Privacy centric feature analysis for mobile devices
First Claim
1. A computer-implemented method for feature analysis, the method comprising:
- providing a plurality of mapped features to a mobile application installed on a device, each mapped feature comprising an item of protected information mapped to a non-unique sharable feature; and
providing privacy compliance instructions to the mobile application for execution at the device wherein the privacy compliance instructions comprise instructions for;
responsive to a trigger, detecting an available item of protected information available to the mobile application;
selecting a non-unique sharable feature from the plurality of mapped features that maps to the detected available item of protected information; and
sending the non-unique sharable feature.
7 Assignments
0 Petitions
Accused Products
Abstract
Privacy centric feature analysis. A secure set of multiple mapped features is selected and provided to a mobile device. Each mapped feature maps a sharable feature to a matching criterion for an item of protected information and no combination of mapped features for a secure set are unique to an individual item of protected information. Privacy compliance instructions enable the mobile device to select a mapped feature from a received set of mapped features by identifying an item of protected information available to the mobile device which corresponds to a matching criterion found in the received set of mapped features. The sharable feature of the selected mapped feature is identified and sent to a privacy compliant destination. Advantageously, the analysis system protects the privacy of the mobile device user because it does not require the mobile device to relay protected information for the selection of customized content or relevant advertisements.
-
Citations
20 Claims
-
1. A computer-implemented method for feature analysis, the method comprising:
-
providing a plurality of mapped features to a mobile application installed on a device, each mapped feature comprising an item of protected information mapped to a non-unique sharable feature; and providing privacy compliance instructions to the mobile application for execution at the device wherein the privacy compliance instructions comprise instructions for; responsive to a trigger, detecting an available item of protected information available to the mobile application; selecting a non-unique sharable feature from the plurality of mapped features that maps to the detected available item of protected information; and sending the non-unique sharable feature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer readable medium with computer executable instructions stored thereon executed by a processor to perform a method, the method comprising:
-
providing a plurality of mapped features to a mobile application installed on a device, each mapped feature comprising an item of protected information mapped to a non-unique sharable feature; and providing privacy compliance instructions to the mobile application for execution at the device wherein the privacy compliance instructions comprise instructions for; responsive to a trigger, detecting an available item of protected information available to the mobile application; selecting a non-unique sharable feature from the plurality of mapped features that maps to the detected available item of protected information; and sending the non-unique sharable feature. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A system comprising:
-
a processor; and
,a non-transitory computer readable storage medium storing processor-executable computer program instructions, the instructions comprising instructions for; providing a plurality of mapped features to a mobile application installed on a device, each mapped feature comprising an item of protected information mapped to a non-unique sharable feature; and providing privacy compliance instructions to the mobile application for execution at the device wherein the privacy compliance instructions comprise instructions for; responsive to a trigger, detecting an available item of protected information available to the mobile application; selecting a non-unique sharable feature from the plurality of mapped features that maps to the detected available item of protected information; and sending the non-unique sharable feature. - View Dependent Claims (17, 18, 19, 20)
-
Specification