtained from external information sources; a data control module (101) for making said data available to the user (100); and a virtual assistant (200) that accesses the stored data, maintaining a contextualised interaction of same. According to the invention, the data control module (101) allows the user (100) to manage access permissions on the stored data in accordance with different privacy levels set by the user (100) and depending on the potential consumer (105) of the data and on the purposes of this consumption, the databank (103) permitting access to the data that it stores, in accordance with the access permissions set by the user (100). 公开号:ES2703457A2 申请号:ES201890071 申请日:2017-07-31 公开日:2019-03-08 发明作者:Lopez José María Alvarez-Pallete;Cebrian José María Alonso;Sacristan Antonio Guzman 申请人:Telefonica SA; IPC主号:
专利说明:
[0001] [0002] System and method of control of personal data of a user of telecommunications networks [0003] [0004] Field of technique [0005] [0006] The present invention relates to the preservation of data privacy, the portability of data in telecommunications networks and digital services, as well as the analysis and evaluation of data, in a controlled manner by the user generating them. . [0007] [0008] The invention provides a system, and a method, which controls the collection of the innumerable data generated by each user in their interaction with telecommunications networks and services, making them available to the user for their knowledge, the management of selective permits to third parties for the putting into value of said data, as well as the action on the network and services based on said data. [0009] [0010] BACKGROUND OF THE INVENTION [0011] [0012] The users of telecommunications networks and systems, as well as the services built on them, generate a huge amount of data concerning, among others, the way in which users interact consciously or unconsciously with the network, to the use that they make the terminals and the applications installed in them or the consumption of digital services they perform. These data include, but are not limited to, the location data of users, their browsing activity on the network, the applications they download and use, their voice and messaging communication activity, their preferences in audiovisual services, their TV consumption, etc. [0013] [0014] In order to identify the different areas of data generation, the way in which telecommunications companies are structured according to a model at various levels or platforms can be modeled. [0015] [0016] The first level corresponds to the physical assets of the operator, that is, fixed access networks, such as copper and fiber, and mobile networks, the backbone network, data centers, etc. This first level is the foundation on which the telecommunications operators construct their offer of services to users. [0017] The second level consists of the operator's IT systems, such as network systems that allow intelligent management of the first level networks; the commercial systems, which allow the management of the commercial offer and the subscription of the clients to the different services; billing and billing systems, etc. In summary, this second level gives intelligence to the physical assets of the first level. [0018] [0019] In a third level we find the added value products and services offered over the telecommunications operator's networks, such as digital television over IP, security services, the internet of things, financial services, etc. These services can be offered by the telecommunications operator itself and also by third parties, the latter being called over-the-top (OTT) services since they are built on an external telecommunication network. [0020] [0021] All the information generated in these levels can be stored transiently or permanently in a variety of servers and in a wide variety of formats such as network traces or call records (in English CDRs or Call Detail Records). [0022] Also, virtual assistants begin to proliferate, which automate the interaction with users without the need for a human assistant to be available in real time. These services are not only offered by telecommunication operators, but by any service that requires assistance to the end user. There are even virtual assistants that are the service itself and are offered to manage for example a domestic environment through a vocal interface. The virtual assistants that can be found in the state of the art are already able to solve with a degree of moderate-high success the requests made by the user, at least when it comes to basic interactions. [0023] [0024] Limitations of Existing Solutions: [0025] [0026] Traditionally only a part of all this information is stored and that which is stored is scattered throughout different systems. From this subset, a part is used by the telecommunications operator to correctly provide the services contracted by the client / user. [0027] [0028] Eventually this information may be added and used by the telecommunications operator or by a third party, after assignment to the same, for purposes other than the provision of services, such as to make a user profile with which to offer more targeted advertising . However this occurs infrequently in part by the legal imposition, in certain legislations, of requesting express permission to the user, which is a delicate process and that can raise suspicions in the final user. [0029] [0030] In fact, the assignment and subsequent use of these data is rarely controllable by the user, beyond general acceptance clauses (opt-in) that give little information about the distribution and the use that will be made of said data. This is especially valid for the case of services offered by third parties, which require large transfers of user data, as a non-reimbursable consideration for the provision of frequently free services. Example of large private data concessions that many users make without considering their relevance are access permission to the contact list or location data to free apps. In these cases it can be said that the user is "paying" for the service with their data, and often loses control over the use made of them. [0031] [0032] Regarding virtual assistants in the state of the art, it can be said that they present limitations in terms of the exploitation of context data. In effect, they are able to elaborate a user profile based on the context of the past interactions, which they use to infer the user's intentions when interacting with the virtual assistant. However, they present serious limitations in several aspects. First, they do not use other data sources, different from the user's own interaction with the virtual assistant, so that the first interaction of any user with the virtual assistant is identical and starts from scratch without personalizing. On the other hand, the virtual assistants of the state of the art do not exploit the immediate context, which characterizes the particular situation in which the user finds himself at the precise moment of making a request, and which can cause the same request from the same user can refer to different intentions and therefore may require differentiated actions. It can be affirmed therefore that there are no systems that exploit the context data to the maximum to optimize the interaction with the user. [0033] [0034] Exhibition of the invention [0035] [0036] To solve the above limitations of the state of the art, the present invention provides, according to a first aspect, a system for controlling personal data of a user of telecommunications networks comprising: a data bank associated with a user of networks of adapted telecommunications and configured to store data generated by the user during the use of telecommunications networks and the services offered by said telecommunications networks; and a data control module adapted and configured to make the data stored in the data bank available to the user. [0037] [0038] The data control module is also adapted and configured to allow the user to manage the access permissions on the data stored in the data bank according to different levels of privacy established by the user and depending on the potential consumer of the data and of the purposes of said consumption; and the data bank allows the consumer of the data access to the data stored by the user according to the access permissions established by the user. [0039] [0040] In order for the aforementioned data bank to store the data generated by the user, all the data sources that can be valued in isolation or in combination are previously identified. This stage involves connecting the different points of capture or temporary storage of this data with an infrastructure capable of making them available for their control and subsequent exploitation. The data is generated in a massive way in the three previously mentioned levels and must be treated, generally in real time. This huge amount of data, framed within the "Big Data" paradigm, is stored in different databases and systems, and the data is normalized and segmented by client, creating the aforementioned data bank (or repository) that contains all the data generated. in each of the three levels and that correspond to the level of consent set by the user. [0041] [0042] The data can come from connection logs of each user to different base stations, call records (CDRs), IP television consumption, visited web pages, etc. which can be stored in different repositories / systems. [0043] [0044] The data bank may contain, in addition to the information generated by the user during the use of telecommunications networks and services, information on the permissions granted by the user, for the different third parties and for what purposes, as well as information on the use concrete that third parties are making of the user's personal data. [0045] [0046] Characteristically according to the present invention, the data bank, besides storing the data generated by the user can also store data obtained from sources external to the network and services of the telecommunications operator and not necessarily generated by the user but which may be relevant for the same. On