MAINTAINING PRIVACY DURING USER PROFILING
First Claim
1. One or more computer-readable media storing computer-useable instructions that, when used by one or more computing devices, causes the one or more computing devices to perform a method, the method comprising:
- receiving, from a first device, one or more rules for profiling a user, wherein the one or more rules were encrypted using a private key;
receiving, from a second device, user data, wherein the user data was encrypted using a public key communicated to the second device by the first device;
matching the encrypted one or more rules with the encrypted user data; and
based on matching the encrypted user data with the encrypted one or more rules, generating a profile for the user.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and computer storage media having computer-executable instructions embodied thereon that maintain privacy during user profiling are provided. A profiling service receives, from a first device, rules for profiling a user. The rules were encrypted using a private key. The profiling service also receives, from a second device, user data. The user data was encrypted using a public key communicated to the second device by the first device. The profiling service then matches the encrypted rules with the encrypted user data, and based on the matching, generates a profile for the user. In embodiments, such a user profile can be utilized to deliver personalized digital content to a user.
-
Citations
20 Claims
-
1. One or more computer-readable media storing computer-useable instructions that, when used by one or more computing devices, causes the one or more computing devices to perform a method, the method comprising:
-
receiving, from a first device, one or more rules for profiling a user, wherein the one or more rules were encrypted using a private key; receiving, from a second device, user data, wherein the user data was encrypted using a public key communicated to the second device by the first device; matching the encrypted one or more rules with the encrypted user data; and based on matching the encrypted user data with the encrypted one or more rules, generating a profile for the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer system executed by one or more computer processors, comprising:
-
a user component for encrypting user data, wherein the user component encrypts the user data using a public key; an encryption service component for encrypting one or more rules for profiling a user, wherein the encryption service component encrypts the one or more rules using a private key and communicates the public key to the user component; and a profiling service component for profiling a user, wherein the profiling service component matches encrypted user data received from the user component with encrypted one or more rules received from the encryption service component using a pairwise function. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. One or more computer-readable media storing computer-useable instructions that, when used by one or more computing devices, causes the one or more computing devices to perform a method, the method comprising:
-
receiving, from a first device, one or more encrypted rules for profiling a user, wherein the one or more rules were generated by the first device based on one or more profile definitions created by the first device and encrypted by the first device using a private key to create trapdoors for the one or more rules that were being encrypted; receiving, from a second device, encrypted user data from a user, wherein the user data was encrypted using a random number and a public key communicated to the second device by the first device; matching the one or more encrypted rules with the encrypted user data using a pairwise function; and based on matching the encrypted user data with the encrypted rules, generating a profile for the user.
-
Specification