Process for the user-related answering of customer inquiries in data networks
First Claim
1. A process for a user-related answering of customer inquiries in data networks, the process comprising steps of:
- integrating a software module within a mobile network,communicating, via the software module, a first request to a server address within a data network of a first provider when a user uses the software module via an end device, wherein the first request comprises a data packet comprising a device ID of the end device,anonymizing the device ID in that a hash routine is performed on the device ID to form an anonymized device ID,determining an ID for identification of the user in that the first provider extracts the ID from the data packet, the first provider being associated with the server address,anonymizing the ID via an independent third-party provider performing a third-party hash routine on the ID to form an anonymized ID,encrypting the anonymized ID via the independent third-party provider performing an asymmetric encryption routine on the anonymized ID to form an encrypted ID,then, via a server associated with the server address, supplementing the first request by the encrypted ID to form a supplemented data packet,performing an upstream process independent and decoupled from the first request, the upstream process comprising;
performing a first upstream hash routine on IDs of inquiring users to form hashed upstream IDs,communicating, via the first provider, upstream customer data records to the independent third-party vendor, the upstream customer data records comprising the hashed upstream IDs in combination with anonymized customer data, the first provider being responsible for the end device,then further hashing, via the independent third-party vendor, the upstream customer data records including the hashed upstream IDs to form further anonymized upstream customer data records including doubly hashed upstream IDs,encrypting the further anonymized upstream customer data records including the doubly hashed upstream IDs via the independent third-party vendor using a key to perform an upstream asymmetric encryption routine on the further anonymized upstream customer data records and on the doubly hashed upstream IDs to form encrypted upstream customer data records including the encrypted doubly hashed upstream IDs,decrypting, via the independent third-party provider using the key, the encrypted doubly hashed upstream IDs to form doubly hashed unencrypted upstream IDs,encrypting, via the independent third-party provider using a second key, the doubly hashed unencrypted upstream IDs to form reencrypted, doubly hashed upstream IDs, andfiling and saving the encrypted upstream customer data records and the reencrypted, doubly hashed upstream IDs in a database to form filed encrypted upstream customer data records and filed reencrypted, doubly hashed upstream IDs, the database belonging to the server associated with the server addressthen, identifying, via the server, a filed encrypted customer data record of the filed encrypted upstream customer data records and identifying a filed reencrypted, doubly hashed customer ID of the filed reencrypted, doubly hashed upstream IDs from the database, in connection with the first request of the user, on a basis of the encrypted ID provided at the server, to form identified customer data records and an identified reencrypted customer ID,retrieving, via the server, the identified customer data records and the identified reencrypted customer ID from the database to form retrieved customer data records and a retrieved reencrypted customer ID, respectively,merging, via the server, the retrieved customer data records and the retrieved reencrypted customer ID with the anonymized device ID of the supplemented data packet to form merged customer data,combining the merged customer data with user access information to form combined customer data, the user access information comprising a record of the user using the software module,irreversibly deleting from the server the ID from the data packet, the anonymized ID, and the encrypted ID, andcommunicating the combined customer data to a second provider, the second provider providing the software module and/orsaving the combined customer data in a further database for processing of future inquiries.
1 Assignment
0 Petitions
Accused Products
Abstract
A process for the processing of user inquiries in a data network saves user data anonymized at first in an independent process with an independent third-party vendor, which can then be accessed by the use of several incremental encryption and anonymization routines in such a way that, on the one hand the provider is not involved in the data exchange and in other respects even the independent third-party vendor does not have access to the user data at any time, albeit with the result that anonymized customer data, especially information about age, sex and partial postal code, can be kept ready in a database for the mobile end device being used.
-
Citations
14 Claims
-
1. A process for a user-related answering of customer inquiries in data networks, the process comprising steps of:
-
integrating a software module within a mobile network, communicating, via the software module, a first request to a server address within a data network of a first provider when a user uses the software module via an end device, wherein the first request comprises a data packet comprising a device ID of the end device, anonymizing the device ID in that a hash routine is performed on the device ID to form an anonymized device ID, determining an ID for identification of the user in that the first provider extracts the ID from the data packet, the first provider being associated with the server address, anonymizing the ID via an independent third-party provider performing a third-party hash routine on the ID to form an anonymized ID, encrypting the anonymized ID via the independent third-party provider performing an asymmetric encryption routine on the anonymized ID to form an encrypted ID, then, via a server associated with the server address, supplementing the first request by the encrypted ID to form a supplemented data packet, performing an upstream process independent and decoupled from the first request, the upstream process comprising; performing a first upstream hash routine on IDs of inquiring users to form hashed upstream IDs, communicating, via the first provider, upstream customer data records to the independent third-party vendor, the upstream customer data records comprising the hashed upstream IDs in combination with anonymized customer data, the first provider being responsible for the end device, then further hashing, via the independent third-party vendor, the upstream customer data records including the hashed upstream IDs to form further anonymized upstream customer data records including doubly hashed upstream IDs, encrypting the further anonymized upstream customer data records including the doubly hashed upstream IDs via the independent third-party vendor using a key to perform an upstream asymmetric encryption routine on the further anonymized upstream customer data records and on the doubly hashed upstream IDs to form encrypted upstream customer data records including the encrypted doubly hashed upstream IDs, decrypting, via the independent third-party provider using the key, the encrypted doubly hashed upstream IDs to form doubly hashed unencrypted upstream IDs, encrypting, via the independent third-party provider using a second key, the doubly hashed unencrypted upstream IDs to form reencrypted, doubly hashed upstream IDs, and filing and saving the encrypted upstream customer data records and the reencrypted, doubly hashed upstream IDs in a database to form filed encrypted upstream customer data records and filed reencrypted, doubly hashed upstream IDs, the database belonging to the server associated with the server address then, identifying, via the server, a filed encrypted customer data record of the filed encrypted upstream customer data records and identifying a filed reencrypted, doubly hashed customer ID of the filed reencrypted, doubly hashed upstream IDs from the database, in connection with the first request of the user, on a basis of the encrypted ID provided at the server, to form identified customer data records and an identified reencrypted customer ID, retrieving, via the server, the identified customer data records and the identified reencrypted customer ID from the database to form retrieved customer data records and a retrieved reencrypted customer ID, respectively, merging, via the server, the retrieved customer data records and the retrieved reencrypted customer ID with the anonymized device ID of the supplemented data packet to form merged customer data, combining the merged customer data with user access information to form combined customer data, the user access information comprising a record of the user using the software module, irreversibly deleting from the server the ID from the data packet, the anonymized ID, and the encrypted ID, and communicating the combined customer data to a second provider, the second provider providing the software module and/or saving the combined customer data in a further database for processing of future inquiries. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
Specification