one side data captured by the user's own devices can be stored during the interaction with the user or mere environmental or context data, not linked to the interaction with the user. On the other hand, external data can be collected, but they can apply or eventually affect the user, for example, a weather forecast system or a natural catastrophe warning system. [0047] [0048] In addition, in the proposed system, a virtual assistant (who can integrate the aforementioned data control module) is included who is operatively connected to the data bank to access the data stored by the latter. The virtual assistant maintains a contextualized interaction of the stored data by: [0049] a) a determination of the contextual domains that apply to the user based on the analysis of entities associated with the user, including contracted services, devices and / or contacts with which they interact; [0050] b) a contextualization of the domain based on historical user activity data collected from the user's interaction with the telecommunications network and with the services of a telecommunications operator; [0051] c) a contextualization of the domain based on the history of other data relevant to the user but not related to its activity; [0052] d) a contextualization of the domain based on immediate context data that characterize a current situation of the user; Y [0053] e) a determination of the user's intention based on the contextualization of the previous stages and a specific request of the user (100). [0054] [0055] Preferably, said user request is made in natural language. [0056] [0057] The purpose of making the data stored in the database available to the user is, first of all, to make the user aware of the data that it generates and which can be stored, treated and valued by the operator or by third parties. Secondly allow a management of the permissions granted by the user. These rights will derive from a proactive assignment by the user or more often from a reactive transfer in response to a query by the operator. This offer may entail certain privileges offered to the user in exchange for the transfer of their data, making them share the value they bring to a third party. These prebends can have different forms: they can be economic, such as discounts on the invoice; in kind, such as extensions of the mobile data voucher; or they can be more intangible, such as content recommendations aligned with your preferences. Finally, the data stored in the data bank allows optimizing the provision of services of the telecommunication operator, or of an authorized third party, for example, by providing the aforementioned Virtual Assistant based on user data, for which the user receives attention. highly customized with a 24x7 availability. The present invention allows a granular management of the permissions by the user. In other words, the user can grant permissions in a differentiated manner for each type of data, for each specific use and for each potential consumer of their data. [0058] The data control module (or control interface) allows the transfer of the data according to a model of direct sales or auction. It also allows to interrupt the sharing of previously assigned data. [0059] [0060] The user can opt for an automatic surveillance system that monitors data collection entities and deactivates monitoring activities of certain third parties. This applies especially to data collection actions that are carried out during the provision of the services to the user, if no measures are taken to avoid it. The most obvious example would be the collection of cookies by mediating entities in the online advertising market, which obtain a user profile from them and offer it as a claim to the potential advertisers who participate in the auctions of advertising spaces in the webs visited by the user. [0061] [0062] The interaction between the user and the system of the present invention can be carried out through different user interfaces such as webs, applications or bots. The bots or conversational robots rely on natural language processing techniques to interact with the users, for example in a non-intrusive way through messaging services and therefore constitute a preferred implementation of the invention. However, another type of interfaces can perfectly comply with the object of this invention, such as, for example, augmented reality interfaces. In fact, the preferred implementation of this invention presents multiple man-machine interfaces available simultaneously so that the user or the system can select the most suitable one for each case and situation. [0063] [0064] In an example of embodiment, the system also includes a repository of reward plans to store information about different considerations offered to the user in exchange for modifying said levels of privacy. The considerations are offered to the user through the data control module. The Considerations may depend on the type of data, the specific consumer of the data with respect to which the privacy levels are modified and the purpose with which the data will be exploited by said consumer. Likewise, the considerations may depend on the degree of detail of the data. [0065] [0066] The data control module, or more generally the Virtual Assistant based on user data, can offer the user action actions on the telecommunications networks and on the services offered by these on the basis of the stored data made available to the user, and subject to the confirmation of the user, to request the execution of said action actions to telecommunications networks and services. [0067] [0068] Action actions for example can be used by the user to block tracking mechanisms during the use of telecommunications networks and the services offered by them. Also, action actions can be used by the user to uninstall a malicious application. Also, action actions can be used by the user to optimize a WiFi connection or even to minimize the impact caused by the ads in web browsing. [0069] [0070] The present invention provides, according to a second aspect, a method of controlling personal data of a user of telecommunications networks, which comprises: storing in a data bank associated with a user data generated by the user during the use of networks of telecommunications and the services offered by said telecommunications networks; and making available to the user the data stored in the data bank through a data control module. [0071] [0072] Also, the proposed method further comprises: managing, by the user, in the data control module, the access permissions on the data stored in the data bank according to different levels of privacy established by the user and depending on the potential consumer of the data and the purposes of said consumption; and access, by the data consumer, to the data stored in the data bank according to the access permissions established by the user. [0073] [0074] According to the proposed method, the data bank also stores data obtained from sources of information external to the telecommunications network, not generated by the user. Likewise, a virtual assistant accesses the stored data and maintains a contextualized interaction of the same. [0075] In an exemplary embodiment, from a user's intention and from all the contextualized interaction of the stored data, the method further comprises determining a set of actions intended to respond to a request from the user. [0076] [0077] In an exemplary embodiment, the data control module requests the user to act on the telecommunications networks and on the services offered by them based on the stored data made available to the user, and subject to user confirmation, The data control module requests the execution of said action actions for telecommunications networks and services. [0078] [0079] Preferably, said action actions are executed proactively when a pre-established condition relative to at least one of the data is met. [0080] [0081] In an exemplary embodiment, the action actions are used by the user to block tracking mechanisms during the use of the telecommunications networks and the services offered by them. [0082] [0083] In an exemplary embodiment, said pre-established condition corresponds to the detection of access to a URL related univocally to a malicious application, said actions being used in this case used by the user to uninstall said malicious application. [0084] [0085] In an example of embodiment, a user profile is generated from the data generated by the user during the use of the telecommunications networks and the services offered by them. This user profile may include derived information obtained from two or more user data, for example by combining them together and / or drawing conclusions based on the comparison thereof. Likewise, or alternatively, the user profile may include derived information obtained from user data and data from external sources, for example by combining them together and / or drawing conclusions based on the comparison thereof. Even, the user profile can be shared with the data consumers, based on the access permissions established by the user. In the latter case, according to an example of embodiment of the present invention, the data consumer is a web server and the user profile is shared during the process of accessing the web portal served by said web server. [0086] [0087] In an example of embodiment, the user accesses data stored in the data bank relating to the state of a Wi-Fi network thereof, and the aforementioned actions of action are used by the user to optimize this WiFi connection. The data accessed by the user can include information about the devices connected to the Wi-Fi connection and the use that these devices are making of it, and the action actions correspond to a change in the Wi-Fi network usage permissions of at least one of the devices. [0088] [0089] For example, the aforementioned change in the Wi-Fi network usage permissions of at least one of the devices may correspond to a denial of access to the Wi-Fi network. Alternatively, in another example, said change in the Wi-Fi network usage permissions of at least one of the devices may correspond to a limitation of the