Methods and systems for providing targeted information using identity masking in a wireless communications device
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-015/16
H04L-029/08
H04W-004/12
H04W-004/02
H04W-064/00
H04W-008/24
G06F-017/30
G06F-021/10
G06F-021/62
G06Q-030/02
출원번호
US-0134675
(2008-06-06)
등록번호
US-9398113
(2016-07-19)
발명자
/ 주소
Aggarwal, Pooja
Krishnaswamy, Dilip
Daley, Robert S.
Lundqvist, Patrik
출원인 / 주소
QUALCOMM Incorporated
대리인 / 주소
Gordon, Alan
인용정보
피인용 횟수 :
3인용 특허 :
93
초록▼
Methods and systems for providing user information from a wireless access terminal (W-AT) to a remote apparatus without revealing a primary identity of the user of the W-AT include generating an alternate user identifier for the W-AT, and providing the alternate user identifier and first information
Methods and systems for providing user information from a wireless access terminal (W-AT) to a remote apparatus without revealing a primary identity of the user of the W-AT include generating an alternate user identifier for the W-AT, and providing the alternate user identifier and first information related to targeted-content-message information and/or user profile information to the remote apparatus.
대표청구항▼
1. A method of providing user information from a wireless access terminal (W-AT) to a remote apparatus without revealing a primary identity of a user of the W-AT, the method comprising: generating, on the W-AT, an alternate user identifier for the W-AT, wherein the alternate user identifier is confi
1. A method of providing user information from a wireless access terminal (W-AT) to a remote apparatus without revealing a primary identity of a user of the W-AT, the method comprising: generating, on the W-AT, an alternate user identifier for the W-AT, wherein the alternate user identifier is configured to hide the primary identity from devices external to the W-AT, and wherein any alternate user identifier that is associated with the W-AT is generated only on the W-AT, and is not provided to the W-AT by any of the devices external to the W-AT in association with the primary identity;generating first information on the W-AT based on at least one of targeted-content-message information on the W-AT or user profile information on the W-AT;providing the alternate user identifier and the first information to the remote apparatus without associating the alternate user identifier with the primary identity,wherein the generating of the alternate user identifier includes scrambling the primary identity based on a variable value; andproviding one or more additional messages, subsequent to the providing of the first information, using a same variable value such that the providing of the first information and the providing of the one or more additional messages are identifiable as being from a same client. 2. The method of claim 1, wherein the first information includes one or more items of information associated with the W-AT. 3. The method of claim 1, further comprising: receiving second information from the remote apparatus based on the alternate user identifier and the first information. 4. The method of claim 3, further comprising: receiving one or more targeted content messages from the remote apparatus based on the second information. 5. The method of claim 3, further comprising: incorporating the second information in the user profile of the W-AT. 6. The method of claim 3, wherein the second information is derived from a database having census information. 7. The method of claim 6, wherein the second information is information relating to at least one of a likely age or an ethnic background of the user. 8. The method of claim 7, wherein the first information is a geographic location. 9. The method of claim 1, wherein the alternate user identifier is a hashed value. 10. The method of claim 9, wherein a source of the hashed value is based on the primary identity. 11. The method of claim 10, wherein a source of the hashed value is based on one of a value provided by the remote apparatus, a random value, a pseudo-random value, or a time-based value. 12. The method of claim 9, wherein the hashed value is calculated to provide a low probability of collision with other generated values. 13. The method of claim 1, wherein the providing the alternate user identifier provides the alternate user identifier in response to a request for targeted-content-message-related data. 14. The method of claim 1, wherein the first information generated on the W-AT provides targeted-content-message-related metrics without identifying the user of the W-AT. 15. The method of claim 1, wherein generating, on the W-AT, the alternate user identifier comprises generating an anonymous value configured to allow the W-AT to query all external servers without compromising the primary identity of the user. 16. A wireless access terminal (W-AT) capable of delivering targeted-content-messages to a consumer, comprising: means for generating, on the W-AT, an alternate user identifier for the W-AT, wherein the alternate user identifier is configured to hide a primary identity of a user of the W-AT from devices external to the W-AT, and wherein any alternate user identifier that is associated with the W-AT is generated only on the W-AT, and is not provided to the W-AT by any of the devices external to the W-AT in association with the primary identity;means for generating first information on the W-AT based on at least one of targeted-content-message information on the W-AT or user profile information on the W-AT;means for providing the alternate user identifier and the first information to a remote apparatus without associating the alternate user identifier with the primary identity,wherein the means for generating the alternate user identifier includes means for scrambling the primary identity based on a variable value; andproviding one or more additional messages, subsequent to the providing of the first information, using a same variable value such that the providing of the first information and the providing of the one or more additional messages are identifiable as being from a same client. 