Method and system for monitoring online computer network behavior and creating online behavior profiles
First Claim
Patent Images
1. A computer-implemented method for collecting network usage data about one or more users accessing a network and resources thereon without associating personally identifiable information with the usage data, comprising:
- maintaining an anonymized identifier relating to a user of a computer network, wherein the anonymized identifier does not reveal personal information of the user;
identifying first data relating to a network communication session between an external network system and the user;
identifying a record of a network request comprising a resource location identifier, the network request being related to the network communication session;
generating a second resource location identifier, wherein generating the second resource location identifier comprises stripping personally identifying data from the resource location identifier based on matching one or more patterns against the resource location identifier; and
storing the second resource location identifier in association with the anonymized identifier and the data relating to the network communication session.
8 Assignments
0 Petitions
Accused Products
Abstract
A method and system for monitoring users on one or more computer networks, disassociating personally identifiable information from the collected data, and storing it in a database so that the privacy of the users is protected. In one embodiment, the system generates an anonymized identifier and associates that anonymized identifier with collected network data. An embodiment of the system may further anonymize data such as resource location identifiers, by identifying and removing personal information.
233 Citations
23 Claims
-
1. A computer-implemented method for collecting network usage data about one or more users accessing a network and resources thereon without associating personally identifiable information with the usage data, comprising:
-
maintaining an anonymized identifier relating to a user of a computer network, wherein the anonymized identifier does not reveal personal information of the user; identifying first data relating to a network communication session between an external network system and the user; identifying a record of a network request comprising a resource location identifier, the network request being related to the network communication session; generating a second resource location identifier, wherein generating the second resource location identifier comprises stripping personally identifying data from the resource location identifier based on matching one or more patterns against the resource location identifier; and storing the second resource location identifier in association with the anonymized identifier and the data relating to the network communication session. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer system configured to collect network usage data, the computer system comprising:
-
computer storage having stored thereon a plurality of modules implemented as executable instructions; one or more computer processors configured to execute the executable instructions stored on the computer storage medium; and a user information storage medium having stored thereon an anonymized identifier relating to a user of a computer network, wherein the anonymized identifier does not reveal personal information of the user; the plurality of modules including a first module configured to identify first data relating to a network communication session between an external network system and the user; the plurality of modules including a second module configured to identify a record of a network request comprising a resource location identifier, the network request being related to the network communication session; the plurality of modules including a third module configured to generate a second location identifier, wherein generating the second resource location identifier comprises stripping personally identifying data from the resource location identifier based on matching one or more patterns against the resource location identifier; and the plurality of modules including a fourth module configured to store the second resource location identifier in association with the anonymized identifier and the data relating to the network communication session. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. Non-transitory computer storage having stored thereon a plurality of executable instructions configured to cause one or more processors to perform operations comprising:
-
reading an anonymized identifier relating to a user of a computer network, wherein the anonymized identifier does not reveal personal information of the user; identifying first data relating to a network communication session between an external network system and the user; identifying a record of a network request comprising a resource location identifier, the network request being related to the network communication session; generating a second resource location identifier, wherein generating the second resource location identifier comprises stripping personally identifying data from the resource location identifier based on matching one or more patterns against the resource location identifier; and storing the second resource location identifier in association with the anonymized identifier and the data relating to the network communication session.
-
Specification