×

Method and system for protecting queryable data

  • US 7,975,150 B1
  • Filed: 06/28/2006
  • Issued: 07/05/2011
  • Est. Priority Date: 06/28/2006
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for protecting queryable data in a system for targeted data delivery, comprising:

  • collecting, by said computer, user information about a user from at least one electronic device associated with said user, said user information including behavioral characteristics of use of said electronic device by said user, personal information associated with said user, and configuration of said electronic device associated with said user;

    generating, by said computer, a user profile based on said user information;

    dividing, by said computer, said user profile into a plurality of parts;

    concealing, by said computer, each part of said user profile such that each part of said user profile is accessible only using a corresponding tool controlled by a third party;

    receiving, by said computer, an offer soliciting delivery of targeted data to said user, said offer defining selection criteria for targeted user profiles, and said selection criteria specifying user information of at least one part of said user profile; and

    determining, by said computer, that said user profile satisfies said selection criteria, including receiving, by said computer, said corresponding tool for accessing said user information of said at least one part of said user profile and unconcealing, by said computer, said user information of said at least one part using said corresponding tool, wherein said concealing each part of said user profile further comprises;

    encrypting, by said computer, user information of a first part using a symmetric key used only with a first location used for storing said user information of a first part to generate encrypted user information of a first part;

    receiving, by said computer, a public key of a first asymmetric key pair that is controlled by said third party;

    encrypting, by said computer, an identifier associated with said first location concatenated with said symmetric key using said public key to generate encrypted key information; and

    destroying, by said computer, said symmetric key.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×