System and method for anonymous transaction in a data network and classification of individuals without knowing their real identity
First Claim
Patent Images
1. A computer implemented method for anonymous profiling of, and marketing to, anonymous users comprising the acts of:
- a) providing a mechanism for a user to log into a closed network or system where the user'"'"'s real identity is not known and where such user is identified by a unique identifier that is unique to the closed network or system;
b) monitoring said user'"'"'s activity and responses in the closed network or system, by tracking the unique identifier;
c) generating or maintaining a profile related to the unique identifier based on said user'"'"'s activity and responses in the closed network or system; and
d) employing said profile to market products, services or information to the user;
wherein the user'"'"'s real identity is never revealed to a part of the closed network or system that generates, maintains and employs the profile, and wherein identity-revealing transactions involving said products, services or information can occur only outside said closed network or system.
4 Assignments
0 Petitions
Accused Products
Abstract
This invention relates generally to a computer-implemented method and system for having anonymous profiling of, and marketing to, anonymous users in a data network, particularly in the Internet. It enables an individual to surf the Internet anonymously as well as enabling third parties to use profiling information to target such anonymous users. The real identity of the individual is never known within the anonymous trust system.
91 Citations
15 Claims
-
1. A computer implemented method for anonymous profiling of, and marketing to, anonymous users comprising the acts of:
-
a) providing a mechanism for a user to log into a closed network or system where the user'"'"'s real identity is not known and where such user is identified by a unique identifier that is unique to the closed network or system; b) monitoring said user'"'"'s activity and responses in the closed network or system, by tracking the unique identifier; c) generating or maintaining a profile related to the unique identifier based on said user'"'"'s activity and responses in the closed network or system; and d) employing said profile to market products, services or information to the user; wherein the user'"'"'s real identity is never revealed to a part of the closed network or system that generates, maintains and employs the profile, and wherein identity-revealing transactions involving said products, services or information can occur only outside said closed network or system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product recorded in a computer-readable media for anonymous profiling of, and marketing to anonymous users comprising:
-
a) a first program code mechanism configured to permit a computer user to log into a closed network or system where the user'"'"'s real identity is not disclosed and where such user is identified by a unique identifier that is unique to the closed network or system; b) a second program code mechanism, electronically coupled to the first program code mechanism, configured to monitor the user'"'"'s activity and responses in the system by use of the unique identifier; c) a third program code mechanism, coupled to the second program code mechanism, configured to generate or maintain a profile for the user based upon the user'"'"'s activity and responses in the system; and d) a fourth program code mechanism, coupled to the third program code mechanism, configured to match one a more attributes of the profile with classification data related to data for products, services and information, whereby relevant products, services and information data can be displayed to the user, and whereby the user'"'"'s real identity is not revealed to any part of the system that generates, maintains or uses the profile. - View Dependent Claims (9, 10, 11)
-
-
12. A system for matching anonymous users with information, comprising:
-
a) a central processing unit that can establish communication with a user computer; b) a storage device electronically coupled to the central processing unit; c) the central processing unit configured to permit a person at the user computer to log into the system where the person'"'"'s real identity is not known and where such person is identified by a unique identifier that is unique to the system; d) the central processing unit further configured to monitor the person'"'"'s activity and responses in the system by tracking the unique identifier; e) the central processing unit further configured to generate or maintain a profile based on the person'"'"'s activity and responses in the system; and f) the central processing unit further configured to match one or more attributes of the profile with classification data related to data for products, services and information, whereby relevant products, services and information data can be displayed to the person, and whereby the person'"'"'s real identity is not revealed to any part of the system that generates, maintains or uses the profile. - View Dependent Claims (13)
-
-
14. A computer implemented method for anonymous profiling of, and marketing to, anonymous users comprising the acts of:
-
a) providing a mechanism for a user to log into a closed network or system where the user'"'"'s real identity is not known and where such user is identified by a unique identifier that is unique to the closed network or system; b) monitoring said user'"'"'s activity and responses in the closed network or system, by tracking the unique identifier; c) generating or maintaining a profile related to the unique identifier based on said user'"'"'s activity and responses in the closed network or system, wherein the profile is based on the user'"'"'s responses to a PTT; and d) employing said profile to market products, services or information to the user, wherein one or more attributes in the profile are matched to one or more classifications in the files containing products, services and information data; wherein the user'"'"'s real identity is never revealed to any part of the closed network or system that generates, maintains and employs the profile, and wherein identity-revealing transactions involving said products, services or information can occur only outside said closed network or system. - View Dependent Claims (15)
-
Specification