Content-based association of device to user
First Claim
Patent Images
1. A method comprising:
- accessing, by one or more hardware processors, metadata of content items accessible by a device on which applications are executable, the content items including distinct and overlapping first and second portions of the content items;
generating, by the one or more hardware processors executing a first module, a first identifier based on first metadata that describes the first portion of the content items, the first module corresponding to a first application whose access to the content items is limited to the first portion;
providing the first identifier to a server machine configured to assign the first identifier to a user identifier;
generating, by the one or more hardware processors executing a second module, a second identifier based on second metadata that describes the second portion of the content items, the second module corresponding to a second application whose access to the content items is limited to the second portion; and
providing the second identifier to the server machine configured to;
determine that the first and second portions are overlapping portions of the content items, based on the provided first and second identifiers; and
assign the user identifier to the second identifier based on the first and second portions being overlapping portions of the content items.
12 Assignments
0 Petitions
Accused Products
Abstract
Example methods and systems for content-based association of a device to a user are presented. In an example method, data corresponding to each of a plurality of items of content stored within a user device are accessed. A device identifier for the user device is generated based on the data. The device identifier is transmitted from the user device to a service device to associate the user device with a user.
44 Citations
20 Claims
-
1. A method comprising:
-
accessing, by one or more hardware processors, metadata of content items accessible by a device on which applications are executable, the content items including distinct and overlapping first and second portions of the content items; generating, by the one or more hardware processors executing a first module, a first identifier based on first metadata that describes the first portion of the content items, the first module corresponding to a first application whose access to the content items is limited to the first portion; providing the first identifier to a server machine configured to assign the first identifier to a user identifier; generating, by the one or more hardware processors executing a second module, a second identifier based on second metadata that describes the second portion of the content items, the second module corresponding to a second application whose access to the content items is limited to the second portion; and providing the second identifier to the server machine configured to; determine that the first and second portions are overlapping portions of the content items, based on the provided first and second identifiers; and assign the user identifier to the second identifier based on the first and second portions being overlapping portions of the content items. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
one or more processors; and a memory storing instructions that, when executed by at least one processor among the one or more processors, cause the system to perform operations comprising; accessing metadata of content items accessible by a device on which applications are executable, the content items including distinct and overlapping first and second portions of the content items; generating, by a first module, a first identifier based on first metadata that describes the first portion of the content items, the first module corresponding to a first application whose access to the content items is limited to the first portion; providing the first identifier to a server machine configured to assign the first identifier to a user identifier; generating, by a second module, a second identifier based on second metadata that describes the second portion of the content items, the second module corresponding to a second application whose access to the content items is limited to the second portion; and providing the second identifier to the server machine configured to; determine that the first and second portions are overlapping portions of the content items, based on the provided first and second identifiers; and assign the user identifier to the second identifier based on the first and second portions being overlapping portions of the content items.
-
-
10. A non-transitory machine-readable storage medium comprising instructions that, when executed by one or more processors of a machine, cause the machine to perform operations comprising:
-
accessing metadata of content items accessible by a device on which applications are executable, the content items including distinct and overlapping first and second portions of the content items; generating, by a first module, a first identifier based on first metadata that describes the first portion of the content items, the first module corresponding to a first application whose access to the content items is limited to the first portion; providing the first identifier to a server machine configured to assign the first identifier to a user identifier; generating, by a second module, a second identifier based on second metadata that describes the second portion of the content items, the second module corresponding to a second application whose access to the content items is limited to the second portion; and providing the second identifier to the server machine configured to; determine that the first and second portions are overlapping portions of the content items, based on the provided first and second identifiers; and assign the user identifier to the second identifier based on the first and second portions being overlapping portions of the content items.
-
-
11. A method comprising:
-
receiving, by one or more hardware processors, a first identifier generated based on first metadata that describes a first portion of content items accessible by a device on which applications are executable, the content items including a distinct second portion that overlaps the first portion, the first identifier being generated by a first module that corresponds to a first application whose access to the content items is limited to the first portion; assigning, by the one or more hardware processors, the first identifier to a user identifier; receiving, by the one or more hardware processors, a second identifier generated based on second metadata that describes the second portion of the content items, the second identifier being generated by a second module that corresponds to a second application whose access to the content items is limited to the second portion; determining, by the one or more hardware processors, that the first and second portions are overlapping portions of the content items accessible by the device, the determining being based on the received first and second identifiers; and assigning, by the one or more hardware processors, the user identifier to the second identifier based on the first and second portions being overlapping portions of the content items. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
one or more processors; and a memory storing instructions that, when executed by at least one processor among the one or more processors, cause the system to perform operations comprising; receiving a first identifier generated based on first metadata that describes a first portion of content items accessible by a device on which applications are executable, the content items including a distinct second portion that overlaps the first portion, the first identifier being generated by a first module that corresponds to a first application whose access to the content items is limited to the first portion; assigning the first identifier to a user identifier; receiving a second identifier generated based on second metadata that describes the second portion of the content items, the second identifier being generated by a second module that corresponds to a second application whose access to the content items is limited to the second portion; determining that the first and second portions are overlapping portions of the content items accessible by the device, the determining being based on the received first and second identifiers; and assigning the user identifier to the second identifier based on the first and second portions being overlapping portions of the content items.
-
-
20. A non-transitory machine-readable storage medium comprising instructions that, when executed by one or more processors of a machine, cause the machine to perform operations comprising:
-
receiving a first identifier generated based on first metadata that describes a first portion of content items accessible by a device on which applications are executable, the content items including a distinct second portion that overlaps the first portion, the first identifier being generated by a first module that corresponds to a first application whose access to the content items is limited to the first portion; assigning the first identifier to a user identifier; receiving a second identifier generated based on second tnetadata that describes the second portion of the content items, the second identifier being generated by a second module that corresponds to a second application whose access to the content items is limited to the second portion; determining that the first and second portions are overlapping portions of the content items accessible by the device, the determining being based on the received first and second identifiers; and assigning the user identifier to the second identifier based on the first and second portions being overlapping portions of the content items.
-
Specification