Do Not Track / Advertise Functionality Based on User Identification Association
First Claim
1. A method, comprising:
- receiving, with a first computer from a requesting party, at least one user identifier associated with a particular user;
determining, with the first computer, whether the at least one user identifier is included in a first list; and
based on a determination that the at least one user identifier is included in the first list, sending, with the first computer, a first notification to the requesting party, the first notification indicating that the particular user associated with the at least one user identifier should be removed from one or more of user tracking lists or advertising target lists.
1 Assignment
0 Petitions
Accused Products
Abstract
Novel tools and techniques are provided for implementing user identification association functionality. In some embodiments, methods and systems might implement do not track and/or do not advertise functionality or “track me” and/or “advertise to me” functionality, based on user identification association. In some cases, a computer might receive at least one user identifier associated with a user and might determine whether the at least one user identifier is included in a do not track or do not advertise list. If the user is listed in the do not track or do not advertise list, the computer might send a notification to the requesting party indicating that the user should be removed from any tracking lists or advertising lists. If the user is listed in a “track me” list or “advertise to me” list, the computer might send another notification to the requesting party indicating that the user should be compensated.
36 Citations
23 Claims
-
1. A method, comprising:
-
receiving, with a first computer from a requesting party, at least one user identifier associated with a particular user; determining, with the first computer, whether the at least one user identifier is included in a first list; and based on a determination that the at least one user identifier is included in the first list, sending, with the first computer, a first notification to the requesting party, the first notification indicating that the particular user associated with the at least one user identifier should be removed from one or more of user tracking lists or advertising target lists. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An apparatus, comprising:
-
at least one processor; and at least one non-transitory computer readable medium having encoded thereon software, the software including a set of instructions that, when executed by the at least one processor, causes the apparatus to perform one or more operations, the set of instructions comprising; instructions to receive, from a requesting party, at least one user identifier associated with a particular user; instructions to determine whether the at least one user identifier is included in a first list; and instructions to send, based on a determination that the at least one user identifier is included in the first list, a first notification to the requesting party, the first notification indicating that the particular user associated with the at least one user identifier should be removed from one or more of user tracking lists or advertising target lists.
-
-
20. A method, comprising:
-
receiving, with a first computer from a requesting party, at least one user identifier associated with a particular user; identifying, with the first computer, one or more first documents associated with the particular user that are stored in one or more data stores, based at least in part on the received at least one user identifier, the one or more data stores being associated with a party other than the particular user; identifying, with the first computer, one or more second documents to which the party other than the particular user has rights, the one or more second documents being identified from among the one or more first documents; receiving, with the first computer, a request from the party other than the particular user to block access by the particular user to the one or more second documents stored in the one or more data stores; and preventing, with the first computer, access by the particular user to the one or more second documents stored in the one or more data stores, in response to receiving, from the party other than the particular user, the request to block access. - View Dependent Claims (21, 22, 23)
-
Specification