Methods and systems of generating a unique mobile device identifier
First Claim
1. A method of generating a user identifier, the method comprising:
- identifying, by a client stored in a memory of a device and executable by a processor of the device, that the client does not have a device identifier associated with the device, wherein the device identifier is a device system identifier unique to the device;
requesting, by the client, the device identifier from the device in response to identifying that the client does not have the device identifier;
receiving, by the client, the device identifier;
masking, by the client, the device identifier with client logic; and
generating, by the client, the user identifier based on the masking, wherein the user identifier is unique to the device, and wherein the user identifier is attached to one or more interactions with one or more applications used by the device.
6 Assignments
0 Petitions
Accused Products
Abstract
A method of generating a user identifier is disclosed. The method comprises identifying, by a client, that the client does not have a device identifier associated with the device, wherein the device identifier is a device system identifier unique to the device. The method also comprises requesting, by the client, the device identifier from the device in response to identifying that the client does not have the device identifier. The method further comprises receiving, by the client, the device identifier. The method also comprises masking, by the client, the device identifier with client logic. The method further comprises generating, by the client, the user identifier based on masking, wherein the user identifier is unique to the device, and wherein the user identifier is attached to one or more interactions with one or more applications used by the device.
188 Citations
20 Claims
-
1. A method of generating a user identifier, the method comprising:
-
identifying, by a client stored in a memory of a device and executable by a processor of the device, that the client does not have a device identifier associated with the device, wherein the device identifier is a device system identifier unique to the device; requesting, by the client, the device identifier from the device in response to identifying that the client does not have the device identifier; receiving, by the client, the device identifier; masking, by the client, the device identifier with client logic; and generating, by the client, the user identifier based on the masking, wherein the user identifier is unique to the device, and wherein the user identifier is attached to one or more interactions with one or more applications used by the device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of providing an identifier, the method comprising:
-
identifying, by a proxy comprising a processor and a memory, a record of one or more interactions with one or more applications used by a device, wherein a user identifier is attached to the record, and wherein the user identifier is a device system identifier unique to the device; obtaining, by the proxy, the record of the one or more interactions with the one or more applications used by the device with the attached user identifier; masking, by the proxy, the user identifier with a date to generate an information identifier; and providing, by the proxy, the record of the one or more interactions with the one or more applications used by the device to one or more suppliers, wherein the information identifier is attached to the record replacing the user identifier. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method of classification a device user, the method comprising:
-
detecting, by a classification application stored in a memory of a classification server and executable by a processor of the classification server, a first set of one or more interactions with one or more applications on a device, wherein the first set of one or more interactions are detected by the classification application through a network interface; identifying, by the classification application, a pattern of detecting one or more of the same interactions of the first set of one or more interactions with the one or more applications on the device; generating, by the classification application, a token based on the pattern of detecting the one or more of the same interactions; and attaching, by the classification application, the token to a record of a second set of one or more interactions with the one or more applications on the device. - View Dependent Claims (19, 20)
-
Specification