Methods and systems for data services
First Claim
Patent Images
1. A computationally-implemented method configured to be implemented using a server that operatively communicates with at least one service provider and one or more user devices via one or more networks, the method comprising:
- receiving at the server personal data associated with a user from at least one user device;
processing at the server the received personal data into anonymous data, the anonymous data including a non-identifying portion of the personal data and an encrypted portion that, if de-encrypted, would enable identification of the user associated with the personal data;
transmitting the anonymous data to at least one service provider;
receiving an indication from the at least one service provider of one or more services available to be offered to the user associated with the anonymous data if the at least one service provider were enabled to access the encrypted portion of the anonymous data;
transmitting to the at least one user device associated with the user an offer to provide the one or more services in exchange for access to the encrypted portion of the anonymous;
receiving an indication from the at least one user device that the user has accepted the offer to allow access to the encrypted portion of the anonymous data in exchange for the one or more services; and
providing a key to the at least one service provider to enable de-encryption of the encrypted portion of the anonymous data in exchange for the providing of the one or more services.
1 Assignment
0 Petitions
Accused Products
Abstract
A method substantially as shown and described the detailed description and/or drawings and/or elsewhere herein. A device substantially as shown and described the detailed description and/or drawings and/or elsewhere herein.
145 Citations
20 Claims
-
1. A computationally-implemented method configured to be implemented using a server that operatively communicates with at least one service provider and one or more user devices via one or more networks, the method comprising:
-
receiving at the server personal data associated with a user from at least one user device; processing at the server the received personal data into anonymous data, the anonymous data including a non-identifying portion of the personal data and an encrypted portion that, if de-encrypted, would enable identification of the user associated with the personal data; transmitting the anonymous data to at least one service provider; receiving an indication from the at least one service provider of one or more services available to be offered to the user associated with the anonymous data if the at least one service provider were enabled to access the encrypted portion of the anonymous data; transmitting to the at least one user device associated with the user an offer to provide the one or more services in exchange for access to the encrypted portion of the anonymous; receiving an indication from the at least one user device that the user has accepted the offer to allow access to the encrypted portion of the anonymous data in exchange for the one or more services; and providing a key to the at least one service provider to enable de-encryption of the encrypted portion of the anonymous data in exchange for the providing of the one or more services. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A system, comprising:
-
circuitry for receiving personal data associated with a user from at least one user device; circuitry for processing the received personal data into anonymous data, the anonymous data including a non-identifying portion of the personal data and an encrypted portion that, if de-encrypted, would enable identification of the user associated with the personal data; circuitry for transmitting the anonymous data to at least one service provider; circuitry for receiving an indication from the at least one service provider of one or more services available to be offered to the user associated with the anonymous data if the at least one service provider were enabled to access the encrypted portion of the anonymous data; circuitry for transmitting to the at least one user device associated with the user an offer to provide the one or more services in exchange for access to the encrypted portion of the anonymous data; circuitry for receiving an indication from the at least one user device that the user has accepted the offer to allow access to the encrypted portion of the anonymous data in exchange for the one or more services; and circuitry for providing a key to the at least one service provider to enable de-encryption of the encrypted portion of the anonymous data in exchange for the providing of the one or more services. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. An apparatus comprising, comprising:
-
at least one processing device; and one or more non-transitory media bearing one or more instructions that, when executed by the at least one processing device, configure the apparatus to perform operations including at least; receiving personal data associated with a user from at least one user device; processing the received personal data into anonymous data, the anonymous data including a non-identifying portion of the personal data and an encrypted portion that, if de-encrypted, would enable identification of the user associated with the personal data; receiving an indication from the at least one service provider of one or more services available to be offered to the user associated with the anonymous data if the at least one service provider were enabled to access the encrypted portion of the anonymous data; transmitting to the at least one user device associated with the user an offer to provide the one or more services in exchange for access to the encrypted portion of the anonymous; receiving an indication from the at least one user device that the user has accepted the offer to allow access to the encrypted portion of the anonymous data in exchange for the one or more services; transmitting the anonymous data to at least one service provider; and providing a key to the at least one service provider to enable de-encryption of the encrypted portion of the anonymous data in exchange for the providing of the one or more services. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification