×

Generating bridge match identifiers for linking identifiers from server logs

  • US 10,182,042 B2
  • Filed: 07/14/2017
  • Issued: 01/15/2019
  • Est. Priority Date: 07/24/2015
  • Status: Active Grant
First Claim
Patent Images

1. A system to bridge encrypted datasets, comprising:

  • a data processing system comprising one or more processors and memory, the data processing system configured to;

    transmit a first identifier vector to a server, the first identifier vector encrypted with a first encryption that is commutative and comprising a first identifier, a plurality of first parameters, and a plurality of second parameters;

    receive from the server, an encrypted first identifier vector comprising the first identifier vector encrypted based on the first encryption and further encrypted by a second encryption associated with the server, the second encryption commutative and different from the first encryption;

    receive a second identifier vector, encrypted based on the second encryption associated with the server, the second identifier vector comprising a second identifier, a plurality of third parameters, and a plurality of fourth parameters;

    encrypt the second identifier vector with the first encryption to generate an encrypted second identifier vector that is encrypted based on the second encryption and further encrypted based on the first encryption;

    determine a correlation count between the encrypted first identifier vector and the encrypted second identifier vector based on a match between at least some of the plurality of first parameters and at least some of the plurality of the third parameters of the encrypted first identifier vector and between at least some of the plurality of the second parameters and at least some of the plurality of fourth parameters of the encrypted second identifier vector;

    determine that the first identifier corresponds to the second identifier based on the correlation count between the first identifier vector and the second identifier vector;

    generate, responsive to the determination that the first identifier corresponds to the second identifier, one identifier key for both the first identifier and the second identifier; and

    provide the one identifier key for input into an application to process interactions, the one identifier key generated based on the correlation count between the encrypted first identifier vector encrypted with the first encryption and further encrypted with the second encryption, and the encrypted second identifier vector encrypted with the second encryption and further encrypted with the first encryption.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×