GENERATING ANONYMOUS LOG ENTRIES
First Claim
1. A computer-implemented method for generating anonymous log entries, the method comprising:
- providing a log entry, wherein the log entry corresponds to a search query;
inserting at least one new data field and a corresponding value into the log entry, wherein the at least one new data field and the corresponding value cannot be used to track the log entry to a specific user; and
deleting all data fields and corresponding values that can be used to track the log entry to the specific user from the log entry to generate an anonymous log entry.
2 Assignments
0 Petitions
Accused Products
Abstract
Assigning session identifications to log entries and generating anonymous log entries are provided. In order to balance users'"'"' privacy concerns with the need for analysis of the log entries to provide high quality search results, non-user-specific data fields, such as a user'"'"'s location (e.g., city, state, and latitude/longitude) and connection speed, are inserted into the log entries, and user-specific data fields, such as the IP address and cookie identifications, are deleted from the log entries. In addition or alternatively, prior to anonymization of the log entries, session identifications are assigned to identified groups of log entries. The groups are identified based on factors such as the user'"'"'s identification, the IP address, the time of search, and differences between the search terms used in the search queries.
32 Citations
20 Claims
-
1. A computer-implemented method for generating anonymous log entries, the method comprising:
-
providing a log entry, wherein the log entry corresponds to a search query; inserting at least one new data field and a corresponding value into the log entry, wherein the at least one new data field and the corresponding value cannot be used to track the log entry to a specific user; and deleting all data fields and corresponding values that can be used to track the log entry to the specific user from the log entry to generate an anonymous log entry. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method for assigning session identifications to log entries, the method comprising:
-
receiving a plurality of original log entries, wherein each of the plurality of original log entries is associated with a different search query; identifying at least one group of log entries, wherein the identification of the at least one group of log entries is based on an analysis of the plurality of original log entries; and assigning a session identification to each original log entry within the at least one group of log entries. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. One or more computer-readable media having computer-executable instructions embodied thereon that, when executed, perform a method for generating anonymous log entries, the method comprising:
-
receiving a plurality of original log entries, wherein each of the plurality of original log entries is associated with a different search query; identifying at least one group of log entries, wherein the at least one group of log entries is based on an analysis of each original log entry, and wherein the analysis of each original log entry is based on at least one of a user identification, an IP address, a time of search, a difference between a plurality of search terms used in each of the search queries, and any combination thereof; assigning a session identification to each original log entry within the at least one group of log entries, wherein the session identification is not able to be tracked to a specific user; creating a copy log entry of each of the plurality of original log entries; inserting at least one new data field and a corresponding value into each of the copy log entries, wherein the at least one new data field and the corresponding value cannot be used to track the copy log entries to a specific user, and wherein the at least one new data field comprises at least one of the session identification, a user location, and a connection speed; deleting all data fields and corresponding values that can be used to track the copy log entries to the specific user from the copy log entries to generate anonymous log entries; validating the integrity of each of the anonymous log entries by comparing each anonymous log entry to the corresponding original log entry; and deleting each of the plurality of original log entries that correspond to the anonymous log entries.
-
Specification