G06Q30/0615

SYSTEMS AND METHODS FOR USING DATABASES, DATA STRUCTURES, AND DATA PROTOCOLS TO EXECUTE A TRANSACTION IN A DATA MARKETPLACE
20210057060 · 2021-02-25 ·

Methods, systems, apparatus, and computer programs, for executing a transaction in a data marketplace. In one aspect, the method includes receiving, from a user device, a first data structure that includes one or more fields structuring first data that represents a request for patient information, identifying one or more second data structures in a patient registry database that satisfy the request for patient information that is represented by the first data, determining a level of compensation for patients that correspond to the one or more second data structures, and executing programmed logic structured by fields of a fourth data structure that causes a data marketplace computer to provide compensation to a wallet of each of the particular patients that correspond to the at least one or more of the identified second data structures from which at least a portion of the second data was selected.

Methods, systems, and media for data anonymization
10956611 · 2021-03-23 ·

Aspects of the disclosure provide for mechanisms data anonymization. A method of the disclosure includes: receiving, by a processing device, a user input initiating anonymization of a first electronic document, wherein the first electronic document comprises at least one first data item relating to personally identifiable information and at least one second data item not related to the personally identifiable information; in response to receiving the user input, generating a second electronic document, wherein the second electronic document comprises a digital fingerprint of the first electronic document and the at least one second data item; and transmitting, to a server, the second electronic document as an anonymized version of the first electronic document.

METHODS, SYSTEMS, AND MEDIA FOR DATA ANONYMIZATION
20210209252 · 2021-07-08 ·

Aspects of the disclosure provide for mechanisms data anonymization. A method of the disclosure includes: receiving, by a processing device, a user input initiating anonymization of a first electronic document, wherein the first electronic document comprises at least one first data item relating to personally identifiable information and at least one second data item not related to the personally identifiable information; in response to receiving the user input, generating a second electronic document, wherein the second electronic document comprises a digital fingerprint of the first electronic document and the at least one second data item; and transmitting, to a server, the second electronic document as an anonymized version of the first electronic document.

ANONYMIZED ONLINE SHOPPING SYSTEM AND METHOD AND POINT OF SALE PRICING SYSTEM AND METHOD
20200410564 · 2020-12-31 ·

A retail service data center provides client facing web pages to allow users to remotely shop for items to be delivered from local retailers without either the users or the local retailer knowing the identity of each other. A retail service is used by shoppers that searches for items in nearby retail stores' inventory. The retail service allows the retail stores to match, or beat, an advertised price at which a given item is being offered by an online retailer. If the user decides to buy an item, the retail service conducts a first transaction with the retail service, which then uses the funds to buy the item from the local retailer. In addition, the retail service arranges for pick-up and delivery of the item by a local driving service. The identities of the buyer and the retailer are not made known to each other.

GENERATING, FROM DATA OF FIRST LOCATION ON SURFACE, DATA FOR ALTERNATE BUT EQUIVALENT SECOND LOCATION ON THE SURFACE

In embodiments, given a surface that has domains on it and a first location, a second location is generated in the surface. The second location belongs in the same domains as the first location, and does not belong in the same domains as the second location. An advantage can be that, in embodiments, the second location can be used in lieu of the first location. A use case can be where it is desired to protect the privacy of location data of an entity, such as its address.

AUTOMATICALLY DETECTING UNAUTHORIZED RE-IDENTIFICATION
20200364370 · 2020-11-19 · ·

The present disclosure provides systems and methods for automatically detecting third-party re-identification of anonymized computing devices. The method includes retrieving a log of content items provided to anonymized computing devices identifying a first content item provided to a plurality of anonymized computing devices within a first predetermined time period; for each anonymized computing device of the plurality of anonymized computing devices, generating a set of identifications of second content items retrieved by the anonymized computing device prior to receiving the first content item within a second predetermined time period; determining that signals or combinations of signals with a highest predictive ability between a first set of identifications and a second set of identifications exceeds a threshold; identifying a provider of the first content item; and if the signals or combinations of signals with the highest predictive ability exceeds the threshold, preventing, transmission of a request of an anonymized computing device for a content item to the identified provider.

POOLING REQUIREMENTS WHILE PRESERVING PRIVACY
20200357031 · 2020-11-12 ·

Disclosed herein are system, method, and computer program product embodiments for pooling requirements, such as placing of multiple purchase orders, while preserving the privacy of the requirements provided by requesters placing the orders. The approach involves receiving first encrypted information comprising a first request from a first client and second encrypted information comprising a second request from a second client. An encrypted intersection result of the first request and the second request can then be calculated using the first encrypted information and the second encrypted information, in their encrypted form without the need to decrypt either.

Method for Transmitting an Anonymous Request from a Consumer to a Content or Service Provider Through a Telecommunication Network
20200357033 · 2020-11-12 ·

Methods and systems are provided for supporting purchasing of goods or services from a provider. An example system may comprise a database operable to maintain identification data of a consumer; and a server operable to receive a purchase request from the consumer. The server may then add an alias to the purchase request, where the alias corresponds to the identification data of the consumer, and forward the purchase request with the alias to the provider. The aliased identification data is not accessible to the provider. In an example method, a server, in a communication network, may receive a purchase request sent by a consumer through the communication network. The server, which may maintain identification data of the consumer, may then substitute the identification data of the consumer with an alias, and may forward the purchase request with the alias to the provider. The identification data is not accessible to the provider.

INSTANT GENERATION AND USAGE OF HTTP URL BASED UNIQUE IDENTITY FOR ENGAGING IN MULTl-MODAL REAL-TIME INTERACTIONS IN ONLINE MARKETPLACES, SOCIAL NETWORKS AND OTHER RELEVANT PLACES
20200342510 · 2020-10-29 ·

A User Engagement System (UES) has mechanism to allow a provider of a product or service to sign up with basic identity information along with any service description resulting in an instant URL as a means for outside parties to contact this provider and engage in multi-modal interactions involving voice, video, chat and media sharing. A single user or a group of users can sign up with this system and provide optionally some contact information such as phone numbers. An URL is instantly generated that can be advertised as hyperlinks to the outside environment such as on a website, email or any other means. This URL can be advertised by the system in various online marketplaces or social networks of the provider as well as on the web to be identified by search engines.

Location-based obfuscation of user information

A device is provided to receive, from a first device, a request for a product or service, determine a first geographic location of the first device, and identify a second device that is located in a geographic region associated with the first geographic location. The second device may be associated with a user that is capable of providing the product or service. The device may provide, to the first device, information regarding a second geographic location of the second device. The information may specify an obfuscated second geographic location without revealing the second geographic location. The device may also receive, from the first device, an instruction to provide the request to the second device, provide the request to the second device, receive an acceptance of the request from the second device, and provide, to the second device, data indicating the first geographic location of the first device.