17. The W-AT of claim 16, wherein the first information includes one or more items of information associated with the W-AT. 18. The W-AT of claim 17, further comprising: means for receiving second information from the remote apparatus based on the alternate user identifier and the second information. 19. The W-AT of claim 18, further comprising: means for receiving one or more targeted content messages from the remote apparatus based on the second information. 20. The W-AT of claim 18, wherein the second information is incorporated in the user profile of the W-AT. 21. The W-AT of claim 20, wherein the second information is derive from a database having census information. 22. The W-AT of claim 21, wherein the second information is information relating to at least one of a likely age and an ethnic background of the user. 23. The W-AT of claim 22, wherein the first information is a geographic location. 24. The W-AT of claim 17, wherein the alternate user identifier is a hashed value. 25. The W-AT of claim 24, wherein a source of the hashed value is based on the primary identifier. 26. The W-AT of claim 24, wherein a source of the hashed value is based on one of a value provided by the remote apparatus, a random value, a pseudo-random value, or a time-based value. 27. The W-AT of claim 24, wherein the hashed value is calculated to provide a low probability of collision with other generated values. 28. The W-AT of claim 16, further comprising: means for providing the alternate user identifier in response to a request for targeted-content-message-related data, thereby providing a unique identifier without identifying a specific user device. 29. The W-AT of claim 16, wherein the first information generated on the W-AT provides targeted-content-message-related metrics without identifying the user of the W-AT. 30. The W-AT of claim 16, wherein the means for generating, on the W-AT, the alternate user identifier comprises means for generating an anonymous value configured to allow the W-AT to query all external servers without compromising the primary identity of the user. 31. A wireless access terminal (W-AT) capable of delivering targeted-content-messages to a consumer, comprising: a first processing circuit module configured to generate an alternate user identifier for the W-AT, wherein the alternate user identifier is configured to hide a primary identity of a user of the W-AT from devices external to the W-AT, and wherein any alternate user identifier that is associated with the W-AT is generated only on the W-AT, and is not provided to the W-AT by any of the devices external to the W-AT in association with the primary identity;a second processing circuit module configured to generate first information on the W-AT based on at least one of targeted-content-message information on the W-AT or user profile information on the W-AT;transmitting circuitry configured to provide the alternate user identifier and the first information to a remote apparatus without associating the alternate user identifier with the primary identity,wherein the first processing circuit module is further configured to generate the alternate user identifier by scrambling the primary identity based on a variable value; anda third processing circuit module configured to provide one or more additional messages, subsequent to the providing of the first information, using a same variable value such that the providing of the first information and the providing of the one or more additional messages are identifiable as being from a same client. 32. The W-AT of claim 31, wherein the first information includes one or more items of information associated with the W-AT. 33. The W-AT of claim 32, further comprising: receiving circuitry configured to receive second information from the remote apparatus based on the alternate user identifier and the second information. 34. The W-AT of claim 33, wherein the receiving circuitry is also configured to receive one or more targeted content messages from the remote apparatus based on the second information. 35. The W-AT of claim 34, wherein the second information is incorporated in the user profile of the W-AT. 36. The W-AT of claim 35, wherein the second information is derive from a database having census information, wherein the second information is information relating to at least one of a likely age or an ethnic background of the user, and wherein the first information is a geographic location. 37. The W-AT of claim 36, wherein the alternate user identifier is a hashed value. 38. The W-AT of claim 37, wherein a source of the hashed value is based on the primary identity. 39. The W-AT of claim 37, wherein a source of the hashed value is based on one of a value provided by the remote apparatus, a random value, a pseudo-random value, or a time-based value. 