maximum bandwidth allowed in the WiFi network. [0090] [0091] In another embodiment, the user accesses data stored in the database relating to the impact of the advertisements in web browsing and the aforementioned action actions are used by the user to minimize said impact of the advertisements in the web browsing. In this case, the data that the user accesses can include information about the amount of data downloaded corresponding to advertisements, or information about the delay in the presentation of web pages due to the downloading of advertisements, while the action actions they can understand the activation of an ad removal service on the web pages during said web browsing. [0092] [0093] The present invention allows the user to control the data he generates. The user needs to first of all gain awareness of the quantity and variety of data that it produces, as well as to know the potential use that can be made of said data and to control ex ante and explicitly said exploitation. That is, the user must establish its own rules about how the information it generates is disseminated to third parties and must be informed at all times of its use. [0094] [0095] For example, the user must be aware of the data that is collected, aggregated and auctioned during their Internet browsing in order to present personalized ads as well as take the relevant actions, such as controlling this flow of data as they wish and technically viable. [0096] [0097] On the other hand, the present invention allows the telecommunications operator to make a more effective use of the data collected during the interaction of users with their networks and with the digital services that rely on them. In this way the operator can manage its resources and investments in a more optimal way and guarantee the excellence of the service to its clients. Likewise, the operator can optimize the interaction with the user, both reactive to calls or requests from the user, or proactively, when a combination of factors is detected that makes it recommendable to launch an interaction with the user, without a request. prior to it. The present invention optimizes the interaction with the user through a virtual assistant based on user data, which thanks to Artificial Intelligence techniques allows an autonomous dialogue with the user. However, the present invention can also help to optimize other types of interactions in which a human assistant mediates, for example recommending actions that must be ratified or adopted by the same. [0098] Additionally the present invention allows to create a closer bond with the client, which sees his user experience and his confidence in the operator improved, and also can be rewarded for the exploitation that is made of his data. This relationship of trust between user and operator generates greater user satisfaction and greater customer retention for the operator. [0099] [0100] The present invention allows an effective data portability, that is to say that the user data can be recovered from the different repositories and telecommunications systems and services, can be transferred to a second system in a simple way and subsequently deleted from the origin. This allows an end-to-end privacy management system controlled by the user. [0101] [0102] The present invention allows exploitation or enhancement of user data. A first modality is the use for an improvement of the service provided by the telecommunications operator. The user information can be used to offer personalized services to the user, or to offer discounts or new services according to their interests. In addition, the operator can use the data to optimize its infrastructure investments in a way that achieves maximum adaptation to the needs of its customers. [0103] [0104] Another form of exploitation is the assignment to third parties. This assignment must be based on transparency towards the user, who must know in detail the company that demands their data, the use they intend to make of them and must have the option to deny, grant and even revoke permits, always in a granular way . The present invention allows generating a framework of trust with the user, so that he may be compelled to share his data for certain purposes, with the confidence that the limitations that it imposes. This inclination to share your data will be linked, not only to this confidence in the use that will be made of them, but also in the value that the client perceives that he / she will receive from said cession. The latter may be related to the consideration received by the user as a result of the assignment. [0105] [0106] The present invention also allows the user to act on the telecommunications network and the services based on the information, raw or processed, that the operator puts at his disposal. In other words, it goes beyond the collection, management and transfer of data and defines a framework in which the user can act on the telecommunications network itself and the services in order to optimize them. These actions can be, among others, changes in the plans of contracted services, such as an increase in data bonds, or correction of aspects that have a negative impact on the service provision or consumption made, such as for example, the uninstallation of applications that cause excessive consumption of data or that are classified as malicious applications (malware). [0107] [0108] BRIEF DESCRIPTION OF THE DRAWINGS [0109] [0110] The foregoing and other features and advantages will be more fully understood from the following detailed description of exemplary embodiments, merely illustrative and not limiting, with reference to the accompanying drawings, in which: [0111] [0112] Fig. 1 shows the architecture of a personal data control system of a user of telecommunications networks according to an embodiment of the present invention. In this case, the multitude of personal data banks associated with the different users of the telecommunications operator have been illustrated. [0113] [0114] Fig. 2 shows the architecture of the system implementing the present invention according to another embodiment. [0115] [0116] Fig. 3 shows a flowchart of the preferred implementation of the method of the present invention based on orchestration by the user data control module. [0117] [0118] Fig. 4 shows a flow diagram of an implementation of the method of the present invention in which communication with the user is initiated from the data control module and in which the user decides to act on the network infrastructure and services operator. [0119] Fig. 5 shows a flow diagram of an implementation of the method of the present invention in which a user requests data about the state of the domestic WiFi network and requests an optimization of the connection based on said data. [0120] [0121] Fig. 6 shows a flowchart of an implementation of the method of the present invention in which the user consults the impact on his data connection of the advertisements presented during his web browsing and consequently requests to block them. [0122] [0123] Fig. 7 shows a diagram of a scenario in which a user activates tracking lock and initiates anonymous browsing according to the teachings of this invention. [0124] Fig. 8 shows a flow diagram of an implementation of the method of the present invention in order to perform a parental control with detection of malicious websites or apps. [0125] Fig. 9 shows the detailed architecture of the system implementing the present invention according to another embodiment. [0126] [0127] Detailed description of the invention and some examples of realization [0128] [0129] FIG. 1 shows the architecture of a personal data control system of a user 100 of telecommunications networks according to an embodiment of the present invention. The system according to this embodiment comprises a user data control module 101, central element of the architecture of the system of the present invention, responsible for interacting with the rest of the components of the architecture as an orchestrator. Also, the system comprises a personal data bank for each user 100 and therefore user A will have a data bank 103A, user B will have a data bank 103B, and so on. These data banks 103 store the data generated by their respective users during the use of the telecommunications networks and the services offered by said telecommunications networks. [0130] [0131] Said data control module 101 is responsible for bi-directionally interacting with each user 100 and for making available the data stored in each data bank 103. Likewise, the data control module 101 allows the user 100 to manage the permissions. access to the data stored in its data bank 103 according to different levels of privacy established by the user 100 and depending on the potential consumer of the data 105 (see Fig. 2) and the purposes of said consumption. Each data bank 103 will allow access to the data stored by its respective user 100 to the user and, according to the access permissions established by the same, to the different data consumers 105. [0132] [0133] The human machine interface 110 between the data control module 101 and the user 100 can take different forms depending on the embodiment of the invention, the specific use case or the user preferences. The preferred embodiment of the invention implements this human machine interface in the most natural way possible according to the customs of the user 100, as for example by means of a messaging conversation between the user and a bot (conversational robot), since the users are used to interact with other users through such communications services. The data control module 101 can be seen by the user 100 as an alter ego that monitors the data stored therein and notifies it when it detects any anomalous effect, when it has a suggestion that may facilitate its life, or to which the user 100 can simply ask your questions about your communications activity and your digital life. [0134] [0135] Referring now to FIG. 2, another embodiment of a personal data control system of a user 100 of telecommunications networks is shown. In addition to the elements described above, in this example of embodiment the