Privacy centric feature analysis for mobile devices
First Claim
1. A computer-implemented method for feature analysis, the method comprising:
- generating multiple mapped features wherein each respective mapped feature maps a sharable feature to a matching criterion for an item of protected information;
selecting a secure set of two or more mapped features at a feature analysis system by determining that no combination of sharable features in the secure set is unique to an item of protected information;
providing the secure set to a mobile device;
providing privacy compliance instructions to the mobile device for execution at the mobile device wherein the privacy compliance instructions comprise instructions for;
selecting a mapped feature from a received secure set of two or more mapped features by identifying an item of protected information available to the mobile device which corresponds to at least one matching criterion found in the received secure set; and
identifying a sharable feature of the selected mapped feature; and
sending the sharable feature of the selected mapped feature to a privacy compliant destination.
14 Assignments
0 Petitions
Accused Products
Abstract
Privacy centric feature analysis. A secure set of multiple mapped features is selected and provided to a mobile device. Each mapped feature maps a sharable feature to a matching criterion for an item of protected information and no combination of mapped features for a secure set are unique to an individual item of protected information. Privacy compliance instructions enable the mobile device to select a mapped feature from a received set of mapped features by identifying an item of protected information available to the mobile device which corresponds to a matching criterion found in the received set of mapped features. The sharable feature of the selected mapped feature is identified and sent to a privacy compliant destination. Advantageously, the analysis system protects the privacy of the mobile device user because it does not require the mobile device to relay protected information for the selection of customized content or relevant advertisements.
-
Citations
17 Claims
-
1. A computer-implemented method for feature analysis, the method comprising:
-
generating multiple mapped features wherein each respective mapped feature maps a sharable feature to a matching criterion for an item of protected information; selecting a secure set of two or more mapped features at a feature analysis system by determining that no combination of sharable features in the secure set is unique to an item of protected information; providing the secure set to a mobile device; providing privacy compliance instructions to the mobile device for execution at the mobile device wherein the privacy compliance instructions comprise instructions for; selecting a mapped feature from a received secure set of two or more mapped features by identifying an item of protected information available to the mobile device which corresponds to at least one matching criterion found in the received secure set; and identifying a sharable feature of the selected mapped feature; and sending the sharable feature of the selected mapped feature to a privacy compliant destination. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer readable storage medium executing computer program instructions for feature analysis, the computer program instructions comprising instructions for:
-
generating multiple mapped features wherein each respective mapped feature maps a sharable feature to a matching criterion for an item of protected information; selecting a secure set of two or more mapped features at a feature analysis system by determining that no combination of sharable features in the secure set is unique to an item of protected information; providing the secure set to a mobile device; providing privacy compliance instructions to the mobile device for execution at the mobile device wherein the privacy compliance instructions comprise instructions for; selecting a mapped feature from a received secure set of two or more mapped features by identifying an item of protected information available to the mobile device which corresponds to at least one matching criterion found in the received secure set; and identifying a sharable feature of the selected mapped feature; and sending the sharable feature of the selected mapped feature to a privacy compliant destination. - View Dependent Claims (12, 13, 14)
-
-
15. A system comprising:
-
a processor; a computer readable storage medium storing processor-executable computer program instructions for feature analysis, the instructions comprising instructions for; generating multiple mapped features wherein one mapped feature maps a sharable feature to a matching criterion for an item of protected information; selecting a secure set of two or more mapped features by determining that no combination of sharable features in the secure set is unique to an item of protected information; providing the secure set to a mobile device; providing privacy compliance instructions to the mobile device for execution at the mobile device wherein the privacy compliance instructions comprise instructions for; selecting a mapped feature from a received secure set of two or more mapped features by identifying an item of protected information available to the mobile device which corresponds to at least one matching criterion found in the received secure set; and identifying a sharable feature of the selected mapped feature; and sending the sharable feature of the selected mapped feature to a privacy compliant destination. - View Dependent Claims (16, 17)
-
Specification