Dual blind method and system for attributing activity to a user
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-015/16
G06F-021/62
출원번호
US-0366489
(2012-02-06)
등록번호
US-9037637
(2015-05-19)
발명자
/ 주소
Jaye, Daniel
Secretan, James Q.
출원인 / 주소
J.D. Power and Associates
대리인 / 주소
Rothwell, Figg, Ernst & Manbeck PC
인용정보
피인용 횟수 :
2인용 특허 :
236
초록▼
A method and system for attributing activity to a user includes sharing information with an analytics server while attributes and a user profile cannot be tracked back to the original user from the analytics server. A temporary ID included in the shared information is destroyed, thus eliminating any
A method and system for attributing activity to a user includes sharing information with an analytics server while attributes and a user profile cannot be tracked back to the original user from the analytics server. A temporary ID included in the shared information is destroyed, thus eliminating any trace back.
대표청구항▼
1. A computer-implemented method for attributing activity to a user, comprising the steps of: sending from a first content provider in response to a first request for content from a user browser executing on a user device, requested content and a first identification (ID) to the user browser, the fi
1. A computer-implemented method for attributing activity to a user, comprising the steps of: sending from a first content provider in response to a first request for content from a user browser executing on a user device, requested content and a first identification (ID) to the user browser, the first ID capable of being stored on the user device;receiving a second request for content at a second content provider from the user browser, the second request including user identification information, the second content provider: retrieving attributes associated with the user identification information from an attribute server;generating a temporary ID;sending the attributes and the temporary ID to an analytics server;sending a response to the user browser, the response including the temporary ID and an instruction to provide a user profile server with the first ID and the temporary ID;receiving a user profile associated with the first ID and the temporary ID from the user profile server at the analytics server; andusing the temporary ID to associate the attributes with the user profile at the analytics server. 2. The method of claim 1, further comprising the analytics server performing the steps of: generating a second ID and associating the second ID with the user profile and corresponding attributes; anddestroying the temporary ID. 3. The method of claim 2, wherein the step of generating the second ID further comprises performing a one-way function on the temporary ID combined with a predetermined value that is destroyed after a predetermined period of time. 4. The method of claim 2, wherein the analytics server generates the second ID immediately upon receipt of the attributes from the second content provider and destroys the temporary ID. 5. The method of claim 1, wherein the second content provider and the attribute server share a user ID associated with the user identification information, and the step of generating the temporary ID further comprises performing a one-way function on the user ID. 6. The method of claim 1 wherein the temporary ID is unique to the user browser for a predetermined period of time. 7. The method of claim 1, wherein the step of retrieving attributes associated with the user identification information from the attribute server further comprises the steps of: sending, by the second content provider, an instruction to the user browser to request the attributes associated with the user identification information from the attribute server;retrieving, by the user browser, the attributes associated with the user identification information from the attribute server. 8. The method of claim 7, wherein the step of sending the attributes and the temporary ID to the analytics server, further comprises the steps of; sending the attributes and the temporary ID from the second content provider to the user browser; andsending the attributes and the temporary ID from the user computer to the analytics server. 9. The method of claim 1, wherein the first content provider and the user profile server are the same computer. 10. The method of claim 1 further comprising: using the temporary ID to merge user profile data from the user profile server and attributes from the attribute server; andgenerating an entry of data from the merged information to update a set of data summaries, the summaries maintaining a tally of statistics based on received data while destroying the source data. 11. The method of claim 1, wherein the second content provider and the attribute server share a user ID associated with the user identification information, further comprising the steps of: sending, by way of the user browser, the user ID and the temporary ID to the attribute server; andsending, by the attribute server, the attributes associated with the user as well as the temporary ID. 12. The method of claim 1, further comprising the steps of: merging, by the analytics server, the attributes and the user profile data;sending, by the analytics server, the merged attributes and use profile data to an additional server. 