Systems and methods for providing anonymized user profile data
First Claim
1. A system for anonymously sharing user profile data among a plurality of entities, comprising:
- one or more hardware computing devices configured to at least;
access first user profile data for each of a plurality of first users associated with a first entity;
encrypt, using a particular encryption technique, at least some of the first user profile data into a plurality of first encrypted identifiers representing anonymization of the first user profile data for each respective first user;
receive marketing data associated with a second entity, the marketing data comprising at least a plurality of second encrypted identifiers representing anonymization of second user profile data for each of a plurality of second users associated with the second entity,wherein the plurality of second encrypted identifiers were encrypted using the same particular encryption technique, such that particular users included in both the plurality of first users and the plurality of second users are associated with identical encrypted identifiers;
identify a plurality of matching users based at least in part on locating identical encrypted identifiers from among the first encrypted identifiers and the second encrypted identifiers; and
generate supplemental market segment data including, for each of the plurality of matching users;
(1) a user identifier; and
(2) market segment data associated with each user, wherein the market segment data is from the received marketing data associated with the second entity.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments facilitate confidential and secure sharing of anonymous user profile data to improve the delivery of customized content. Embodiments of the invention provide a data appliance to an entity such as a business to convert profile data about the business'"'"'s customers into anonymous identifiers. A similar data appliance is provided to a content provider in one embodiment to generate identifiers for its user profile data. Because the anonymous identifiers are generated with the same anonymization method, identical identifiers are likely generated from profile data of the same users. Therefore, the identifiers can be used to anonymously match the customers of the business to the users of the content provider. Therefore, data can be shared to improve customized content such as advertisements that the business wishes to place with the content provider without requiring the business to disclose customer data in an unencrypted form, and any non-matched data can remain confidential.
-
Citations
20 Claims
-
1. A system for anonymously sharing user profile data among a plurality of entities, comprising:
one or more hardware computing devices configured to at least; access first user profile data for each of a plurality of first users associated with a first entity; encrypt, using a particular encryption technique, at least some of the first user profile data into a plurality of first encrypted identifiers representing anonymization of the first user profile data for each respective first user; receive marketing data associated with a second entity, the marketing data comprising at least a plurality of second encrypted identifiers representing anonymization of second user profile data for each of a plurality of second users associated with the second entity, wherein the plurality of second encrypted identifiers were encrypted using the same particular encryption technique, such that particular users included in both the plurality of first users and the plurality of second users are associated with identical encrypted identifiers; identify a plurality of matching users based at least in part on locating identical encrypted identifiers from among the first encrypted identifiers and the second encrypted identifiers; and generate supplemental market segment data including, for each of the plurality of matching users; (1) a user identifier; and (2) market segment data associated with each user, wherein the market segment data is from the received marketing data associated with the second entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. A computer-implemented method for anonymously sharing user profile data among a plurality of entities, the method comprising:
under control of a computing device configured with specific computer-executable instructions; accessing first user profile data for each of a plurality of first users associated with a first entity; encrypting, using a particular encryption technique, at least some of the first user profile data into a plurality of first encrypted identifiers representing anonymization of the first user profile data for each respective first user; receiving marketing data associated with a second entity, the marketing data comprising at least a plurality of second encrypted identifiers representing anonymization of second user profile data for each of a plurality of second users associated with the second entity, wherein the plurality of second encrypted identifiers were encrypted using the same particular encryption technique, such that particular users included in both the plurality of first users and the plurality of second users are associated with identical encrypted identifiers; identifying a plurality of matching users based at least in part on locating identical encrypted identifiers from among the first encrypted identifiers and the second encrypted identifiers; and generating supplemental market segment data including, for each of the plurality of matching users; (1) a user identifier; and (2) market segment data associated with each user, wherein the market segment data is from the received marketing data associated with the second entity. - View Dependent Claims (12, 13, 14, 15)
-
16. Non-transitory computer storage having stored thereon a computer program, the computer program including executable instructions that instruct a computer system to at least:
-
access first user profile data for each of a plurality of first users associated with a first entity; encrypt, using a particular encryption technique, at least some of the first user profile data into a plurality of first encrypted identifiers representing anonymization of the first user profile data for each respective first user; receive marketing data associated with a second entity, the marketing data comprising at least a plurality of second encrypted identifiers representing anonymization of second user profile data for each of a plurality of second users associated with the second entity, wherein the plurality of second encrypted identifiers were encrypted using the same particular encryption technique, such that particular users included in both the plurality of first users and the plurality of second users are associated with identical encrypted identifiers; identify a plurality of matching users based at least in part on locating identical encrypted identifiers from among the first encrypted identifiers and the second encrypted identifiers; and generate supplemental market segment data including, for each of the plurality of matching users; (1) a user identifier; and (2) market segment data associated with each user, wherein the market segment data is from the received marketing data associated with the second entity. - View Dependent Claims (17, 18, 19, 20)
-
Specification