infrastructure of the operator 102 is also illustrated, which comprises all the classic assets of a telecommunications operator spread over the three levels previously described, that is, the first level with the assets 1021 operator physics, the second level with the IT systems of the operator 1022, and the third level with the value added products and services 1023. In these three levels of the operator infrastructure 102, the data related to user activity are generated. during the use of the telecommunications networks and of the services offered by said telecommunications networks, which through normalization and segmentation processes are dumped and stored in the data banks 103 of the different users. [0136] [0137] The personal data banks 103, not only store the data by themselves but also in a preferred embodiment of this invention also store the permissions granted by the corresponding users on the different data. However, an alternative embodiment of the invention contemplates the storage of these permits in an independent storage, which does not impact on the result obtained with the invention. [0138] Another integral component of the system of Fig. 2 is the repository of reward plans 104 that stores information about the different considerations that can be offered to 100 users in exchange for the transfer of their data. These rewards depend on several factors, such as, among others, the type of data and the degree of detail thereof, the particular consumer of the data, the purpose with which the data will be exploited or the user's consumption profile in the services of the operator and third parties. The rewards can be fixed or depend on an auction of the data among potential consumers and can take different forms, such as rebates on the invoice, additional services provided free of charge, discounts on new services, recommendations of services or contents or simply a presentation of information in a format that is easily consumable by the user and that adds value. [0139] [0140] On the other hand, in Fig. 2 there are also the aforementioned consumers of user data 105, which are the entities that have an interest in accessing the data of the users and putting them into value. Normally they are third parties, unrelated to the operator, although the operator can also take on this role in certain cases. The communication between the consumers 105 and the data control module 101 is carried out through interfaces (APIs) previously agreed between the parties 115. [0141] [0142] In addition to the data extracted from the operator infrastructure 102, the data bank 103 can retrieve data from external data sources 106 and store it together with the rest of the data. [0143] [0144] In addition to being able to interact with the data control module 101 in order to access the data and permissions stored in its data bank 103, the user 100 can also consult the considerations available for the sharing of his data, which are retrieved by the user. data control module 101 of the reward plan repository 104, filtered according to the characteristics of the user 100 and presented thereto. [0145] [0146] Fig. 9 constitutes the architecture of another embodiment of the present invention, in which the virtual assistant 200 is shown based on user data (hereinafter virtual assistant, for simplicity) as a macro-system that includes the module of data control 101 and which also constitutes a preferred consumer of the data of the user databank 103. The virtual assistant 200 comprises several subsystems among which, apart from the aforementioned data control module 101, the following stand out. The Natural Language Engine 201 is in charge of analyzing the data that have a natural language form, and specifically the user's interactions with the Virtual Assistant or other systems and services of the telecommunications operator or a third party, whether oral or written form. Also said engine is capable of generating texts to respond or notify the user when appropriate. On the other hand, the Cognitive Engine 202 is the one that brings intelligence to the virtual assistant 200, determining the context in which a user request is framed as well as the potential actions to be executed or proposed in its response. On the other hand, the Cognitive Engine 202 can determine the convenience of executing actions proactively, without any request from the user 100, but only an update of one or more data that are relevant to it. Any interaction of the virtual assistant 200 that requires a notification to the user is supported by the Notification Engine 203, which determines the best channel and moment in which to send it to the user. [0147] [0148] In Fig. 9, details of the interaction between the user 100 and the rest of the elements can also be observed. In effect every interaction is carried out through a device and a specific channel. The same user can have multiple devices, for example, a landline, a smart mobile phone (smartphone), a SmartTV and a PC. Multiple channels can be used in each device. For example, in a Smartphone it is possible to interact with the virtual assistant 200 by means of a voice call, through SMS messaging, through an application, etc. The user chooses a device and a channel for each interaction with each of the systems and services of the operator's infrastructure, as well as for each interaction with virtual assistant 200. For simplicity in the diagram it is assumed that user interactions 100 with the virtual assistant 200 as with the data control module 101 are made through the operator infrastructure 102. [0149] [0150] The personal data bank 103 defines the individualized context for each of the users of the system. Unlike other systems of the state of the art, the data bank 103 of this system uses a single information structure to store all that information relative to the context that applies to a user in the system. That is, it brings together all the information that could be applied to a user, whether it was generated by the user during their interaction with the network, services and with the virtual assistant 200 itself, or whether it is information not generated by the user. own user, but that could be relevant. Thus, this data bank 103 facilitates, in a uniform way, a holistic vision of each user structured from the information that the system is able to dispose on it. [0151] [0152] When the user 100 interacts with the virtual assistant 200 it is possible to recover his profile immediately, and incorporate it into the processes of natural language analysis and determination of the action plan necessary to generate the response. If it is necessary to recover the detail of any of the relationships registered in the data bank 103 to complete any of these processes it will always be possible to take advantage of the high availability of system data to access the information. [0153] [0154] Among the information that is stored in the databank 103, the information relating to those entities that have a semantic character for the telecommunication operator stands out, for example, users of the network and its services or devices of said users, as well as the relationships and interactions between all these entities. This implies that every time an event occurs in the system, in any of the platforms and levels that structure it, the information of the event is recorded in the data bank 103 and additionally the relationship between the entities that take part in it is recorded. said event. In this way, it is possible to extract a complete profile of each user from the system. [0155] [0156] The information stored by the data bank 103 also includes that corresponding to the interaction with the virtual assistant 200. Since said system facilitates the interaction based on natural language, the system also allows the location of entities and relationships between them starting from of language analysis. In this way, the more the richer user interacts, the more the profile that allows them to model their presence in the system and the better adapted will be the experience for that interaction. [0157] [0158] The virtual assistant 200 presents two levels of contextualization. The first one is derived from the analysis of all the entities present in the profile of each user. This allows to know who this user is for the organization that offers the Virtual Assistant service and which domains apply to the process of personalization and contextualization. For example, in the case that the virtual assistant 200 is offered by a telecommunications operator, this first level of personalization would include the services contracted by the user 100. In the event that the user 100 had contracted the television service, the domain of audiovisual services would be active for said user 100. Said domain will include a catalog of various possible requests by the user 100 (request of the video catalog on demand, request for recommendations, etc.) as well as a set of possible actions. The network management domain will be active for those users that have contracted a network service (eg fixed broadband) and will contemplate another catalog different from possible user requests (guest WiFi network management, network diagnosis, etc.). ) as well as possible actions (for example creation of guest Wi-Fi and question the user of the desired password). [0159] The second level of context management of virtual assistant 200 is based on the detailed data itself. In this second level, in turn, it is possible to establish two types of data that apply to the context: on the one hand, there is the detail of all the relationships that are collected in the data bank 103. For example the call records that the user 100 has effected another user B, when they occurred and from which geographical locations. This information determines a context in which the interaction of the user 100 and the other user B takes place and can be used to infer knowledge of the user's activity 100 and adapt the responses to their needs. Another example would be the interaction of the user 100 with his TV decoder, which provides more information about the user 100. On the other hand, it is also possible