Patent classifications
G06Q30/0615
Partner encoding of anonymous links to protect consumer privacy
A method and system for bringing together online and offline advertising uses partner-encoded anonymous links that are associated with consumer data. The partner-encoded anonymous links allow processing without personally identifiable information (PII) in a secure environment. Data is matched using identifiers that are encrypted for use in connection with individual match distribution partners. The method and system allows a marketer to utilize offline data to precisely target advertisements without the use of PII, and to perform analytics concerning the use of the online advertisements to more precisely determine the effectiveness of multichannel marketing efforts.
Merchant-side integrated shopping cart recovery
A method for merchant-side tracking of customer selections includes receiving, via a user list script on a merchant webpage, a user selection of a product representation displayed on a UI of a user device. The method includes updating a user list with the user selection, the user list associated with a generic user representation. The method includes determining, based on a type of identifier associated with a user of the user device, to use a generic user representation with the user list. The method includes selecting, based on the generic user representation, an anonymous user flow type for tracking the user as an anonymous user of the merchant webpage. The anonymous user flow type associates the user device with the user list independently of associating the user with the merchant.
CONTINUOUS AND ANONYMOUS RISK EVALUATION
Techniques for risk evaluation include receiving, from a requesting entity, a request for monitoring target entities specifying a first identifier associated with each target entity and target entity information. The system generates a second identifier and a third identifier for each target entity and stores a mapping of the second identifiers to the first identifiers and the third identifiers, preventing the second identifiers from being provided to the requesting entity. The system monitors a periodically updated data set and determines risk metrics for the target entities, comparing each risk metric to a threshold value to identify target entities whose risk data indicates an insider threat. The system generates a third identifier for the identified target entities and provides the third identifiers to the requesting entity. Responsive to a request for a corresponding first identifier, the system identifies and provides the first and third identifiers to the requesting entity.
SYSTEMS AND METHODS FOR SELLING CONTENT OVER A NETWORK
A method to generate revenue from supplied content is provided. Content is provided to a consumer via a network by providing a content service that allows the consumer to select and retrieve content as a package together with a clearing of the selectable content to an operator used by the consumer to select and retrieve the content via the network. Any content selected by the consumer is supplied directly to the consumer via the operator. The operator is charged for the supplied content.
Methods and systems for a private market: facilitating connections between buyers and sellers or exchangers of products and services while maintaining privacy
A system and method are described that facilitate bilateral private interaction between participants who wish to initiate personal or business arrangements anonymously or without exposure except to identified trusted parties and the system and method act as an intermediary allowing the participants, typically buyers and sellers, to be matched based upon requests for and offers of goods and services, without revealing the identity or other identifying information about either the items or the participants until the participants choose to reveal that information.
SYSTEM FOR CONTROLLING USER INTERACTION VIA AN APPLICATION WITH REMOTE SERVERS
A computer-implemented method of providing one or more selected tracking tags to a domain owner server for deployment on a website is described. The one or more tracking tags are selected from a set of available tracking tags and the method comprises: storing the set of available tracking tags, each available tracking tag including a purpose parameter describing a use to which data collected by the available tracking tag will be put; storing a plurality of user identifiers and a plurality of sets of tag-selection parameters, each user identifier identifying a website user and having an associated set of tag-selection parameters which identity a specific tracking tag and indicate whether a user consent has been obtained for a specific purpose of the specific tag; receiving, from the domain owner server, a request for deployment of one or more tracking tags on the website, the request including a received user identifier identifying a user accessing the website; for a user identifier corresponding to the received user identifier, comparing the tag-parameters for each specific tracking tag to the purpose parameter of each corresponding available tracking tag; selecting available tracking tags where the purpose parameter of the available tracking tag corresponds to a specific purpose which has an indication of user consent in the corresponding tag-selection parameters; and transmitting the selected available tracking tags to the domain owner server for deployment on the website.
Automatically detecting unauthorized re-identification
The present disclosure provides systems and methods for automatically detecting third-party re-identification of anonymized computing devices. The method includes retrieving a log of content items provided to anonymized computing devices identifying a first content item provided to a plurality of anonymized computing devices within a first predetermined time period; for each anonymized computing device of the plurality of anonymized computing devices, generating a set of identifications of second content items retrieved by the anonymized computing device prior to receiving the first content item within a second predetermined time period; determining that signals or combinations of signals with a highest predictive ability between a first set of identifications and a second set of identifications exceeds a threshold; identifying a provider of the first content item; and if the signals or combinations of signals with the highest predictive ability exceeds the threshold, preventing, transmission of a request of an anonymized computing device for a content item to the identified provider.
SYSTEMS AND METHODS FOR CUSTOMER IDENTITY PROTECTION FROM SERVICE OR PRODUCT PROVIDERS
Systems and methods for systems and methods for customer identity protection from service or product providers are disclosed. In one embodiment, a method may include: receiving, by a trusted third-party and from a customer, a request for a verified vendor token for a vendor of a good or service; generating, by the trusted third-party, the verified vendor token comprising a unique identifier; mapping, by the trusted third-party, the unique identifier to a customer identifier; receiving, by the trusted third-party and from the vendor, the verified vendor token, verifying, by the trusted third-party, that the verified vendor token is valid; confirming, by the trusted third-party, a payment relationship with the vendor; receiving, by the trusted third-party and from the vendor, the verified vendor token and an invoice for the good or service; and issuing, by the trusted third-party, payment for the good or service to the vendor.
SYSTEMS AND METHOD FOR SELLING CONTENT OVER A NETWORK
A method to generate revenue from supplied content is provided. Content is provided to a consumer via a network by providing a content service that allows the consumer to select and retrieve content as a package together with a clearing of the selectable content to an operator used by the consumer to select and retrieve the content via the network. Any content selected by the consumer is supplied directly to the consumer via the operator. The operator is charged for the supplied content.
SYSTEM AND METHOD FOR FACILITATING CONTACT BETWEEN PARTIES
Systems and methods relating to contact and interactions between a potential seller and a potential buyer of a selected property. A system receives input from a potential buyer indicating interest in a selected property. The system locates the property's address and determines the potential seller for the property. Contact is then initiated with the potential seller and the potential seller is provided with a code for accessing a dedicated communications channel with the potential buyer. Once the code is activated, the potential seller and the potential buyer can determine if there is enough interest to sell the property.