Privacy centric feature analysis for mobile devices
First Claim
1. A method for feature analysis, the method comprising:
- accessing, by a mobile application installed on a mobile device, a plurality of mapped features, each mapped feature comprising an item of protected information mapped to a non-unique sharable feature;
detecting, by the mobile application, an available item of protected information available to the mobile application;
selecting, by the mobile application, a non-unique sharable feature from the plurality of mapped features that maps to the detected available item of protected information; and
sending, by the mobile application, the non-unique sharable feature to a privacy compliant destination.
5 Assignments
0 Petitions
Accused Products
Abstract
Privacy centric feature analysis. A secure set of multiple mapped features is selected and provided to a mobile device. Each mapped feature maps a sharable feature to a matching criterion for an item of protected information and no combination of mapped features for a secure set are unique to an individual item of protected information. Privacy compliance instructions enable the mobile device to select a mapped feature from a received set of mapped features by identifying an item of protected information available to the mobile device which corresponds to a matching criterion found in the received set of mapped features. The sharable feature of the selected mapped feature is identified and sent to a privacy compliant destination. Advantageously, the analysis system protects the privacy of the mobile device user because it does not require the mobile device to relay protected information for the selection of customized content or relevant advertisements.
21 Citations
20 Claims
-
1. A method for feature analysis, the method comprising:
- accessing, by a mobile application installed on a mobile device, a plurality of mapped features, each mapped feature comprising an item of protected information mapped to a non-unique sharable feature;
detecting, by the mobile application, an available item of protected information available to the mobile application;
selecting, by the mobile application, a non-unique sharable feature from the plurality of mapped features that maps to the detected available item of protected information; and
sending, by the mobile application, the non-unique sharable feature to a privacy compliant destination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
- accessing, by a mobile application installed on a mobile device, a plurality of mapped features, each mapped feature comprising an item of protected information mapped to a non-unique sharable feature;
-
9. A non-transitory computer readable medium with computer executable instructions stored thereon executed by a processor to perform a method, the method comprising:
- accessing, by a mobile application installed on a mobile device, a plurality of mapped features, each mapped feature comprising an item of protected information mapped to a non-unique sharable feature;
detecting, by the mobile application, an available item of protected information available to the mobile application;
selecting, by the mobile application, a non-unique sharable feature from the plurality of mapped features that maps to the detected available item of protected information; and
compliant destination. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
- accessing, by a mobile application installed on a mobile device, a plurality of mapped features, each mapped feature comprising an item of protected information mapped to a non-unique sharable feature;
-
17. A system comprising:
- a processor; and
, a non-transitory computer readable storage medium storing processor-executable computer program instructions, the instructions comprising instructions for;
accessing, by a mobile application installed on a mobile device, a plurality of mapped features, each mapped feature comprising an item of protected information mapped to a non-unique sharable feature;
detecting, by the mobile application, an available item of protected information available to the mobile application;
selecting, by the mobile application, a non-unique sharable feature from the plurality of mapped features that maps to the detected available item of protected information; and
sending, by the mobile application, the non-unique sharable feature to a privacy compliant destination. - View Dependent Claims (18, 19, 20)
- a processor; and
Specification