×

Systems, methods and computer program products for providing compliant delivery of content, applications and/or solutions

  • US 9,075,900 B2
  • Filed: 04/30/2012
  • Issued: 07/07/2015
  • Est. Priority Date: 05/18/2011
  • Status: Active Grant
First Claim
Patent Images

1. A method of providing device independent compliant applications, the method comprising:

  • receiving device data corresponding to a mobile device that is operable to be connected to a solution provider, wherein the mobile device is at least one of a cell phone or a personal digital assistant (PDA);

    receiving user data corresponding to the user of the mobile device, wherein user data includes communication related data and personal identification data corresponding to the user, wherein the communication related data includes mobile device identification data corresponding to the mobile device;

    receiving peripheral interface data that corresponds to peripheral devices that may interface with the mobile device corresponding to a user function, wherein peripheral interface data includes peripheral interface identification information;

    associating the device data, the user data and the peripheral interface data with a unique identifier;

    encrypting at least a portion of the device data, the user data, and/or the peripheral interface data;

    storing the unique identifier and at least a portion of the device data, the user data and/or the peripheral data;

    de-identifying the user by storing the unique identifier separate from the device data, the user data and/or the peripheral data; and

    updating the device data, the user data and/or the peripheral interface data by setting a flag to update the device data, the user data and/or the peripheral interface data the next time the device is communicatively coupled to a solution provider,wherein the user is de-identified relative to the device data, the user data, and the peripheral data and the device data, the user data and the peripheral data are available for use in subsequent analyses,wherein at least one of receiving device data, receiving user data, receiving peripheral interface data, associating the device data, the user data and the peripheral interface data, the encrypting and the storing is performed using at least one processor.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×