to recover the instant context of the interaction, which gives information of what aspects surround the same. This type of information can be retrieved directly from the channel that the user 100 uses to perform this interaction and can be data collected directly by the device used to implement this channel, such as the software that allows defining the interface that said device offers the user 100. An example is that the user 100 contacts the virtual assistant 200 from his Smartphone, but from the information extracted from said device, for example "only device connected to the home WiFi" as well as from the "decoder" of the "decoder on TV" and showing series catalog ", thus enriching the immediate context of the user 100, which facilitates estimating the real intention of the user 100 in his request, as well as determining the best action to be taken against it. Therefore, this context-enriched information will not only allow the response to the user 100 to be adapted, but also to the specific circumstances in which the user 100 is present when said interaction occurs. [0160] [0161] On the other hand, the system of the present invention uses the context not only to determine in the most reliable way possible the intention of the user 100 (concept known in English as "user intent") but also, once said intention is determined, to determine The series of actions to be carried out is more optimal, so the context information is injected into the system in two points, first in the process of identifying the user's intention, and secondly in the determination of actions associated with a The system therefore recognizes that the same intention on the part of the user 100 may entail a different set of actions depending on the specific context. [0162] [0163] It is important to note that the system allows users to provide a personalized and contextual experience not only when the interaction is initiated by the users. The system contemplates that, after an event occurs in any of the infrastructures, systems or services of the operator and / or of the organization that provides the virtual assistant 200, the system allows to manage a notification that initiates the interaction with the users. The data bank 103 contains all the information necessary to determine if the change of conditions really affects the user 100 and will collect the configuration of notifications desired by the user 100 to send them through the most appropriate channels among those available. [0164] [0165] Referring now to Fig. 3, this shows a flow chart of a preferred implementation of the method of the present invention. In a first step, the data bank 103 feeds data from the infrastructure of the operator 102. Although the figure has been represented as a specific event, in reality it is a continuous process over time. The generation of data is continuous and its transfer to the data bank 103 must be also, either in real time when the data is generated or in batches. The data bank 103 may also retrieve information from external data sources 106 on a periodic basis or upon request when necessary for a particular action. [0166] [0167] At a certain time, the user 100 decides to consult the information available in his data bank 103 and the reward plans available if he agrees to share them. For this, it interacts with the data control module 101, which retrieves information from both the databank 103 and the reward plan repository 104 and supplies it to the user 100. The user 100 analyzes it and decides to share a subset of its data. with a third part. For this, it informs the data control module 101, which is responsible for storing the permissions in the data bank 103 and for notifying the authorized data consumer 105. This 105 requests data at a later time through the data control module 101, which interacts with the data bank 103 to verify that the consumer 105 has the necessary permits and retrieves said data, which are then transferred to the consumer 105 authorized. Next, the data control module 101 requests the infrastructure of the operator 102 to apply the corresponding reward plan. [0168] [0169] It should be noted that Fig. 3 can be modified in a simple manner to adapt to the architecture of the embodiment of Fig. 9, replacing the data control module 101 by the virtual assistant 200, since in said embodiment the module tasks Data control 101 is assumed by virtual assistant 200. The same applies to the scenarios represented in figures 4, 5, 6, 7 and 8. [0170] Referring now to Fig. 4, this shows a scenario complementary to the previous one (Fig. 3) in which the communication does not arise spontaneously from the client 100 but rather it is the data control module 101 that contacts proactively with the client 100 and start the process. The first steps of this flow relative to the data communication from the infrastructure of the operator 102 and external data sources 106 to the data bank 103 coincide with those of Fig. 3. However, below is the databank 103 which sends a warning to the data control module 101 indicating that a certain data has been updated and meets a pre-established criterion, for example the consumption of mobile data has exceeded a certain threshold. The data control module 101 notifies the user 100, which then requests the data control module 101 detailed information about the notified event, which retrieves it from the data bank 103 and makes it available to the user 100. This Additional information can be, in the case of the previous example, information on data consumption by the different apps installed on the phone and a proposal of corrective measures, such as the uninstallation of specific applications. The user 100 decides to carry out an action, for example expanding his data bonus or requesting the uninstallation of the high consumption app, which communicates to the data control module 101, which interacts with the infrastructure of the operator 102 to execute it. . The operator infrastructure 102 communicates the result of the action to the data control module 101, which is passed to the user 100. [0171] [0172] There are different variations in the implementation of the method of the invention that allow to comply with the object of the same. Also, different specific problems can be solved thanks to the present invention, by selecting and combining a specific set of input data and applying a series of actions as a result of the analysis of said data. The most relevant embodiments of the invention are described below. [0173] [0174] Creation and exploitation of a user profile: [0175] [0176] Each user 100 generates a multitude of data during their interaction with the telecommunications network and services. Much of the events generated by the user 100, especially through the use of their smart mobile phone, are geolocated events. This is due to the ability of the mobile network to locate each terminal that connects to it, based on the location of the base stations of the mobile network near the user terminal and techniques such as triangulation. Additionally another type of information, such as web pages visited, applications used or the audiovisual content consumed, help to develop a user profile that shapes the interests and preferences of the user. This profile thus contains not only raw information obtained from the user's interactions 100, but also processed information obtained by crossing different data collected on the user 100 and even crossing it with external data sources 106. For example, the data of location in the different days of the week and time segments can be used to determine the address, the place of work of the user and how it moves from one to another. Additionally, this information can be crossed with the public data of the Cadastre and thus determine the typology of the dwelling in which the user lives 100. It is convenient to emphasize that the ultimate purpose of the present invention is to maintain the privacy of the user 100 to the extent that the user 100 himself is interested, and therefore none of this information is provided without the express permission of the user 100. [0177] [0178] This user profile is highly valued by different actors, such as mediators of advertising services, which, by having this information, can sell advertising spaces more targeted to each type of user, achieving a higher rate of conversions in accesses (click -through-rate) or purchases (sell-through-rate), which allows them to charge higher prices for them. [0179] [0180] The present invention allows the user 100 to control what information of their profile is supplied and to which specific actors. Also part of the benefits obtained by the enhancement of your profile can be reverted to the user 100. [0181] [0182] This embodiment corresponds to that described in Fig. 3. Alternatively to the proactive query by the user 100, the data control module 101 may be the one directed to the user 100 in the first instance informing him of the personal profile stored in his data bank 103 and the possible rewards for sharing it. [0183] [0184] Checking the status of the WiFi network and optimizing it: [0185] [0186] In a following embodiment, the present invention is used by the user 100 to connect and subsequently check the status of his home WiFi network and to optimize it. In the first place, the user decides to request that the WiFi network of his house be turned on. The virtual assistant 200 offers the option to perform this interaction using multiple channels and among other options using natural language. However, a uniform experience can be offered in terms of how to make requests and obtain the answers. The user 100 can for example open a specific application of virtual assistant 200 in Your Smartphone and say "Turn on the Internet." The system, based on the information collected in the User's Databank 103, determines in a first level of personalization who is the requesting user and who has contracted a package with telephony and fixed broadband and telephony and mobile broadband In a second level of personalization, the immediate context is detected, which comprises the channel through which the request is made, the location