40. The W-AT of claim 37, wherein the hashed value is calculated to provide a low probability of collision with other generated values. 41. The W-AT of claim 31, wherein the first processing circuit module is further configured to provide the alternate user identifier in response to a request for targeted-content-message-related data, thereby providing a unique identifier without identifying a specific user device. 42. The W-AT of claim 31, wherein the first information generated on the W-AT provides targeted-content-message-related metrics without identifying the user of the W-AT. 43. The W-AT of claim 31, wherein the first processing circuit module is further configured to generate, on the W-AT, as part of the alternate user identifier, an anonymous value configured to allow the W-AT to query all external servers without compromising the primary identity of the user. 44. A non-transitory computer-readable medium, comprising: a first set of instructions for generating, on a wireless access terminal (W-AT), an alternate user identifier for the W-AT, wherein the alternate user identifier is configured to hide a primary identity of a user of the W-AT from devices external to the W-AT, and wherein any alternate user identifier that is associated with the W-AT is generated only on the W-AT, and is not provided to the W-AT by any of the devices external to the W-AT in association with the primary identity;a second set of instructions for generating first information on the W-AT based on at least one of targeted-content-message information on the W-AT or user profile information on the W-AT;a third set of instructions for providing the alternate user identifier and the first information to a remote apparatus without associating the alternate user identifier with the primary identity,wherein the first set of instructions are further configured to generate the alternate user identifier by scrambling the primary identity based on a variable value; anda fourth set of instructions configured to provide one or more additional messages, subsequent to the providing of the first information, using a same variable value such that the providing of the first information and the providing of the one or more additional messages are identifiable as being from a same client. 45. The non-transitory computer-readable medium of claim 44, wherein the alternate user identifier is a hashed value. 46. The non-transitory computer-readable medium of claim 45, wherein a source of the hashed value is based on the primary identity. 47. non-transitory computer-readable medium of claim 46, wherein the source of the hashed value is based on one of a value provided by the remote apparatus, a random value, a pseudo-random value, or a time-based value. 48. The non-transitory computer-readable medium of claim 45, wherein the hashed value is calculated to provide a low probability of collision with other generated values. 49. The non-transitory computer-readable medium of claim 44, wherein the first information includes one or more items of information associated with the W-AT. 50. The non-transitory computer-readable medium of claim 44, further comprising a fifth set of instructions for receiving second information from the remote apparatus based on the alternate user identifier and first information. 51. The non-transitory computer-readable medium of claim 50, further comprising: a sixth set of instructions for receiving one or more targeted content messages from the remote apparatus based on the second information. 52. The non-transitory computer-readable medium of claim 50, further comprising a fifth set of instructions for incorporating the second information in the user profile of the W-AT. 53. The non-transitory computer-readable medium of claim 50, wherein the second information is derived from a database having census information. 54. The non-transitory computer-readable medium of claim 53, wherein the second information is information relating to at least one of a likely age or an ethnic background of the user, and wherein the first information is a geographic location. 55. The non-transitory computer-readable medium of claim 44, further comprising: wherein the third set of instructions are further configured to provide the alternate user identifier in response to a request for targeted-content-message-related data, thereby providing a unique identifier without identifying a specific user device. 56. The non-transitory computer-readable medium of claim 44, wherein the first information generated on the W-AT provides targeted-content-message-related metrics without identifying the user of the W-AT. 57. The non-transitory computer-readable medium of claim 44, wherein the first set of instructions comprises a fifth set of instructions for generating, on the W-AT, an anonymous value configured to allow the W-AT to query all external servers without compromising the primary identity of the user. 58. One or more integrated circuits that together comprise: processing circuitry configured to generate, on a wireless access terminal (W-AT), an alternate user identifier for the W-AT, wherein the alternate user identifier is configured to hide a primary identity of a user of the W-AT from devices external to the W-AT, and wherein any alternate user identifier that is associated with the W-AT is generated only on the W-AT, and is not provided to the W-AT by any of the