TRUSTED PRIVACY INFORMATION MANAGEMENT
First Claim
1. A method for tracking and controlling privacy information within a lead sales system, comprising:
- logging receipt in a log of one or more encrypted leads by a trusted privacy information manager (TPIM) that are received from a participant thereof, the one or more leads including private lead information from a lead provider having been pre-processed and encrypted with a one-way hash algorithm;
comparing the received one or more encrypted leads with stored encrypted leads to find any matches;
updating the log related to the one or more encrypted leads with log information associated with the matching one or more encrypted leads, wherein the log information includes at least one of an e-mail address and a phone number of the lead provider; and
communicating to the lead provider at least one way to access a user interface of the TPIM that enables the lead provider to control his or her private lead information.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for tracking and controlling privacy information within a lead sales system includes logging receipt in a log of one or more encrypted leads by a trusted privacy information manager (TPIM) that are received from a participant thereof, the one or more leads including private lead information from a lead provider having been pre-processed and encrypted with a one-way hash algorithm; comparing the received one or more encrypted leads with stored encrypted leads to find matches; updating the log related to the one or more encrypted leads with information associated with the matching one or more encrypted leads, the log information including at least one of an e-mail address and a phone number of the lead provider; and communicating to the lead provider at least one way to access a user interface of the TPIM that enables the lead provider to control his or her private lead information.
-
Citations
27 Claims
-
1. A method for tracking and controlling privacy information within a lead sales system, comprising:
-
logging receipt in a log of one or more encrypted leads by a trusted privacy information manager (TPIM) that are received from a participant thereof, the one or more leads including private lead information from a lead provider having been pre-processed and encrypted with a one-way hash algorithm; comparing the received one or more encrypted leads with stored encrypted leads to find any matches; updating the log related to the one or more encrypted leads with log information associated with the matching one or more encrypted leads, wherein the log information includes at least one of an e-mail address and a phone number of the lead provider; and communicating to the lead provider at least one way to access a user interface of the TPIM that enables the lead provider to control his or her private lead information. - View Dependent Claims (2, 3, 4, 5, 6, 8, 9, 10, 11, 12)
-
-
7. (canceled)
-
13. A method for tracking and controlling privacy information within a lead sales system, comprising:
-
submitting private lead information online by a lead provider to a participant of the lead sales system; receiving a communication from a trusted privacy information manager (TPIM) containing at least one way to access a user interface of the TPIM; accessing, through the TPIM user interface, logged information gathered by the TPIM, which includes at least an identification of a consumer that possesses, or has possessed, the private lead information; and selectively retracting the private lead information from the consumer. - View Dependent Claims (14, 15, 16)
-
-
17. A trusted privacy information management (TPIM) server for tracking sales leads, comprising:
-
a network interface, to receive over a network, messages comprising private lead information pre-processed and encrypted with a one-way hash algorithm, each message comprising at least one encrypted lead and unencrypted log information; a memory to store the encrypted leads together with a log in relation to each encrypted lead; a processor in communication with the memory and the network interface, the processor operative in conjunction with stored data and instructions to implement; a comparison module to compare received encrypted leads with stored encrypted leads; a logging module to log receipt of the encrypted leads along with the associated log information, and if an encrypted lead has a match, to update the log that is in relation to the matched encrypted lead; and a user interface in communication with the processor and the network interface to allow a lead provider access to the TPIM server to control his or her private lead information. - View Dependent Claims (18, 19, 20, 21, 22, 24, 25, 26, 27)
-
-
23. (canceled)
Specification