of the user 100, who is in his home, the state of his connection of data to the mobile network, which is activated.From all this context information the system will deduce that the intention of the user 100 is to activate the domestic WiFi.For this, and again based on the information available in the Bank of Data 103, generates an action plan that allows interacting with the communications infrastructure that has been contracted by user 100 and enabling access to the Internet through its W router. iFi. [0187] [0188] As can be seen in Fig. 5, the user can subsequently detect a poor data connection through the WiFi connection and initiate an additional interaction with the data control module 101. In this case the interaction is initiated by the user 100 by messaging, using natural language, with the data control module 101. This accesses the data bank 103, which either already contains data of the Wi-Fi connection of the user 100, which has been previously stored or alternatively retrieves this information from dynamic form of the WiFi router of the user 100 and / or of a database with the history of this information (alternative represented in the figure). The data control module 101 communicates the information available to the user 100, including the number of connected devices, as well as the typology of each one. Likewise, the data control module 101 indicates that one of the connected devices could not be from the user 100 itself. For each device, the bandwidth consumed is determined and it is determined which of them is causing the connection to deteriorate. Based on context information, which includes which devices belong to the user 100 or relatives and are usually connected to the home network, the data control module 101 (the Cognitive Engine of the virtual assistant according to Fig. 9) can determine that a device, external to the scope of user 100, is the one that is causing these problems. Faced with this fact, the data control module 101 can present various actions to the user 100, among which is the option to disconnect said device. The user 100 may decide to expel it from its infrastructure by giving an order to the data control module 101, which will transmit it to the network systems that control the router. This case is an example of the bidirectionality of the present invention that on the one hand facilitates a form adapted to the needs of the user 100 information related to technical aspects related to the services that it has contracted and on the other one allows the user 100 to interact in a transparent and very usable way with the systems that support these services. [0189] [0190] Additionally, the detection of an intrusive device in the domestic WiFi network can be carried out by the system without a prior request from the user 100. From the information that is collected in the user's databank 103, the system can establish which devices are related to a specific user and with a router. When the system detects that an unexpected device has been connected to the WiFi of the client's address, it can generate an event with this fact that would result in a notification. This notification could be sent to the user 100 by the channel he expects or wishes, informing him of the presence of this unexpected device and proactively suggesting which lines of action can be followed from this point (eg block the device, allow the connection, transfer to a guest WIFI, etc.). The system can make use of an enriched context information determining to whom the device connected unexpectedly belongs to the WiFi and cross it with the call and messaging register of the user 100. In case it is detected that the device belongs to a contact With the usual user 100, an action can be predetermined (eg allow connection) over the rest or it can be decided that it is not necessary to notify the user 100, based on his preferences. [0191] [0192] Additionally, the system can evaluate if a leak of personal information is taking place through the router. For this it is necessary to add to the evaluation of which devices are connected, the analysis of the traffic they generate to deduce to what extent a leak of sensitive information is taking place. This traffic analysis can be carried out by the router which could register in the data bank 103 the relevant information obtained in the analysis. The system generates notifications when pertinent, which are sent to the user 100 according to the scheme described above. These notifications can inform about the device and specific applications, of all those installed by the user 100 on these devices, which are causing the information to leak. [0193] [0194] In all these cases, it is the user 100, as previously mentioned, who maintains control over the sources of information that can be used to give functionality to a specific purpose. [0195] Ad management on the mobile device: [0196] [0197] In a further embodiment, represented in FIG. 6, the user 100 becomes aware of the somewhat intrusive publicity that he receives in aggregate form with the websites he visits, consumes part of his data rate and introduces delays that They deteriorate your user experience when browsing. Then he decides to interact with the data control module 101 to check the extent of the problem and see if there is a solution for it. The data control module 101 queries this information to the data bank 103, which is constantly updated with detailed parameters relating to the navigation of the user 100. The data control module 101 tells the user 100 the amount of data that have been consumed in the current billing period due to the announcements, which constitute a non-negligible part of the data voucher hired by the user 100. Likewise, the data control module 101 informs the user 100, that the query of cookies and download of ads is delaying the presentation of the web pages visited by a certain amount of time, resulting in a degradation of the service perceived by the user 100. The data control module 101 reports a value-added service provided by the own operator that can activate the user 100 and that would solve the problem, eliminating annoying advertising and accelerating navigation. The user 100 requests the activation of the service, which triggers the data control module 101 to request the infrastructure of the operator 102 to implement this service, immediately improving the user experience as a consumer of the services provided by the operator. of telecommunications. [0198] Follow-up blocking (anti-tracking) and anonymous online purchase: [0199] [0200] In another embodiment, the user 100 detects the risk regarding the privacy of his personal data when accessing certain web contents and requests the data control module 101 to ensure his privacy, activating the anonymous browsing. The data control module 101 requests the infrastructure of the operator 102 to activate an anti-tracking system and provides the user with 100 indications so that he correctly configures the browser he is using to access the Internet. Additionally, user 100 may request information from websites that allow anonymous access with a specific scope (e.g., e-commerce). From the data control module 101, a list of websites that integrate technology that allows access (login) is provided by providing only the telephone number. This technology is a value-added service (level 3) but in which the SIM (level 1) plays a critical role, since it works through a challenge sent to the mobile terminal of the user 100, which once accepted and validated guarantees access to the services, preferably websites, that incorporate this authentication technology. These services may request certain information relating to the user 100 for the adaptation of the commercial offer. As a result the data control module 101 proactively interacts with the user 100 to ask him whether he grants that certain information (eg, gender, age and TV profile) is accessible by the website on which he has authenticated himself. In this way, the user 100 is granted the possibility of controlling what information is accessed by whom and opens the possibility of building services in which the user 100 can benefit from the sharing of personal information. [0201] [0202] Parental control system with detection of malicious websites or apps: [0203] [0204] In a further embodiment, the user 100 contacts the data control module 101 to activate a parental control service on the device that his son handles, requesting a report of any suspicious situation or activity. For this, the data control module 101 requests an identification of the applications that the user 100 has active and of the webs he visits. In order to be able to deduce from the network the applications used by the user 100, it is necessary to have a footprint of the different applications, for example, by crossing the data defining the mobile applications with the data stored on the HTTP traffic and the DNS queries. In a first approximation, if an application, during its execution in the terminal, connects to a specific URL, and it turns out that this URL appears univocally related to a single application of the application catalog ( marketplace ); then if the traffic data of a specific terminal contains said URL it would be possible to deduce that this terminal has installed said application. Once the applications used by the user's son 100 are identified, they are crossed with a database (internal or external) that characterizes the applications, indicating if it is malware or the age range for which they are recommended. In the event that a non-recommendable situation is identified, the data control module 101 would proactively notify the user 100, proposing corrective measures, such as the uninstallation of the conflicting applications. Once confirmed by the user 100, the corresponding request is sent to the infrastructure of the operator 102, which either executes it directly or gives the precise instructions for the user 100 to do it. [0205] [0206] A person skilled in the art could introduce changes and modifications to the described embodiments without departing from the scope of the invention as defined in the appended claims.
权利要求:
Claims (22) [1] 1. Personal data control system and optimization of a network connection of a user of telecommunications networks, comprising: - a data bank (103) associated with a user (100) of telecommunications networks adapted and configured to store data generated by the user (100) during the use of the telecommunications networks and of the services offered by said telecommunications networks , and to store data obtained from information sources external to the telecommunications network, not generated by the user (100); - a data control module (101); Y - a virtual assistant (200) including said data control module (101), and which is operatively connected to the data bank (103) to access the data stored by the latter, wherein said virtual assistant (200 ) maintains a contextualized interaction of said stored data by: a) a determination of the contextual domains that apply to the user (100) based on the analysis of entities associated with the user (100) including contracted services, devices and / or contacts with which he interacts; b) a contextualization of the domain based on historical data of user activity (100) collected from the interaction of the user (100) with the telecommunications network and with the services of a telecommunications operator; c) a contextualization of the domain based on the history of other data relevant to the user (100) but not related to its activity; d) a contextualization of the domain based on immediate context data that characterize a current situation of the user (100); Y e) a determination of the intention of the user (100) based on the contextualization of the previous steps and a request of the user (100); the system being characterized in that: - the data control module (101) is adapted and configured to make available to the user (100) the data stored in the data bank (103) and to allow the user (100) to manage the access permissions on the data stored in the data bank (103) according to different levels of privacy established by the user (100) and depending on the potential consumer of the data (105) and the purposes of said consumption, wherein the data bank (103) allows said consumer of the data (105) access to the data stored by the user (100) according to the access permissions established by the user (100); - said contextual domains comprise at least one audiovisual services domain and one network management domain; and because: - the virtual assistant (200) is adapted and configured to perform an optimization of a user's network connection (100) by performing the following steps: ■ determination that the user (100) has contracted at least one network service and therefore applies the context domain of network management; ■ Contextualization of the network management domain based on historical user activity data (100) comprising its call record and user messaging (100); ■ determination that a new device has been connected to the user network (100); Y ■ determination of whether the device belongs to a user's usual contact (100), by crossing said user's call record and messaging (100), and if so allowing the connection. [2] System according to claim 1, characterized in that the virtual assistant (200) is also adapted and configured to receive a request from the user (100) to determine the cause of a poor network connection, and to perform an optimization of a connection of the user network (100) by performing the following steps: or determining the devices connected to the user's network (100) and to whom they belong; or determining the bandwidth consumed by said devices connected to the user's network (100); Y or disconnection of the user's infrastructure (100) from at least one of said connected devices when the device is external to the scope of the user (100) and is causing a deterioration of the connection, wherein said disconnection is made upon presentation of different options of action to the user (100), one of them being the option to disconnect said device and upon receipt, by the virtual assistant (200), of an order by the user (100). [3] System according to claim 1, characterized in that the network connection comprises a WiFi connection. [4] System according to claim 2, characterized in that said request of the user (100) is performed in natural language. [5] System according to claim 1, characterized in that the data not generated by the user (100) comprise environmental data and / or context data. [6] System according to claim 1, characterized in that it also comprises a reward plan repository (104) adapted and configured to store information about different considerations offered to the user (100) in exchange for modifying said levels of privacy, in wherein said counter-benefits are offered to the user (100) through the data control module (101). [7] System according to claim 6, characterized in that the considerations depend at least on the type of data, on the particular consumer (105) of the data with respect to which the privacy levels are modified and on the purpose with which the data will be exploited by said consumer (105). [8] System according to claim 1, characterized in that said data come from a set of data warehouses associated with a variety of elements of the telecommunications networks and elements necessary to offer services on said telecommunications networks, which store the data for purposes associated with the provision of services. [9] 9. Method of control of personal data and optimization of a network connection of a user of telecommunications networks, the method comprises: - storing in a data bank (103) associated with a user (100) data generated by the user (100) during the use of telecommunications networks and of the services offered by said telecommunications networks and data obtained from external information sources to the telecommunications network, not generated by the user (100); Y - access, by a virtual assistant (200), which includes a data control module (101), the data stored by the data bank (103) and maintain a contextualized interaction of the stored data by: a) a determination of the contextual domains that apply to the user (100) based on the analysis of entities associated with the user (100) including contracted services, devices and / or contacts with which he interacts; b) a contextualization of the domain based on historical data of user activity (100) collected from the interaction of the user (100) with the telecommunications network and with the services of a telecommunications operator; c) a contextualization of the domain based on the history of other data relevant to the user (100) but not related to its activity; d) a contextualization of the domain based on immediate context data that characterize a current situation of the user (100); Y e) a determination of the intention of the user (100) based on the contextualization of the previous steps and a request of the user (100); the method being characterized in that: - the data control module (101) makes available to the user (100) the data stored in the data bank (103) and allows the user (100) to manage the access permissions on the data stored in the data bank. data (103) according to different levels of privacy established by the user (100) and depending on the potential consumer of the data (105) and the purposes of said consumption, and allows the consumer of the data (105) to access to the data stored in the data bank (103) according to the established access permissions; - the contextual domains comprise at least one audiovisual services domain and one network management domain; and because - the virtual assistant (20) also performs an optimization of a network connection of the user (100) by performing the following steps: ■ determination that the user (100) has contracted at least one network service and therefore applies the context domain of network management; ■ Contextualization of the network management domain based on historical user activity data (100) comprising its call record and user messaging (100); ■ determination that a new device has been connected to the user network (100); Y ■ determination of whether the device belongs to a user's usual contact (100), by crossing said user's call record and messaging (100), and if so allowing the connection. [10] Method according to claim 9, characterized in that the virtual assistant (200) prior to determining whether the device belongs to a user's usual contact (100) suggests the user (100) to take an action of at least the following : i) block the device; ii) allow the connection; or iii) move the device to a WiFi guest network. [11] Method according to claim 9, characterized in that the virtual assistant (200) also receives a request from the user (100) to determine the cause of a poor network connection, and performs an optimization of a user's network connection ( 100) by performing the following steps: - determination of the devices connected to the user's network (100) and to whom they belong; - determination of the bandwidth consumed by said devices connected to the user's network (100); Y - disconnection of the user's infrastructure (100) from at least one of said connected devices when the device is external to the user's domain (100) and is causing a deterioration of the connection, where said disconnection is made upon presentation of different options of action to the user (100), one of them being the option to disconnect said device and upon receipt, by the virtual assistant (200), of an order by the user (100). [12] The method according to claim 9, characterized in that the user's network connection (100) comprises a WiFi connection and that the virtual assistant (200) prior to performing said optimization of the network connection of the user (100) active the network of the user (100) by performing the following steps: - receiving a request from the user (100) to turn on the user's network (100); - determination that the network services contracted by the user (100) include fixed broadband and mobile broadband; - determination of immediate context data comprising the channel through which the request is made, the location of the user (100) and a status of his mobile network; - determination that the intention of the user (100) is to activate his home network when said immediate context data determine that the user is at home and that the mobile network is activated; Y - enabled Internet access through an interaction with the communications infrastructure that the user has contracted (100). [13] Method according to claim 9, characterized in that the virtual assistant (200) additionally performs a detection of malicious applications on a device that manages a user controlled by the user (100) by performing the following steps: - receiving a request from the user (100) to activate a parental control service; - identification of the applications that said user controlled by the user (100) has active and of the webs he visits based on data stored on HTTP traffic and DNS queries; - determination of a situation that is not advisable if at least one application of said identified applications is characterized as malware or based on the age range for which said application is recommended; Y - uninstall the application after presenting the user (100) with different corrective options, one of them being said uninstall option, and previous confirmation by the user (100). [14] Method according to claim 9, characterized in that the request of the user (100) is made in natural language. [15] Method according to claim 9, characterized in that the data not generated by the user (100) comprise environmental data and / or context data. [16] Method according to claim 9, characterized in that it also comprises offering the user (100), through the data control module (101), different compensation in exchange for modifying said privacy levels. [17] Method according to claim 16, characterized in that the considerations depend at least on the type of data, on the particular consumer of the data (105) with respect to which the levels of privacy are modified and the purpose with which the data will be exploited by said consumer (105). [18] Method according to claim 9 or 17, characterized in that said data come from a set of data warehouses associated with a variety of elements of the telecommunications networks and elements necessary to offer services on said telecommunications networks, which store data for purposes associated with the provision of services. [19] Method according to any one of the preceding claims 9 to 18, characterized in that it comprises generating a user profile from the data generated by the user (100) during the use of the telecommunications networks and the services offered by the same. [20] The method according to claim 19, characterized in that the user profile includes derived information, obtained from two or more of said user data (100). [21] The method according to claim 19 or 20, characterized in that the user profile also includes derived information, obtained from user data (100) and data from external sources (106). [22] Method according to claim 19, 20 or 21, characterized in that the user profile is shared with a data consumer (105), based on the access permissions established by the user (100) himself.
类似技术:
公开号 | 公开日 | 专利标题 US10250757B2|2019-04-02|Method, computer program, and algorithm for computing network service value pricing based on communication service experiences delivered to consumers and merchants over a smart multi-services | communication network KR102271786B1|2021-06-30|Accelerated training of personal daemons US20120246065A1|2012-09-27|Techniques for offering context to service providers utilizing incentives US9842228B2|2017-12-12|Local personal daemon US9760401B2|2017-09-12|Incentive-based app execution Bilogrevic et al.2013|Adaptive information-sharing for privacy-aware mobile social networks US20110246213A1|2011-10-06|Techniques for offering context to service providers utilizing an approval service and incentives utlizing online secure profile storage US20110247030A1|2011-10-06|Incentives based techniques for offering context to service providers utilizing syncronizing profile stores US20110246283A1|2011-10-06|Approval service based techniques for offering context to service providers utilizing incentives ES2703457A2|2019-03-08|System and method for controlling personal data of a user of telecommunications networks US10404628B2|2019-09-03|Systems and methods for providing requested user information to a validated user US20150373144A1|2015-12-24|Personal Daemon Interaction through Escalating Disclosure CA3111374A1|2020-03-12|A system and method for the creation, management, and delivery of personal packets of information to be utilized as reverse cookies within network-based environments
同族专利:
公开号 | 公开日 ES2703457R1|2020-03-04| WO2018024933A1|2018-02-08| EP3447671A4|2020-03-04| WO2018024922A1|2018-02-08| BR112019002220A2|2019-05-14| WO2018024933A9|2018-05-11| AR109219A1|2018-11-07| EP3447671A1|2019-02-27|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US6275824B1|1998-10-02|2001-08-14|Ncr Corporation|System and method for managing data privacy in a database management system| CN1182973C|1998-11-27|2005-01-05|精工爱普生株式会社|Tape cartridge holding mechanism and tape printer having the same| ES2337437B8|2008-10-22|2011-08-02|Telefonica S.A.|S NETWORK INSURANCE BASED ON CONTEXTOPROCEDIMENT AND SYSTEM TO CONTROL WIRELESS ACCESS TO RESOURCE.| US9858925B2|2009-06-05|2018-01-02|Apple Inc.|Using context information to facilitate processing of commands in a virtual assistant| US8612891B2|2010-02-16|2013-12-17|Yahoo! Inc.|System and method for rewarding a user for sharing activity information with a third party| US20140149562A1|2012-11-29|2014-05-29|Verizon Patent And Licensing Inc.|Method and system for providing user-based bandwidth management| US9111214B1|2014-01-30|2015-08-18|Vishal Sharma|Virtual assistant system to remotely control external services and selectively share control| US9854057B2|2014-05-06|2017-12-26|International Business Machines Corporation|Network data collection and response system| EP3150011A4|2014-05-29|2017-12-20|Starting Communication Network Technology Co., Ltd|Wifi gateway control and interface| US10904261B2|2014-10-23|2021-01-26|Dele Atanda|Intelligent personal information management system|EP3869371A1|2020-02-18|2021-08-25|Mastercard International Incorporated|Data consent manager|
法律状态:
2019-03-08| BA2A| Patent application published|Ref document number: 2703457 Country of ref document: ES Kind code of ref document: A2 Effective date: 20190308 | 2020-03-04| EC2A| Search report published|Ref document number: 2703457 Country of ref document: ES Kind code of ref document: R1 Effective date: 20200226 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 PCT/ES2016/070591|WO2018024922A1|2016-08-05|2016-08-05|System and method for controlling personal data of a user of telecommunications networks| PCT/ES2017/070560|WO2018024933A1|2016-08-05|2017-07-31|System and method for controlling personal data of a user of telecommunications networks| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|