devices external to the W-AT in association with the primary identity;wherein the processing circuitry is further configured to generate first information on the W-AT based on at least one of targeted-content-message information on the W-AT or user profile information on the W-AT;transmit hardware configured to transmit the alternate user identifier and the first information to a remote apparatus without associating the alternate user identifier with the primary identity, the first information including one or more items of information associated with the W-AT;receiving circuitry configured to receive second information from the remote apparatus based on the alternate user identifier and the second information,wherein the processing circuitry is further configured to generate the alternate user identifier by scrambling the primary identity based on a variable value, andwherein the transmit hardware is further configured to transmit one or more additional messages, subsequent to the transmission of the first information, using a same variable value such that the providing of the first information and the providing of the one or more additional messages are identifiable as being from a same client. 59. The one or more integrated circuits of claim 58, wherein the processing circuitry is further configured to generate an anonymous value configured to allow the W-AT to query all external servers without compromising the primary identity of the user. 60. A wireless access terminal (W-AT) apparatus, comprising: a processor; anda memory coupled to the processor that includes: a first set of instructions for generating an alternate user identifier for the W-AT, wherein the alternate user identifier is configured to hide a primary identity of a user of the W-AT from devices external to the W-AT, and wherein any alternate user identifier that is associated with the W-AT is generated only on the W-AT, and is not provided to the W-AT by any of the devices external to the W-AT in association with the primary identity;a second set of instructions for generating first information on the W-AT based on at least one of targeted-content-message information on the W-AT or user profile information on the W-AT;a third set of instructions for providing the alternate user identifier and the first information to a remote apparatus without associating the alternate user identifier with the primary identity,wherein the first set of instructions for generating the alternate user identifier includes instructions for scrambling the primary identity based on a variable value; anda fourth set of instructions for providing one or more additional messages, subsequent to the providing of the first information, using a same variable value such that the providing of the first information and the providing of the one or more additional messages are identifiable as being from a same client. 61. The apparatus of claim 60, wherein the first information includes one or more items of information associated with the W-AT. 62. The apparatus of claim 61, wherein the memory further comprises a fifth set of instructions for receiving second information from the remote apparatus based on the alternate user identifier and the first information. 63. The apparatus of claim 62, wherein the memory further comprises a fifth set of instructions for receiving one or more targeted content messages from the remote apparatus based on the second information. 64. The apparatus of claim 62, wherein the memory further comprises a fifth set of instructions for incorporating the second information in the user profile of the W-AT. 65. The apparatus of claim 62, wherein the second information is derived from a database having census information. 66. The apparatus of claim 62, wherein the second information is information relating to at least one of a likely age or an ethnic background of the user. 67. The apparatus of claim 65, wherein the first information is a geographic location. 68. The apparatus of claim 60, wherein the alternate user identifier is a hashed value. 69. The apparatus of claim 68, wherein a source of the hashed value is based on the primary identity. 70. The apparatus of claim 69, wherein the source of the hashed value is based on one of a value provided by the remote apparatus, a random value, a pseudo-random value, or a time-based value. 71. The apparatus of claim 68, wherein the hashed value is calculated to provide a low probability of collision with other generated values. 72. The apparatus of claim 60, further comprising: a fifth set of instructions for providing the alternate user identifier in response to a request for targeted-content-message-related data, thereby providing a unique identifier without identifying a specific user device. 73. The apparatus of claim 60, wherein the first information generated on the W-AT provides targeted-content-message-related metrics without identifying the user of the W-AT. 74. The apparatus of claim 60, wherein the first set of instructions comprises a fifth set of instructions for generating, on the W-AT, an anonymous value configured to allow the W-AT to query all external servers without compromising the primary identity of the user.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (93)
Landsman Rick W. ; Lee Wei-Yeh, Ad controller for use in implementing user-transparent network-distributed advertising and for interstitially displaying an advertisement so distributed.
