Maintaining privacy during user profiling
First Claim
1. One or more computer-readable device storing computer-useable instructions that, when used by one or more computing devices, causes the one or more computing devices to perform a method, the method comprising:
- receiving, from a first device, one or more rules for profiling a user, where the one or more rules were encrypted using a private key, where encrypting the one or more rules using a private key comprises creating one or more corresponding trapdoors for each of the one or more rules using a private key and building an encrypted rule for each of the one or more rules by replacing each of the one or more rules with the one or more corresponding trapdoors;
receiving, from a second device, user data, where the user data was encrypted using a public key and a random number communicated to the second device by the first device;
matching the encrypted one or more rules with the encrypted user data; and
based on the matching the encrypted one or more rules with the encrypted user data, generating a profile for the user.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods, and computer storage media having computer-executable instructions embodied thereon that maintain privacy during user profiling are provided. A profiling service receives, from a first device, rules for profiling a user. The rules were encrypted using a private key. The profiling service also receives, from a second device, user data. The user data was encrypted using a public key communicated to the second device by the first device. The profiling service then matches the encrypted rules with the encrypted user data, and based on the matching, generates a profile for the user. In embodiments, such a user profile can be utilized to deliver personalized digital content to a user.
-
Citations
20 Claims
-
1. One or more computer-readable device storing computer-useable instructions that, when used by one or more computing devices, causes the one or more computing devices to perform a method, the method comprising:
-
receiving, from a first device, one or more rules for profiling a user, where the one or more rules were encrypted using a private key, where encrypting the one or more rules using a private key comprises creating one or more corresponding trapdoors for each of the one or more rules using a private key and building an encrypted rule for each of the one or more rules by replacing each of the one or more rules with the one or more corresponding trapdoors; receiving, from a second device, user data, where the user data was encrypted using a public key and a random number communicated to the second device by the first device; matching the encrypted one or more rules with the encrypted user data; and based on the matching the encrypted one or more rules with the encrypted user data, generating a profile for the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. One or more computer-readable device storing computer-useable instructions that, when used by one or more computing devices, causes the one or more computing devices to perform a method, the method comprising:
-
receiving, from a first device, one or more encrypted rules for profiling a user, where the one or more rules were generated by the first device based on one or more profile definitions created by the first device and encrypted by the first device using a private key to create trapdoors for the one or more rules that were being encrypted; receiving, from a second device, encrypted user data from a user, where the user data was encrypted using a random number and a public key communicated to the second device by the first device; matching the one or more encrypted rules with the encrypted user data using a pairwise function; and based on the matching the one or more encrypted rules with the encrypted user data, generating a profile for the user.
-
-
11. A method executed by one or more computing devices, the method comprising:
-
receiving, from a first device, one or more rules for profiling a user, where the one or more rules were encrypted using a private key, where encrypting the one or more rules using a private key comprises creating one or more corresponding trapdoors for each of the one or more rules using a private key and building an encrypted rule for each of the one or more rules by replacing each of the one or more rules with the one or more corresponding trapdoors; receiving, from a second device, user data, where the user data was encrypted using a public key and a random number communicated to the second device by the first device; matching the encrypted one or more rules with the encrypted user data; and based on the matching the encrypted one or more rules with the encrypted user data, generating a profile for the user. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method executed by one or more computing devices, the method comprising:
-
receiving, from a first device, one or more encrypted rules for profiling a user, where the one or more rules were generated by the first device based on one or more profile definitions created by the first device and encrypted by the first device using a private key to create trapdoors for the one or more rules that were being encrypted; receiving, from a second device, encrypted user data from a user, where the user data was encrypted using a random number and a public key communicated to the second device by the first device; matching the one or more encrypted rules with the encrypted user data using a pairwise function; and based on the matching the one or more encrypted rules with the encrypted user data, generating a profile for the user.
-
Specification