DATA ANONYMITY SYSTEM
First Claim
1. A method for anonymous data collection, comprising:
- receiving an encrypted operator match ID by a client device from a first entity, wherein the encrypted operator match ID is encrypted using a first encryption key;
decrypting the encrypted operator match ID using a first decryption key, associated with the first encryption key, by the client device to obtain a decrypted operator match ID;
encrypting the decrypted operator match ID using a second encryption key by the client device to obtain a re-encrypted operator match ID; and
sending client device usage information with the re-encrypted operator match ID by the client device to a second entity through an anonymous channel, wherein the second entity decrypts the re-encrypted operator match ID using a second decryption key, associated with the second encryption key, to obtain the operator match ID.
9 Assignments
0 Petitions
Accused Products
Abstract
A method and system for providing data anonymously is provided. The method involves receiving an encrypted operator match ID by a client device from a first entity, where the encrypted operator match ID is encrypted using a first encryption key; decrypting the encrypted operator match ID using a first decryption key, associated with the first encryption key, by the client device to obtain a decrypted operator match ID; encrypting the decrypted operator match ID using a second encryption key by the client device to obtain a re-encrypted operator match ID; and sending the client device usage information with the re-encrypted operator match ID by the client device to a second entity through an anonymous channel, where the second entity decrypts the re-encrypted operator match ID using a second decryption key, associated with the second encryption key, to obtain the operator match ID.
33 Citations
31 Claims
-
1. A method for anonymous data collection, comprising:
-
receiving an encrypted operator match ID by a client device from a first entity, wherein the encrypted operator match ID is encrypted using a first encryption key; decrypting the encrypted operator match ID using a first decryption key, associated with the first encryption key, by the client device to obtain a decrypted operator match ID; encrypting the decrypted operator match ID using a second encryption key by the client device to obtain a re-encrypted operator match ID; and sending client device usage information with the re-encrypted operator match ID by the client device to a second entity through an anonymous channel, wherein the second entity decrypts the re-encrypted operator match ID using a second decryption key, associated with the second encryption key, to obtain the operator match ID. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for providing client device usage information, comprising:
-
receiving an encrypted operator match ID by a client device from a first entity, wherein the encrypted operator match ID is encrypted using an encryption key, wherein data encrypted by the encryption key can be decrypted using a decryption key held by a second entity; forwarding the encrypted operator match ID by the client device with client device usage information from the client device to the second entity; and decrypting the encrypted operator match ID using the decryption key by the second entity.
-
-
12. A computer readable storage medium having encoded instructions which, when executed by one or more processors, cause the one or more processors to perform the steps of:
-
receiving an encrypted operator match ID by a client device from a first entity, wherein the encrypted operator match ID is encrypted using a first encryption key; decrypting the encrypted operator match ID using a first decryption key, associated with the first encryption key, by the client device to obtain a decrypted operator match ID; encrypting the decrypted operator match ID using a second encryption key by the client device to obtain a re-encrypted operator match ID; and sending client device usage information with the re-encrypted operator match ID by the client device to a second entity through an anonymous channel, wherein the second entity decrypts the re-encrypted operator match ID using a second decryption key, associated with the second encryption key, to obtain the operator match ID. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A system for anonymous data collection, comprising:
-
at least one processor, and a computer readable storage medium that includes one or more sequences of instructions, which when executed with the processor, cause the processor to perform the steps of; receiving an encrypted operator match ID by a client device from a first entity, wherein the encrypted operator match ID is encrypted using a first encryption key; decrypting the encrypted operator match ID using a first decryption key, associated with the first encryption key, by the client device to obtain a decrypted operator match ID; encrypting the decrypted operator match ID using a second encryption key by the client device to obtain a re-encrypted operator match ID; and sending the re-encrypted operator match ID and client device usage information by the client device to a second entity through an anonymous channel, wherein the second entity decrypts the re-encrypted operator match ID using a second decryption key, associated with the second encryption key, to obtain the operator match ID. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31)
-
Specification