1. Human recognition and identification |
|
- Face recognition
- Biometrics (DNA, fingerprints, iris, gait)
|
- Face de-identification [ref]
- Self-controlling data
|
|
2. Ubiquitous video |
|
- Video Surveillance
- Ubiquitous Networks (Sensors)
|
- Video abstraction: Video Footprinter, Video Blobber, Video Counting and Reporting Behaviors
|
|
3. Ubiquitous data sharing |
|
- Semantic Web
- Data Mining (person-specific patterns)
- Bio-Terrorism Surveillance
|
- CertBox (“Privacy Appliance”)
- Reasonable Cause (“Selective Revelation”)
- Distributed Surveillance
- Privacy and Context Awareness ("eWallet")
- Data Valuation by Simulation
- Roster Collocation Networks [ref]
|
|
4. Information capturing tools |
|
- Professional Assistants (“RADAR”)
- Personal Diary (“Lifelog,” “Informedia”)
- Speech recognition
|
- Video and Sound Opt-Out
- Text Anonymizer [ref]
- Privacy Agent
|
|
5. Positioning technology |
|
- E911 Mobile Phones
- IR Tags
- GPS
|
- Blocking devices
- Point location query restriction
|
|
6. Personal care |
|
- Personal Robots
- Intelligent Spaces
- CareMedia
|
- Face de-identification [ref]
(see 1)
- Video Footprinter (see 2)
- Video Blobber (see 2)
- Video Counting and Reporting Behaviors (see 2)
- Video and Sound Opt-Out (see 4)
- Reconcile Privacy and Context Awareness (see 3)
- Privacy Agent (see 4)
|