Data anonymity system
First Claim
1. A method for anonymous data collection, comprising:
- receiving, at a client device from a first entity, an encrypted operator match ID corresponding to the client device, wherein the encrypted operator match ID is encrypted using a first encryption key;
decrypting the encrypted operator match ID using a first decryption key, associated with the first encryption key, by the client device to obtain a decrypted operator match ID;
encrypting the decrypted operator match ID using a second encryption key by the client device to obtain a re-encrypted operator match ID; and
sending, by the client device to a second entity, client device usage information for the client device and the re-encrypted operator match ID;
wherein the second entity decrypts the re-encrypted operator match ID using a second decryption key, associated with the second encryption key, to obtain an operator match ID.
9 Assignments
0 Petitions
Accused Products
Abstract
A method and system for providing data anonymously is provided. The method involves receiving an encrypted operator match ID by a client device from a first entity, where the encrypted operator match ID is encrypted using a first encryption key; decrypting the encrypted operator match ID using a first decryption key, associated with the first encryption key, by the client device to obtain a decrypted operator match ID; encrypting the decrypted operator match ID using a second encryption key by the client device to obtain a re-encrypted operator match ID; and sending the client device usage information with the re-encrypted operator match ID by the client device to a second entity through an anonymous channel, where the second entity decrypts the re-encrypted operator match ID using a second decryption key, associated with the second encryption key, to obtain the operator match ID.
-
Citations
33 Claims
-
1. A method for anonymous data collection, comprising:
-
receiving, at a client device from a first entity, an encrypted operator match ID corresponding to the client device, wherein the encrypted operator match ID is encrypted using a first encryption key; decrypting the encrypted operator match ID using a first decryption key, associated with the first encryption key, by the client device to obtain a decrypted operator match ID; encrypting the decrypted operator match ID using a second encryption key by the client device to obtain a re-encrypted operator match ID; and sending, by the client device to a second entity, client device usage information for the client device and the re-encrypted operator match ID; wherein the second entity decrypts the re-encrypted operator match ID using a second decryption key, associated with the second encryption key, to obtain an operator match ID. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for providing client device usage information, comprising:
-
receiving, at a client device from a first entity, an encrypted operator match ID corresponding to the client device, wherein the encrypted operator match ID is encrypted using an encryption key, wherein data encrypted by the encryption key can be decrypted using a decryption key held by a second entity; forwarding, by the client device to the second entity, the encrypted operator match ID and client device usage information for the client device, wherein the client device usage information identifies prior usage of the client device; and decrypting the encrypted operator match ID using the decryption key by the second entity.
-
-
12. A non-transitory computer readable storage medium having encoded instructions which, when executed by one or more processors, cause the one or more processors to perform the steps of:
-
receiving, at a client device from a first entity, an encrypted operator match ID corresponding to the client device, wherein the encrypted operator match ID is encrypted using a first encryption key; decrypting the encrypted operator match ID using a first decryption key, associated with the first encryption key, by the client device to obtain a decrypted operator match ID; encrypting the decrypted operator match ID using a second encryption key by the client device to obtain a re-encrypted operator match ID; and sending, by the client device to a second entity, client device usage information for the client device and the re-encrypted operator match ID; wherein the second entity decrypts the re-encrypted operator match ID using a second decryption key, associated with the second encryption key, to obtain an operator match ID. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system for anonymous data collection, comprising:
-
a subsystem, implemented at least partially in hardware, of a client device, that receives, from a first entity, an encrypted operator match ID corresponding to the client device, wherein the encrypted operator match ID is encrypted using a first encryption key; a subsystem, implemented at least partially in hardware, of the client device, that decrypts the encrypted operator match ID using a first decryption key, associated with the first encryption key, to obtain a decrypted operator match ID; a subsystem, implemented at least partially in hardware, of the client device, that encrypts the decrypted operator match ID using a second encryption key to obtain a re-encrypted operator match ID; and a subsystem, implemented at least partially in hardware, of the client device, that sends, to a second entity, client device usage information for the client device and the re-encrypted operator match ID; wherein the second entity is configured to decrypt the re-encrypted operator match ID using a second decryption key, associated with the second encryption key, to obtain an operator match ID. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A non-transitory computer readable storage medium having encoded instructions which, when executed by one or more processors, cause the one or more processors to perform the steps of:
-
receiving, at a client device from a first entity, an encrypted operator match ID corresponding to the client device, wherein the encrypted operator match ID is encrypted using an encryption key, wherein data encrypted by the encryption key can be decrypted using a decryption key held by a second entity; forwarding, by the client device to the second entity, the encrypted operator match ID and client device usage information for the client device, wherein the client device usage information identifies prior usage of the client device; and decrypting the encrypted operator match ID using the decryption key by the second entity.
-
-
33. A system for anonymous data collection, comprising:
-
a subsystem, implemented at least partially in hardware, of a client device, that receives from a first entity, an encrypted operator match ID corresponding to the client device, wherein the encrypted operator match ID is encrypted using an encryption key, wherein data encrypted by the encryption key can be decrypted using a decryption key held by a second entity; a subsystem, implemented at least partially in hardware, of the client device, that forwards, to the second entity, the encrypted operator match ID and client device usage information for the client device, wherein the client device usage information identifies prior usage of the client device; and a subsystem, implemented at least partially in hardware, of the second entity, that decrypts the encrypted operator match ID using the decryption key.
-
Specification