Method and system for anonymous reporting
First Claim
1. A computer implemented method for anonymous reporting, in a system for targeted data delivery, comprising:
- collecting, by said computer, user information about a user from at least one electronic device associated with said user;
generating, by said computer, a user profile based on said user information;
storing, by said computer, said user profile, wherein delivery of data is targeted to said user based on said user profile; and
anonymously reporting, by said computer, user activity related to said targeted data, comprising;
aggregating, by said computer, metric information associated with said user activity from a plurality of users;
generating, by said computer, an encrypted number and transmitting said encrypted number to a third party;
receiving, by said computer, an encrypted blind digital signature of said encrypted number from said third party;
generating, by said computer, a signed authorization number by decrypting said encrypted blind digital signature, wherein said signed authorization number is signed by said third party but unknown to said third party;
attaching, by said computer, said signed authorization number to a report detailing said user activity; and
sending, by said computer, said report with said signed authorization number to said third party to preserve reporting privacy of said user, wherein said third party authenticates said report using said signed authorization number.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for anonymous reporting. Specifically, the method includes collecting user information about a user and generating a user profile based on the user information. The user profile is stored such that the user profile is used to achieve delivery of data that is targeted to the user based on the user profile without requiring a release of user information in the user profile. A signed authorization number is generated. The signed authorization number is signed by the third party but unknown to the third party. The signed authorization number is attached to a report detailing activities of the user. The report along with the signed authorization number is sent to the third party to preserve reporting privacy of the user. The third party is able to authenticate the report using the signed authorization number.
109 Citations
20 Claims
-
1. A computer implemented method for anonymous reporting, in a system for targeted data delivery, comprising:
-
collecting, by said computer, user information about a user from at least one electronic device associated with said user; generating, by said computer, a user profile based on said user information; storing, by said computer, said user profile, wherein delivery of data is targeted to said user based on said user profile; and anonymously reporting, by said computer, user activity related to said targeted data, comprising; aggregating, by said computer, metric information associated with said user activity from a plurality of users; generating, by said computer, an encrypted number and transmitting said encrypted number to a third party; receiving, by said computer, an encrypted blind digital signature of said encrypted number from said third party; generating, by said computer, a signed authorization number by decrypting said encrypted blind digital signature, wherein said signed authorization number is signed by said third party but unknown to said third party; attaching, by said computer, said signed authorization number to a report detailing said user activity; and sending, by said computer, said report with said signed authorization number to said third party to preserve reporting privacy of said user, wherein said third party authenticates said report using said signed authorization number. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer implemented method for authenticating communication, in a system for targeted data delivery, comprising:
-
generating, by said computer, an encrypted blind digital signature by signing an encrypted number received from a client associated with a user, at a third party, wherein said encrypted blind digital signature is unencrypted to generate a signed authorization number verifiable by said third party but unknown to said third party, and wherein delivery of data is targeted to said user based on a user profile associated with said user defining user characteristics that satisfy selection criteria associated with said data; sending, by said computer, said encrypted blind digital signature to said client, wherein said client generates said signed authorization number through decryption of said encrypted blind digital signature; receiving, by said computer, a communication from an anonymous source, wherein said communication is authenticated with said signed authorization number and comprises a report aggregating from a plurality of users metric information associated with user activity related to said targeted data; and authenticating, by said computer, said communication using said signed authorization number. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium containing application instructions where said application instructions when executed effect a method for anonymous reporting, comprising:
-
collecting user information about a user from at least one electronic device associated with said user; generating a user profile based on said user information; storing said user profile, wherein delivery of data is targeted to said user based on said user profile; and anonymously reporting user activity related to said targeted data, comprising; collecting metric information associated with said user activity in aggregate from a plurality of users; generating an encrypted number and transmitting said encrypted number to a third party; receiving an encrypted blind digital signature of said encrypted number from said third party; generating a signed authorization number by decrypting said encrypted blind digital signature, wherein said signed authorization number is signed by said third party but unknown to said third party; attaching said signed authorization number to a report detailing said user activity; and sending said report with said signed authorization number to said third party to preserve reporting privacy of said user, wherein said third party authenticates said report using said signed authorization number. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification