Techniques for managing activity logs in a manner that promotes user privacy
Assignee
Apple Inc.
Inventors
Benjamin S. Turner, Andreas I. Gal, Keith W. Rauenbuehler
Abstract
Disclosed herein are techniques for managing activity logs in a manner that promotes user privacy. One technique can by implemented by a centralized management hub, and include the steps of (1) receiving, from a peripheral device, information about activity detected by the peripheral device, where the information includes at least one activity tag, (2) identifying a hash function, (3) providing the at least one activity tag to the hash function to generate at least one hash value, (4) encrypting, using an encryption key that is accessible to the centralized management hub, at least a subset of the information to produce encrypted information, and (5) causing a server device to store, in an activity log associated with the centralized management hub, an activity log entry that includes: a timestamp corresponding to a time at which the activity log entry is stored, the at least one hash value, and the encrypted information.
CPC Classifications
Filing Date
2023-11-17
Application No.
18513304
Claims
24