13. The method of claim 1, further comprising the steps of: generating a second temporary ID and a third temporary ID; andsending the second temporary ID and the third temporary ID to the analytics server. 14. The method of claim 13, wherein the second temporary ID and the third temporary ID are created by using encryption of the temporary ID and the method further comprises the step of decrypting, by the analytics server, the second and third temporary IDs to obtain the temporary ID. 15. A computer-implemented method for attributing activity to a user, comprising the steps of: sending from a first content provider in response to a first request for content from a user browser executing on a user device, requested content and a first identification (ID) to the user browser, the first ID capable of being stored on the user device;receiving a second request for content at a second content provider from the user browser, the second request including user identification information, the second content provider: retrieving attributes associated with the user identification information from an attribute server;generating a temporary ID;sending the attributes and the temporary ID to an analytics server;sending a response to the user browser, the response including the temporary ID and an instruction to provide a user profile server with the first ID and the temporary ID;receiving a user profile associated with the first ID and the temporary ID from the user profile server at the analytics server;using the temporary ID to associate the attributes with the user profile at the analytics server;generating, by the analytics server, a second ID and associating the second ID with the user profile and corresponding attributes;destroying, by the analytics server, the temporary ID; andwherein the second content provider and the attribute server share a user ID associated with the user identification information, and the step of generating the temporary ID further comprises performing a one-way function on the user ID. 16. A computer-implemented method for attributing activity to a user, comprising the steps of: sending from a first content provider in response to a first request for content from a user browser executing on a user device, requested content and a first identification (ID) to the user browser, the first ID capable of being stored on the user device;receiving a second request for content at a second content provider from the user browser, the second request including user identification information, the second content provider: retrieving attributes associated with the user identification information from an attribute server;generating a temporary ID;sending the attributes and the temporary ID to an analytics server;sending a response to the user browser, the response including the temporary ID and an instruction to provide a user profile server with the first ID and the temporary ID;receiving a user profile associated with the first ID and the temporary ID from the user profile server at the analytics server;using the temporary ID to associate the attributes with the user profile at the analytics server;wherein the second content provider and the attribute server share a user ID associated with the user identification information, and the step of generating the temporary ID further comprises performing a one-way function on the user ID, andwherein the temporary ID is unique to the user browser for a predetermined period of time.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (236)
Mund, Matthew, Apparatuses, methods and systems for advancement path candidate cloning.
Chaganti, Naren; Chaganti, Sitapathi Rao; Chaganti, Damayanti, Authentication mechanisms to enable sharing personal information via a networked computer system.
Carter, Samuel Jeff; Garcia, Ray; Joa, David; Joffe, David; Mertz, John; Obradovic, Zoran; Schumacher, Hans, Authentication methods for use in financial transactions and information banking.
Spalka, Adrian; Lehnhardt, Jan; Gotthardt, Frank, Computer implemented method for performing cloud computing on data being stored pseudonymously in a database.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd ; Banay Dan, Computer-based communication system and method using metadata defining a control structure.
Drummond Shattuck Reed ; Peter Earnshaw Heymann ; Steven Mark Mushero ; Kevin Benard Jones ; Jeffrey Todd Oberlander ; Dan Banay, Computer-based communication system and method using metadata defining a control-structure.
Reed Drummond Shattuck ; Heymann Peter Earnshaw ; Mushero Steven Mark ; Jones Kevin Benard ; Oberlander Jeffrey Todd, Computer-based communication system and method using metadata defining a control-structure.
Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
Dickinson, Alexander G.; Rohrbach, Mark D.; Clayton, Richard F.; Stark, Gregory H.; Ferrante, Michelle, Cryptographic server with provisions for interoperability between cryptographic systems.
Redlich, Ron M.; Nemzow, Martin A., Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor.
King, Martin T.; Stephens, Redwood; Mannby, Claes-Fredrik; Peterson, Jesse; Sanvitale, Mark; Smith, Michael J., Identifying a document by performing spectral analysis on the contents of the document.
Doughty, Dennis L.; Gordan, Benjamin M.; Mysore, Shrikanth B.; Tengler, Matthew A., Identifying a same user of multiple communication devices based on user routes.
