Secure data exchange technique
First Claim
Patent Images
1. A suppression system for marketing emails, comprising:
- a marketer system having at least one processor operatively coupled with a memory, the marketer system configured to individually encrypt each email address and pattern of a first set of email addresses and patterns using an encryption scheme to create a first set of encrypted strings; and
a central system remote from the marketer system, the central system having at least one processor operatively coupled with a memory, the central system configured to compare the first set of encrypted strings with a second set of encrypted strings, the second set of encrypted strings generated by individually encrypting each email address and pattern of a second set of email addresses and patterns using the encryption scheme, the central system configured to create indications as to which of the encrypted strings are included in both sets of encrypted strings;
wherein the marketer system is configured to suppress sending emails to a subset of email addresses of the first set of email addresses and patterns based on the indications, and wherein the patterns comprise regular expressions.
6 Assignments
0 Petitions
Accused Products
Abstract
Techniques utilizing common encryption approaches for data from multiple parties enable those parties to discover information that is held in common by the parties without disclosing to any party information that is not held in common by the parties. Encrypted information for each party can be compared to determine which encrypted values match, and those encrypted values can be returned to any of the parties such that a party can determine which corresponding data the parties have in common without having access to any other data of any other parties.
-
Citations
20 Claims
-
1. A suppression system for marketing emails, comprising:
-
a marketer system having at least one processor operatively coupled with a memory, the marketer system configured to individually encrypt each email address and pattern of a first set of email addresses and patterns using an encryption scheme to create a first set of encrypted strings; and a central system remote from the marketer system, the central system having at least one processor operatively coupled with a memory, the central system configured to compare the first set of encrypted strings with a second set of encrypted strings, the second set of encrypted strings generated by individually encrypting each email address and pattern of a second set of email addresses and patterns using the encryption scheme, the central system configured to create indications as to which of the encrypted strings are included in both sets of encrypted strings; wherein the marketer system is configured to suppress sending emails to a subset of email addresses of the first set of email addresses and patterns based on the indications, and wherein the patterns comprise regular expressions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A suppression system for marketing emails, comprising:
-
a marketer system having at least one processor operatively coupled with a memory, the marketer system configured to individually encrypt each email address of a first set of email addresses using an encryption scheme to create a first set of encrypted strings; and a central system remote from the marketer system, the central system having at least one processor operatively coupled with a memory, the central system configured to compare the first set of encrypted strings with a second set of encrypted strings, the second set of encrypted strings generated by individually encrypting each email address of a second set of email addresses using the encryption scheme, the central system configured to create indications as to which of the encrypted strings are included in both sets of encrypted strings, the central system configured to encrypt the second set of encrypted strings from the second set of email addresses; wherein the marketer system is configured to suppress sending emails to a subset of email addresses of the first set based on the indications.
-
-
11. A non-transitory computer readable medium comprising code executable by a processor to perform a method comprising:
-
individually encrypting on a marketer system each email address and pattern of a first set of email addresses and patterns using an encryption scheme to create a first set of encrypted strings; and comparing on central system remote from the marketer system the first set of encrypted strings with a second set of encrypted strings, the second set of encrypted strings generated by individually encrypting each email address and pattern of a second set of email addresses and patterns using the encryption scheme, the central system configured to create indications as to which of the encrypted strings are included in both sets of encrypted strings; wherein the marketer system is configured to suppress sending emails to a subset of email addresses of the first set based on the indications, and wherein the patterns comprise regular expressions. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification