Privacy protected interactions with third parties
First Claim
Patent Images
1. A computer-implemented method for facilitating privacy protected interactions between users of an application store site and a third party utility, the method comprising:
- receiving an advertisement from a third party utility by a computer system hosting an application store site storing a database of computer applications and configured to provide user devices access to the applications;
providing, by the application store site to a user device, content for presentation on the user device in responses to the user device accessing the application store site, the content including the advertisement received from the third party utility and information associated with the application store site;
receiving, from the user device by the application store site, a request to communicate with the third party utility;
responsive to receiving the request, accessing a user account database storing user identification information to retrieve user identification information for the user, and generating using an encryption process by the application store site, an encrypted user identification from the retrieved user identification information, the encrypted user identification information requiring a decryption key to decrypt;
providing, by the application store site, the encrypted user identification and the request to the third party utility for processing, wherein the decryption key to decrypt the encrypted user identification is not provided by the application store site to the third party utility; and
storing, by the application store site in a data store, the encrypted user identification.
5 Assignments
0 Petitions
Accused Products
Abstract
Various embodiments are directed to computer-implemented methods and systems for a site to facilitate privacy protected interactions between users of a site and a third party utility. For example, a computer may receiving from a user selected from the users of the site, a request to interact with the third party utility. The computer may also encrypt an identification of the user to generate an encrypted user identification associated with the third party utility; and provide the encrypted user identification and the request to the third party utility.
39 Citations
20 Claims
-
1. A computer-implemented method for facilitating privacy protected interactions between users of an application store site and a third party utility, the method comprising:
-
receiving an advertisement from a third party utility by a computer system hosting an application store site storing a database of computer applications and configured to provide user devices access to the applications; providing, by the application store site to a user device, content for presentation on the user device in responses to the user device accessing the application store site, the content including the advertisement received from the third party utility and information associated with the application store site; receiving, from the user device by the application store site, a request to communicate with the third party utility; responsive to receiving the request, accessing a user account database storing user identification information to retrieve user identification information for the user, and generating using an encryption process by the application store site, an encrypted user identification from the retrieved user identification information, the encrypted user identification information requiring a decryption key to decrypt; providing, by the application store site, the encrypted user identification and the request to the third party utility for processing, wherein the decryption key to decrypt the encrypted user identification is not provided by the application store site to the third party utility; and storing, by the application store site in a data store, the encrypted user identification. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-implemented method for facilitating privacy protected interactions between users of a gaming site and a third party utility, the method comprising:
-
receiving an advertisement from a third party utility by a computer system hosting a gaming site storing a database of computer executable games and configured to provide user devices access to the games; providing, by the gaming site to a user device, content for presentation on the user device in responses to the user device accessing the gaming site, the content including the advertisement received from the third party utility and information associated with the gaming site; receiving, from the user device by the gaming site, a request to communicate with the third party utility; responsive to receiving the request, accessing a user account database storing user identification information to retrieve user identification information for the user, and generating using an encryption process by the gaming site, an encrypted user identification from the retrieved user identification information, the encrypted user identification information requiring a decryption key to decrypt; providing, by the gaming site, the encrypted user identification and the request to the third party utility for processing, wherein the decryption key to decrypt the encrypted user identification is not provided by the gaming site to the third party utility; and storing, by the gaming site in a data store, the encrypted user identification. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A computer-implemented method for facilitating privacy protected interactions between users of a media site and a third party utility, the method comprising:
-
receiving an advertisement from a third party utility by a computer system hosting a media site storing a database of media files and configured to provide user devices access to media files; providing, by the media site to a user device, content for presentation on the user device in responses to the user device accessing the media site, the content including the advertisement received from the third party utility and information associated with the media site; receiving, from the user device by the media site, a request to communicate with the third party utility; responsive to receiving the request, accessing a user account database storing user identification information to retrieve user identification information for the user, and generating using an encryption process by the media site, an encrypted user identification from the retrieved user identification information, the encrypted user identification information requiring a decryption key to decrypt; providing, by the media site, the encrypted user identification and the request to the third party utility for processing, wherein the decryption key to decrypt the encrypted user identification is not provided by the computer system to the third party utility; and storing, by the media site in a data store, the encrypted user identification. - View Dependent Claims (19, 20)
-
Specification