Search

BR-102024018246-A2 - SYSTEM FOR DEVELOPING SOLUTIONS WITH A BUILT-IN SECURITY STRUCTURE

BR102024018246A2BR 102024018246 A2BR102024018246 A2BR 102024018246A2BR-102024018246-A2

Abstract

The system according to the present invention was developed by a multidisciplinary team with the aim of creating a system that promotes quality in all aspects of a product, using tools such as competitor product analysis, product impact analysis, and data analysis. Furthermore, the system according to the present application inaugurates a concrete application of privacy by design. Privacy by design is a methodology that modifies the approach to data protection, based on the principle that protection and privacy tools should be proactive, not reactive. The method presents 7 principles: proactive approach, comprehensive data protection, privacy-focused design, minimal data collection, end-to-end security, transparency, and respect for the user. Thus, the system according to the present application updates the logic of protection and privacy, especially in software development. It is worth highlighting that the state of the art, as demonstrated in the previous section, still treats data protection in software in a way that consists of developing new functionalities after the product is completed, whereas the system according to the present invention delivers a final solution with principles and functionalities already embedded that protect all instances of the process.

Inventors

  • RAUL SIDNEI WAZLAWICK
  • EDUARDO MONGUILHOTT DALMARCO
  • JADES FERNANDO HAMMES
  • Lucas Alves
  • ALINE EFFTING GUEDES
  • ÁLVARO EMÍLIO PRÜSSE
  • BRUNA SUDOSKI
  • CÉLIO LUIZ CUNHA
  • GABRIEL NORDE SANTOS
  • MILIANE DOS SANTOS FANTONELLI
  • FABIANA MAGARROTE FERNANDES DE MELO
  • BIANCA NOCETI
  • AMANDA MARTINS OLIVEIRA
  • FLÁVIA AMIN BARBOSA
  • IANKA CRISTINA CELUPPI
  • ISIS GUALDI VASCONCELOS DA SILVA
  • GABRIEL HOLDENER GERALDELI

Assignees

  • UNIVERSIDADE FEDERAL DE SANTA CATARINA

Dates

Publication Date
20260317
Application Date
20240904

Claims (3)

  1. 1. A system based on design thinking for building technological innovation solutions, supported by the Privacy by Design model, characterized by the fact that it comprises a discovery module and a delivery module.
  2. 2. System, according to claim 1, characterized in that the discovery module comprises the following steps: - Orientation; - Immersion; - Definition; - Ideation; - Prototyping of ideas; and - Validation of ideas.
  3. 3. System, according to claim 1, characterized in that the delivery module comprises the following steps: - Delimitation; - Refinement; - Iteration (Sprint); - Delivery evaluation; and - Continuous improvement.

Description

FIELD OF THE INVENTION [01] The present invention discloses a new design thinking methodology for product development, especially software, with an incorporated privacy by design security element. Design Thinking is a methodology for developing products and services focused on the needs, desires, and limitations of users. BACKGROUND OF THE INVENTION [02] In an increasingly digitalized and connected world that demands quick responses and assertive decision-making, the state of the art is increasingly turning to the field of adaptive and evolutionary solutions, which typically involve a process of combining hardware and software to build a collaborative system. [03] In this sense, design thinking is a tool used to solve problems in the development or improvement of a product, based on encouraging creativity. This concept was originally conceived with four stages: immersion, with the objective of understanding the context of the work, ideation, which encourages creativity, prototyping or testing phase and product development, however, there are already other methodologies for applying design thinking on the market. [04] For example, document BR102017027921 reveals a process that integrates design thinking into business models, seeking to improve results, reducing costs and development time of an innovation process. In this way, the process is presented seeking to identify operational requirements for the development of a business model for a startup. Furthermore, the activities and requirements are sequenced and connected in such a way that the outputs of one activity serve as inputs for the other activity. [05] Document CN106228369 reveals a product design and system innovation method based on the concept of design thinking. The method comprises the following steps: S1 after receiving product design requirements from clients, establish a product design project group, hold a meeting, negotiate with clients, understand the detailed conditions of the clients' product and create a design scheme; S2 investigate the consumer market for the products, understand the performance of the products required by clients and the shortcomings of the products that need improvement, organize the research data and print it in books; S3 hold another design meeting and improve the products according to the clients' demands using the research data. The invention method takes service design thinking as its initial origin and prioritizes user experiences in product design. [06] It is worth highlighting that another concern in this field of application, and in the digital world in general, is data security. [07] The so-called privacy by design is a methodology that modifies the approach to data protection, based on the principle that protection and privacy tools should be proactive and not reactive. The method presents 7 principles: proactive approach, comprehensive data protection, privacy-focused design, minimal data collection, end-to-end security, transparency, and respect for the user. It is present in the state of the art, for example, in document US2022067204, which provides a system architecture for designing and monitoring privacy-sensitive services and improving compliance with privacy regulations. In this document, a Privacy Preservation Knowledge Graph (PPKG) system provides functionality for modeling and analyzing processes that use, share, or request sensitive user data, and the results of such functionality can be used to modify the design of the processes (e.g., to improve process security, regulatory compliance, and similar). The PPKG system can also be used to modify the process, such as writing code that can be compiled into executable format and deployed in a runtime environment. A Privacy Preserving Posture (PPP) system monitors the runtime environment and analyzes where processes obtain, store, and share sensitive data. The PPP system can identify runtime vulnerabilities that may pose risks with respect to sensitive data, as well as areas where modifications can be made to improve regulatory compliance. [08] It is clear, in the state of the art, that there is a demand for increasingly personalized and secure solutions that make a user's life easier. SUMMARY OF THE INVENTION [09] The system according to the present invention was developed by a multidisciplinary team, with the objective of creating a system that promotes quality in all aspects of a product, using tools beyond those already mentioned, such as competitor product analysis, product impact analysis, and data analysis. Furthermore, the system according to the present application inaugurates a concrete application of privacy by design, which, being a broad concept, lacks a defined application methodology. Thus, the system according to the present application updates the logic of protection and privacy, especially in software development. It is worth highlighting that the state of the art, as demonstrated in the previous section, still treats data protecti