Systems, methods and computer program products for providing compliant delivery of content, applications and/or solutions
First Claim
Patent Images
1. A method of providing device independent compliant applications, the method comprising:
- receiving device data corresponding to a mobile device that is operable to be connected to a solution provider, wherein the mobile device is at least one of a cell phone or a personal digital assistant (PDA);
receiving user data corresponding to the user of the mobile device, wherein user data includes communication related data and personal identification data corresponding to the user, wherein the communication related data includes mobile device identification data corresponding to the mobile device;
receiving peripheral interface data that corresponds to peripheral devices that may interface with the mobile device corresponding to a user function, wherein peripheral interface data includes peripheral interface identification information;
associating the device data, the user data and the peripheral interface data with a unique identifier;
encrypting at least a portion of the device data, the user data, and/or the peripheral interface data;
storing the unique identifier and at least a portion of the device data, the user data and/or the peripheral data;
de-identifying the user by storing the unique identifier separate from the device data, the user data and/or the peripheral data; and
updating the device data, the user data and/or the peripheral interface data by setting a flag to update the device data, the user data and/or the peripheral interface data the next time the device is communicatively coupled to a solution provider,wherein the user is de-identified relative to the device data, the user data, and the peripheral data and the device data, the user data and the peripheral data are available for use in subsequent analyses,wherein at least one of receiving device data, receiving user data, receiving peripheral interface data, associating the device data, the user data and the peripheral interface data, the encrypting and the storing is performed using at least one processor.
4 Assignments
0 Petitions
Accused Products
Abstract
Systems, methods and computer program products for providing device independent compliant applications include accumulating device, user and/or peripheral interface data corresponding to a mobile terminal of a user and associating the device, user and/or peripheral interface data with a unique identifier and storing the device, user and/or peripheral interface data and the unique identifier in a database. Before storing the device, user and/or peripheral interface data, the device, user and/or peripheral interface data is de-identified from the user.
47 Citations
29 Claims
-
1. A method of providing device independent compliant applications, the method comprising:
-
receiving device data corresponding to a mobile device that is operable to be connected to a solution provider, wherein the mobile device is at least one of a cell phone or a personal digital assistant (PDA); receiving user data corresponding to the user of the mobile device, wherein user data includes communication related data and personal identification data corresponding to the user, wherein the communication related data includes mobile device identification data corresponding to the mobile device; receiving peripheral interface data that corresponds to peripheral devices that may interface with the mobile device corresponding to a user function, wherein peripheral interface data includes peripheral interface identification information; associating the device data, the user data and the peripheral interface data with a unique identifier; encrypting at least a portion of the device data, the user data, and/or the peripheral interface data; storing the unique identifier and at least a portion of the device data, the user data and/or the peripheral data; de-identifying the user by storing the unique identifier separate from the device data, the user data and/or the peripheral data; and updating the device data, the user data and/or the peripheral interface data by setting a flag to update the device data, the user data and/or the peripheral interface data the next time the device is communicatively coupled to a solution provider, wherein the user is de-identified relative to the device data, the user data, and the peripheral data and the device data, the user data and the peripheral data are available for use in subsequent analyses, wherein at least one of receiving device data, receiving user data, receiving peripheral interface data, associating the device data, the user data and the peripheral interface data, the encrypting and the storing is performed using at least one processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 29)
-
-
19. A method of providing device independent compliant applications, the method comprising:
-
accumulating device, user and peripheral interface data corresponding to a mobile terminal of a user, wherein the mobile terminal is at least one of a cell phone or a personal digital assistant (PDA); associating the device, user and peripheral interface data with a unique identifier and storing the device, user and peripheral interface data and the unique identifier in a database; before storing the device, user and peripheral interface data, de-identifying the device, user and peripheral interface data based on the association with the unique identifier by storing the unique identifier separate from the device data, the user data and/or the peripheral data; and updating the device data, the user data and/or the peripheral interface data by setting a flag to update the device data, the user data and/or the peripheral interface data the next time the device is communicatively coupled to a solution provider, wherein the user is de-identified relative to the device data, the user data, and the peripheral data and the device data, the user data and the peripheral data are available for use in subsequent analyses, and wherein at least one of accumulating the device, user and peripheral interface data, associating the device, user and peripheral interface data with the unique identifier, and before storing the device, user and peripheral interface data, de-identifying the device, user and peripheral interface data is performed using at least one processor. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28)
-
Specification