Kam,Kendrick W.; Horn,Bruce L., Internet-based system for identification, measurement and ranking of investment portfolio management, and operation of a fund supermarket, including "best investor" managed funds.
Robinson, Jack D.; Muller, Peter; Noke, Timothy; Lim, Teng Lew; Glausi, Wallace; Cluff, James; Fullerton, Larry, Linking users into live social networking interactions based on the users' actions relative to similar content.
Robinson, Jack D.; Muller, Peter; Noke, Timothy; Lim, Teng Lew; Glausi, Wallace; Cluff, James; Fullerton, Larry, Linking users into live social networking interactions based on the users' actions relative to similar content.
Nordman,Ian; Alam��ki,Tero; V��nsk��,Marko; Tarkiainen,Mikko; Gyorb��r��,Norbert; Gripenberg,Casper, Method and apparatus for managing and enforcing user privacy.
Estrada,Julio; Estrada,Miguel A.; Hill,Charles Robert; Shalabi,Sami Mohammed; Shore,Maurice B., Method and system for designing a theme and associating it with a collaboration space user interface.
Scofield, Christopher L.; Pope, Elmore Eugene; Marshall, Brad E., Method and system for occurrence frequency-based scaling of navigation path weights among online content sources.
Linsey,Terry June; Hill,Charles Robert, Method and system for providing a separate browser window with information from the main window in a simpler format.
Robinson, Jack; Muller, Peter; Noke, Timothy; Lim, Teng Lew; Glausi, Wallace; Fullerton, Larry, Method of inserting/overlaying markers, data packets and objects relative to viewable content and enabling live social networking, N-dimensional virtual environments and/or other value derivable from the content.
Hamilton, II, Rick A.; Huie, William J.; Li, Jenny S.; Pickover, Clifford A., Method, system and program product for distribution of feedback among customers in real-time.
Rouse, Phillip C.; Blake, Victoria; Horen, Jeff; Culp, Amanda, Methods and systems for optimizing escheat and derecognition of prepaid cards, stored value cards, credit memos and electronic payment instruments.
Ansari, Amir; Cowgill, George A.; Masina, Ramprakash; Ramayya, Jude P.; McQuarters, Alvin R.; Raissyan, Atousa; Nicholls, Leon E., Multi-services application gateway and system employing the same.
Herz Frederick S. M. ; Eisner Jason M. ; Salganicoff Marcos, Pseudonymous server for system for customized electronic identification of desirable objects.
Rapaport, Jeffrey A.; Rapaport, Seymour; Smith, Kenneth Allen; Beattie, James; Gimlan, Gideon, Social network driven indexing system for instantly clustering people with concurrent focus on same topic into on-topic chat rooms and/or for generating on-topic search results tailored to user preferences regarding topic.
Rapaport, Jeffrey Alan; Rapaport, Seymour; Smith, Kenneth Allen; Beattie, James; Gimlan, Gideon, Social-topical adaptive networking (STAN) system allowing for group based contextual transaction offers and acceptances and hot topic watchdogging.
Kraenzel, Carl J.; Immerman, John D.; Mills, William A.; Lu, Jeannie J., System and method for a web based trust model governing delivery of services and programs.
Iannacci,Gregory Fx, System and method for an automated benefit recognition, acquisition, value exchange, and transaction settlement system using multivariable linear and nonlinear modeling.
Mascarenhas,Desmond, System and method for anonymous transaction in a data network and classification of individuals without knowing their real identity.
Abreu, Marcio Marc, System and method for communicating product recall information, product warnings or other product-related information to users of products.
Kraenzel,Carl J.; Immerman,John D.; Mills,William A.; Lu,Jeannie J., System and method for developing and administering web applications and services from a workflow, enterprise, and mail-enabled web application server and platform.
Berthold,Suze; Immerman,John D.; Kaufman,Charles W.; Kraenzel,Carl J., System and method for downloading security context elements governing execution of downloadable and distributable agents.