Nakano Hirohiko (Yokohama JPX) Domyo Seiichi (Yokohama JPX) Kuroda Takaki (Yokohama JPX) Shouji Naofumi (Yokohama JPX) Kobayashi Atsushi (Machida JPX), Distributed file system permitting each user to enhance cache hit ratio in file access mode.
Bergh Christopher P. ; Metral Max E. ; Ritter David Henry ; Sheena Jonathan Ari ; Sullivan James J., Distributed system for facilitating exchange of user information and opinion using automated collaborative filtering.
Imai Toru,JPX ; Shimokawa Toshihiko,JPX ; Yoshida Hideki,JPX ; Fujii Hiroku,JPX, File reading method and file requesting client device in client-server information communication system.
Sullivan David J. ; Gauvin William Joseph ; Taranto Edward James, Method and apparatus for accessing copies of documents using a web browser request interceptor.
Singer, Howard; Popkin, Laird; Sadan, Yariv, Method and device for the wireless exchange of media content between mobile devices based on content preferences.
O'Toole, James; Morris, Stephen; Lapolito, Anthony, Method and system for dynamically pre-positioning content in a network based detecting or predicting user presence.
Hosea, Devin F.; Rascon, Arthur P.; Zimmerman, Richard S.; Oddo, Anthony Scott; Thurston, Nathaniel, Method and system for web user profiling and selective content delivery.
R. Russell Caldwell ; Michael C. Merrill ; Michael L. Greene ; Roy G. Wells, Method for mapping applications and or attributes in a distributed network environment.
Bharat Krishna Asur ; Henzinger Monika R., Method for ranking documents in a hyperlinked environment using connectivity and selective content analysis.
Stringer Calvert,David W. J.; Dawson,Steven Mark; Lincoln,Patrick D., Methods and apparatus for scalable, distributed management of virtual private networks.
Jean Charpentier FR; Edouard Issenmann FR; Roger Larousse FR; Patrick Lohat FR, Mobile telephony method and system using signaling messages with priority levels.
Horvitz,Eric J.; Kadie,Carl M., Multi-attribute specification of preferences about people, priorities and privacy for guiding messaging and communications.
Pradhan, Salil; McDonnell, James Thomas Edward; Waters, John Deryk; Macer, Peter J., Profiles for information acquisition by devices in a wireless network.
Herz Frederick S. M. ; Eisner Jason M. ; Salganicoff Marcos, Pseudonymous server for system for customized electronic identification of desirable objects.
Gabber Eran ; Gibbons Phillip P. ; Matias Yossi ; Mayer Alain J., System and method for providing anonymous personalized browsing by a proxy system in a network.
Peters, Jr.,Robert Yaeger; Samarasinghe,Harish, System and method for providing multi-media services to communication devices over a communications network.
Herz Frederick S. M. ; Eisner Jason M. ; Ungar Lyle H. ; Marcus Mitchell P., System for generation of user profiles for a system for customized electronic identification of desirable objects.
Rose Daniel E. ; Bornstein Jeremy J. ; Tiene Kevin ; Ponceleon Dulce B., System for ranking the relevance of information objects accessed by computer users.
Alexander Ronald ; Dias Stephen ; Hancock Kenneth S. ; Leung Elsie Y. ; Macrae Douglas ; Ng Arthur Y. ; O'Neil Shawn ; Schoaff Peter Christopher ; Sutton Jonathon ; Ward ; III Thomas Edward ; Westber, Systems and methods for displaying and recording control interface with television programs, video, advertising information and program scheduling information.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.