Methods and systems for enabling, tracking, and correlating anonymous user activity
First Claim
1. A method for identity key management in networked application execution, comprising:
- transmitting an identifier request from a client system to a server system, wherein an identity key value in the identifier request is blank;
upon detecting the blank identity key value at the server system, operating the server system to generate a new identity key value and an identifier for the new identity key value;
transmitting the new identity key value and the identifier for the new identity key value from the server system to the client system;
storing the new identity key value in a local store of the client system, wherein the local store of the client system is secured by a passcode, and wherein the new identity key value remains stored in the local store of the client system through power cycling of the client system; and
using the identifier to track execution of a networked application.
5 Assignments
0 Petitions
Accused Products
Abstract
Methods are disclosed for identity key management in networked application execution. In one embodiment, an identifier request is transmitted from a client system to a server system, in which an identity key value in the identifier request is blank. Upon detecting the blank identity key value at the server system, the server system operates to generate a new identity key value and an identifier for the new identity key value. The new identity key value and the identifier for the new identity key value are transmitted from the server system to the client system. The new identity key value is stored in a local store of the client system. The local store of the client system is secured by a passcode and persists data through power cycling of the client system. The identifier is used to track execution of a networked application in an anonymous execution mode.
-
Citations
20 Claims
-
1. A method for identity key management in networked application execution, comprising:
-
transmitting an identifier request from a client system to a server system, wherein an identity key value in the identifier request is blank; upon detecting the blank identity key value at the server system, operating the server system to generate a new identity key value and an identifier for the new identity key value; transmitting the new identity key value and the identifier for the new identity key value from the server system to the client system; storing the new identity key value in a local store of the client system, wherein the local store of the client system is secured by a passcode, and wherein the new identity key value remains stored in the local store of the client system through power cycling of the client system; and using the identifier to track execution of a networked application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification