G06Q30/0615

AUTOMATICALLY DETECTING UNAUTHORIZED RE-IDENTIFICATION
20210342482 · 2021-11-04 · ·

The present disclosure provides systems and methods for automatically detecting third-party re-identification of anonymized computing devices. The method includes retrieving a log of content items provided to anonymized computing devices identifying a first content item provided to a plurality of anonymized computing devices within a first predetermined time period; for each anonymized computing device of the plurality of anonymized computing devices, generating a set of identifications of second content items retrieved by the anonymized computing device prior to receiving the first content item within a second predetermined time period; determining that signals or combinations of signals with a highest predictive ability between a first set of identifications and a second set of identifications exceeds a threshold; identifying a provider of the first content item; and if the signals or combinations of signals with the highest predictive ability exceeds the threshold, preventing, transmission of a request of an anonymized computing device for a content item to the identified provider.

Systems and methods to provide information and services to authorized users
11757863 · 2023-09-12 · ·

Systems and methods are provided to authorize users to anonymously access resources of different web sites. For example, a business listing service may authenticate users and allow the authenticated users to access the resources of the businesses listed via the business listing service, without the users having to create separate accounts with the businesses and without having to reveal the identities of the users to the businesses.

Generating, from data of first location on surface, data for alternate but equivalent second location on the surface

In embodiments, given a surface that has domains on it and a first location, a second location is generated in the surface. The second location belongs in the same domains as the first location, and does not belong in the same domains as the second location. An advantage can be that, in embodiments, the second location can be used in lieu of the first location. A use case can be where it is desired to protect the privacy of location data of an entity, such as its address.

Private cloud user insight privacy

A user-initiated request from a user device of a user is detected. The user-initiated request is directed to a product provider, the user-initiated request includes one or more parameters. an anonymized request is created based on the one or more parameters. The anonymized request is sent to the product provider. A provider response is received from the product provider. A targeted response is generated based on the one or more parameters of the user-initiated request and based on the provider response. The targeted response is transmitted to the user device of the user.

SYSTEMS AND METHODS FOR A COMMERCE PLATFORM COORDINATING TRANSACTIONS WITHIN THIRD PARTY APPLICATIONS

A method and apparatus for a commerce platform coordinating a purchase of a product sold by a merchant system through a third party application are described. The method may include receiving a notification from the third party application requesting to purchase a product from within the third party application, wherein the notification comprises an identifier for the product and an identifier for the merchant system that sells the product. The method may also include a product checkout interface having an appearance consistent with an appearance of a user interface of the third party application, and transmitting the product checkout interface generated by the commerce platform to a user device executing the third party application causing the third party application to render the product checkout interface within at least a portion of the user interface of the third party application.

AUTOMATING DIGITAL ASSET TRANSFERS BASED ON HISTORICAL TRANSACTIONS
20220300952 · 2022-09-22 ·

Systems and methods are disclosed for automating digital asset transfers based on historical transactions. In one implementation, a notification corresponding to a first transaction or operation associated with a first entity is received. Based on the notification, a second transaction or operation is initiated with respect to one or more digital tokens. One or more digital tokens are received in response to the second transaction. At least one of the one or more digital tokens, as secured via one or more cryptographic keys, is stored in a wallet associated with the first entity.

Continuous and anonymous risk evaluation

Techniques for risk evaluation include receiving, from a requesting entity, a request for monitoring target entities specifying a first identifier associated with each target entity and target entity information. The system generates a second identifier and a third identifier for each target entity and stores a mapping of the second identifiers to the first identifiers and the third identifiers, preventing the second identifiers from being provided to the requesting entity. The system monitors a periodically updated data set and determines risk metrics for the target entities, comparing each risk metric to a threshold value to identify target entities whose risk data indicates an insider threat. The system generates a third identifier for the identified target entities and provides the third identifiers to the requesting entity. Responsive to a request for a corresponding first identifier, the system identifies and provides the first and third identifiers to the requesting entity.

Anonymized online shopping system and method and point of sale pricing system and method
11288722 · 2022-03-29 ·

A retail service data center provides client facing web pages to allow users to remotely shop for items to be delivered from local retailers without either the users or the local retailer knowing the identity of each other. A retail service is used by shoppers that searches for items in nearby retail stores' inventory. The retail service allows the retail stores to match, or beat, an advertised price at which a given item is being offered by an online retailer. If the user decides to buy an item, the retail service conducts a first transaction with the retail service, which then uses the funds to buy the item from the local retailer. In addition, the retail service arranges for pick-up and delivery of the item by a local driving service. The identities of the buyer and the retailer are not made known to each other.

MERCHANT-SIDE INTEGRATED SHOPPING CART RECOVERY

A method for merchant-side tracking of customer selections includes receiving, via a user list script on a merchant webpage, a user selection of a product representation displayed on a UI of a user device. The method includes updating a user list with the user selection, the user list associated with a generic user representation. The method includes determining, based on a type of identifier associated with a user of the user device, to use a generic user representation with the user list. The method includes selecting, based on the generic user representation, an anonymous user flow type for tracking the user as an anonymous user of the merchant webpage. The anonymous user flow type associates the user device with the user list independently of associating the user with the merchant.

DISTRIBUTED ORDER BOOK SYSTEM
20220012699 · 2022-01-13 ·

A system is provided for controlling privacy in an exchange of an asset. The system receives an offer query of an offeror that includes an offeror reveal condition, an asset identifier of the asset, and offeror terms of exchange. The system accesses an offeree reveal condition and offeree terms of exchange for the asset. The system determines whether the offeror reveal condition and the offeree reveal condition are satisfied and determines whether the offeror terms of exchange and the offeree terms of exchange are satisfied. When the offeror reveal condition, the offeree reveal condition, the offeror terms of exchange, and the offeree terms of exchange are satisfied, the system reveals the offeror to the offeree and the offeree to the offeror.