Method and system for protecting queryable data
First Claim
Patent Images
1. A computer implemented method for protecting queryable data in a system for targeted data delivery, comprising:
- collecting, by said computer, user information about a user from at least one electronic device associated with said user, said user information including behavioral characteristics of use of said electronic device by said user, personal information associated with said user, and configuration of said electronic device associated with said user;
generating, by said computer, a user profile based on said user information;
dividing, by said computer, said user profile into a plurality of parts;
concealing, by said computer, each part of said user profile such that each part of said user profile is accessible only using a corresponding tool controlled by a third party;
receiving, by said computer, an offer soliciting delivery of targeted data to said user, said offer defining selection criteria for targeted user profiles, and said selection criteria specifying user information of at least one part of said user profile; and
determining, by said computer, that said user profile satisfies said selection criteria, including receiving, by said computer, said corresponding tool for accessing said user information of said at least one part of said user profile and unconcealing, by said computer, said user information of said at least one part using said corresponding tool, wherein said concealing each part of said user profile further comprises;
encrypting, by said computer, user information of a first part using a symmetric key used only with a first location used for storing said user information of a first part to generate encrypted user information of a first part;
receiving, by said computer, a public key of a first asymmetric key pair that is controlled by said third party;
encrypting, by said computer, an identifier associated with said first location concatenated with said symmetric key using said public key to generate encrypted key information; and
destroying, by said computer, said symmetric key.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for protecting queryable data. Specifically, the method is implemented in a system for targeted data delivery. The method includes collecting user information about a user and generating a user profile based on the user information. The user profile is divided into at least one part. Each part of the user profile is concealed such that each part of the user profile is only accessible using a corresponding tool controlled by a third party.
151 Citations
16 Claims
-
1. A computer implemented method for protecting queryable data in a system for targeted data delivery, comprising:
- collecting, by said computer, user information about a user from at least one electronic device associated with said user, said user information including behavioral characteristics of use of said electronic device by said user, personal information associated with said user, and configuration of said electronic device associated with said user;
generating, by said computer, a user profile based on said user information;
dividing, by said computer, said user profile into a plurality of parts;
concealing, by said computer, each part of said user profile such that each part of said user profile is accessible only using a corresponding tool controlled by a third party;
receiving, by said computer, an offer soliciting delivery of targeted data to said user, said offer defining selection criteria for targeted user profiles, and said selection criteria specifying user information of at least one part of said user profile; and
determining, by said computer, that said user profile satisfies said selection criteria, including receiving, by said computer, said corresponding tool for accessing said user information of said at least one part of said user profile and unconcealing, by said computer, said user information of said at least one part using said corresponding tool, wherein said concealing each part of said user profile further comprises;
encrypting, by said computer, user information of a first part using a symmetric key used only with a first location used for storing said user information of a first part to generate encrypted user information of a first part;
receiving, by said computer, a public key of a first asymmetric key pair that is controlled by said third party;
encrypting, by said computer, an identifier associated with said first location concatenated with said symmetric key using said public key to generate encrypted key information; and
destroying, by said computer, said symmetric key. - View Dependent Claims (2, 3, 4)
- collecting, by said computer, user information about a user from at least one electronic device associated with said user, said user information including behavioral characteristics of use of said electronic device by said user, personal information associated with said user, and configuration of said electronic device associated with said user;
-
5. A computer implemented method for protecting queryable data in a system for targeted data delivery, comprising:
- collecting, by said computer, user information about a user from at least one electronic device associated with said user, said user information including behavioral characteristics of use of said electronic device by said user, personal information associated with said user, and configuration of said electronic device associated with said user;
generating, by said computer, a user profile based on said user information;
dividing, by said computer, said user profile into a plurality of parts;
concealing each part of said user profile such that each part of said user profile is accessible only using a corresponding tool controlled by a third party;
receiving, by said computer, an offer soliciting delivery of targeted data to said user, said offer defining selection criteria for targeted user profiles, and said selection criteria specifying user information of at least one part of said user profile;
determining, by said computer, that said user profile satisfies said selection criteria, including receiving, by said computer, said corresponding tool for accessing said user information of said at least one part of said user profile and unconcealing, by said computer, said user information of said at least one part using said corresponding tool;
destroying, by said computer, said corresponding tool used for accessing said user information of said at least one part of said user profile; and
destroying, by said computer, any unencrypted copies of said user information of said at least one part of said user profile. - View Dependent Claims (6, 7, 8, 9)
- collecting, by said computer, user information about a user from at least one electronic device associated with said user, said user information including behavioral characteristics of use of said electronic device by said user, personal information associated with said user, and configuration of said electronic device associated with said user;
-
10. A computer implemented method for protecting queryable data in a system for targeted data delivery, comprising:
- collecting, by said computer, user information about a user from at least one electronic device associated with said user;
generating, by said computer, a user profile based on said user information, wherein said user profile is used to achieve delivery of data targeted to said user based on said user profile;
dividing, by said computer, said user profile into a plurality of parts;
encrypting, by said computer, user information of a first part of said user profile using a symmetric key used only with a first location used for storing said user information of a first part to generate encrypted user information of a first part;
storing, by said computer, said encrypted user information of a first part at said first location;
determining, by said computer, that said user profile satisfies said selection criteria used to achieve delivery of data targeted to said user, including requesting and receiving, by said computer, said symmetric key from a third party and decrypting said encrypted user information using said symmetric key to obtain said user information of a first part;
delivering, by said computer, said targeted data to said user without releasing said user information of a first part when said user information of a first part satisfies said selection criteria; and
encrypting, by said computer, an identifier associated with said first location concatenated with said symmetric key using a public key of a key pair to generate first encrypted key information. - View Dependent Claims (11, 12, 13, 14, 15, 16)
- collecting, by said computer, user information about a user from at least one electronic device associated with said user;
Specification