Kraenzel, Carl J.; Immerman, John D.; Mills, William A.; Nowacki, Mark A.; Lu, Jeannie J., System and method for managing concurrent scheduled or on-demand replication of subscriptions.
Immerman, John D.; Kraenzel, Carl J.; Mills, William A., System and method for providing a distributable runtime that deploys web applications and services from a workflow, enterprise, and mail-enabled web application server and platform.
Immerman, John D.; Nowacki, Mark A.; Kraenzel, Carl J., System and method for selective replication of databases within a workflow, enterprise, and mail-enabled web application server and platform.
Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H., System for generation of object profiles for a system for customized electronic identification of desirable objects.
Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H. ; Marcus Mitchell P., System for generation of user profiles for a system for customized electronic identification of desirable objects.
Robinson, Jack; Muller, Peter; Noke, Timothy; Lim, Teng Lew; Glausi, Wallace; Fullerton, Larry, System for inserting/overlaying markers, data packets and objects relative to viewable content and enabling live social networking, N-dimensional virtual environments and/or other value derivable from the content.
Stefanchik, Michael F.; Mathe, John G.; Scott, Robin L.; Loper, Steven W.; Krueger, Christopher S.; Groves, Robert H., System for the creation of database and structured information from verbal input.
Wittke, Edward R.; Wittke, Mellissa A.; Mazur, Connie S.; Mazur, Kenneth A., System for timely delivery of personalized aggregations of, including currently-generated, knowledge.
Dixon, Christopher John; Pinckney, Thomas, System, method, and computer program product for presenting an indicia of risk reflecting an analysis associated with search results within a graphical user interface.
Singh, Man Jit; Cancel, David, Systems and methods for clickstream analysis to modify an off-line business process involving determining related or complementary items.
Singh, Man Jit; Cancel, David, Systems and methods for clickstream analysis to modify an off-line business process involving matching a distribution list.
Shkedi, Roy, Systems and methods for taking action with respect to one network-connected device based on activity on another device connected to the same network.
Maxwell, Duane Stewart; Huang, Andrew S.; Steele, Kenneth Earl; Tomlin, Stephen L.; Adler, Steven Michael, Systems and methods for widget rendering and sharing on a personal electronic device.
Jones, William J.; Mennie, Douglas U.; Blake, John R.; Hallowell, Curtis W., Systems, apparatus, and methods for currency processing control and redemption.
Guarraci, Brian J.; White, Christopher C.; Ferguson, Niels Thomas; Jones, Jeffrey Dick; Nolan, Sean Patrick; Apacible, Johnson T.; Varadan, Vijay, Unified authentication for web method platforms.
Adler, Steven B.; Brown, Nigel Howard Julian; Gilbert, Arthur M.; Palmer, Charles Campbell; Schnyder, Michael; Waidner, Michael, Using a privacy agreement framework to improve handling of personally identifiable information.
Adler,Steven B.; Bangerter,Endre Felix; Brown,Nigel Howard Julian; Camenisch,Jan; Gilbert,Arthur M.; Karjoth,Guenter; Kesdogan,Dogan; McCullough,Michael Robert; Nelson,Adam Charles; Palmer,Charles Ca, Using a rules model to improve handling of personally identifiable information.
Adler, Steven B.; Bangerter, Endre Felix; Bohrer, Kathryn Ann; Brown, Nigel Howard Julian; Camenisch, Jan; Gilbert, Arthur M.; Kesdogan, Dogan; Leonard, Matthew P.; Liu, Xuan; McCullough, Michael Robert; Nelson, Adam Charles; Palmer, Charles Campbell; Powers, Calvin Stacy; Schnyder, Michael; Schonberg, Edith; Schunter, Matthias; Van Herreweghen, Elsie; Waidner, Michael, Using an object model to improve handling of personally identifiable information.
Robinson, Jack; Muller, Peter; Noke, Timothy; Lim, Teng Lew; Glausi, Wallace; Cluff, James; Fullerton, Larry, Using internet content as a means to establish live social networks by linking internet users to each other who are simultaneously engaged in the same and/or similar content.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.