US20140046743A1 - Techniques for monetizing anonymized context - Google Patents
Techniques for monetizing anonymized context Download PDFInfo
- Publication number
- US20140046743A1 US20140046743A1 US14/060,116 US201314060116A US2014046743A1 US 20140046743 A1 US20140046743 A1 US 20140046743A1 US 201314060116 A US201314060116 A US 201314060116A US 2014046743 A1 US2014046743 A1 US 2014046743A1
- Authority
- US
- United States
- Prior art keywords
- context
- service provider
- reward
- anonymizer
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 230000004931 aggregating effect Effects 0.000 claims abstract description 7
- 230000002776 aggregation Effects 0.000 claims description 12
- 238000004220 aggregation Methods 0.000 claims description 12
- 238000004891 communication Methods 0.000 claims description 10
- 230000004044 response Effects 0.000 claims description 9
- 238000012545 processing Methods 0.000 claims description 6
- 230000003993 interaction Effects 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 claims description 2
- 230000003111 delayed effect Effects 0.000 claims description 2
- 230000008569 process Effects 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 4
- 230000008901 benefit Effects 0.000 description 2
- 230000015654 memory Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 229920001690 polydopamine Polymers 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 108010015046 cell aggregation factors Proteins 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0236—Incentive or reward received by requiring registration or ID from user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0217—Discounts or incentives, e.g. coupons or rebates involving input on products or services in exchange for incentives or rewards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0613—Third-party assisted
- G06Q30/0615—Anonymizing
Definitions
- the user potentially stands to benefit through a better service experience or through a specific incentive.
- the user's ability to leverage this context is currently limited in the following ways: there is no automated way to share, combine, or integrate context across platforms owned by the same user; there is no automated and/or standardized way for the user to share this context with service providers, with or without compensation; and there is no simple mechanism for controlling access to context.
- FIG. 1 depicts a high-level message flow for basic monetization of anonymized context according to embodiments of the present invention
- FIG. 2 depicts a detailed communication protocol for basic monetization of anonymized context according to embodiments of the present invention
- FIG. 3 shows a flow chart of client operation for basic monetization of anonymized context according to embodiments of the present invention
- FIG. 4 depicts a flow chart of anonymizer operation for basic monetization of anonymized context according to embodiments of the present invention
- FIG. 5 depicts a flow chart of service provider operation for basic monetization of anonymized context according to embodiments of the present invention
- FIG. 6 shows a flow chart of reward provider operation for basic monetization of anonymized context according to embodiments of the present invention
- FIG. 7 is a high-level message flow for monetization of anonymized context in conjunction with service delivery according to embodiments of the present invention.
- FIG. 8 is a detailed communication protocol for monetization of anonymized context in conjunction with service delivery.
- the terms “plurality” and “a plurality” as used herein may include, for example, “multiple” or “two or more”.
- the terms “plurality” or “a plurality” may be used throughout the specification to describe two or more components, devices, elements, units, parameters, or the like.
- a plurality of stations may include two or more stations.
- platforms may include, but are not limited to, mobile computing/communication devices (e.g., PDAs, phones, MIDs), fixed and portable computing devices (laptops, desktops, and set-top-boxes), and cloud computing services and platforms.
- mobile computing/communication devices e.g., PDAs, phones, MIDs
- fixed and portable computing devices laptops, desktops, and set-top-boxes
- cloud computing services and platforms Both raw context and profiles derived from this context have a potentially high value to the user, if the user can properly manage and share this information with service providers.
- embodiments of systems of the present invention may provide a platform that is an information assimilation and communication platform.
- Some embodiments of the present invention provide for aggregated context and provide anonymization services and a communication protocol that enables a user to choose to monetize aggregated context in a privacy-preserving way. This guarantees both anonymous aggregation of context and compensation to each context contributor.
- Service providers typically only need aggregated data, and can pay less for each individual user's data if it is aggregated and other parties to the transaction may receive recurring revenue by acting as a context aggregation service provider.
- FIG. 1 a high-level message flow for basic monetization of anonymized context of embodiments of the present invention.
- FIG. 1 there are four key parts to embodiments of the present invention.
- client 110 may send an offer request 105 to service provider 120 which may return an offer 115 back to client 110 .
- Client may then send at 125 a context bundle to anonymizer 120 which aggregates the client's context with the context of other clients at 135 and sends at 145 to service provider 130 .
- a reward request list is provided from service provider 130 to reward provider 140 , which at 165 sends a reward list to anonymizer 120 .
- anonymizer 120 sends reward to client 110 .
- Anonymization Service represents a recurring revenue opportunity.
- Such a service can work in conjunction with specific platforms (mobile, PC, set-top, cloud) that generate user context.
- the Basic Protocol is shown in FIG. 2 , generally as 200 , which depicts a detailed communication protocol for basic monetization of anonymized context.
- the flow chart provides the communication protocol between Client 210 , Anonymizer 220 , Service provider 230 and Reward Provider 240 .
- the flow diagrams of the Client, Anonymization Service, Service Provider and Reward Provider algorithms are illustrated in greater detail below.
- the protocol assumes that an identifier, ID, known only to the client 210 and the Anonymizer 220 has been establish by some means not described here, and that ID is capable of generating message authentication values.
- ID is an asymmetric key pair.
- a step-by-step description of the protocol follows:
- Step 1 Offer Request 215 : The client asks the Service Provider for a list of available offers. The user's identity is known at this point; however, no context is promised or delivered. Optionally, this request could be forwarded through the Anonymizer. Upon receipt, the Service Provider selects a set of offers to deliver to the Client. These offers may be filtered based on client identity or past client relationships, but they should not be unique to the specific client.
- Step 2 Offer 225 : One or more offers are returned. Each offer specifies:
- An offer may be signed using the private key of the Service Provider, for authenticity. Upon receipt of an offer, the Client chooses whether to participate. Selection of an offer may utilize a user interaction or a previously formulated user-defined policy.
- Step 3 235 Context Bundle: To accept an offer, the Client sends the context bundle to the Anonymizer to be aggregated with the context of other users. This message is protected from tampering by signing with a private key tied to the client's ID, and accessible only by the Anonymizer, since it is encrypted with the anonymizer's public key. The message contains:
- the Anonymizer Upon receipt, the Anonymizer unpacks the message. If the data is stale or inauthentic, it is discarded, otherwise, it is stored for later forwarding. Note that the offer specifies the number of users over which to aggregate the data before it is forwarded.
- Step 4 245 Aggregation: Once context is collected from the required number of users for a given offer, the “context packages” are assembled in random order into an Anonymized Bundle List. Transmission of the Anonymized Bundle List could be randomly delayed to further protect the identities of the set of Clients whose data are contained in the bundle.
- an Anonymized Bundle List can be sent to a given Service Provider at regular intervals.
- the subset and order of Client data included in a given Anonymized Bundle List would be determined randomly, with a random distribution weighted such that older data is more likely to be included (preventing data from becoming too stale).
- no Anonymized Bundle List should be sent to a Service Provider unless a sufficiently large number of entries are available.
- the Anonymized Bundle List can include context packages from multiple offers (since each is labeled with the specific offer). If context packages for multiple offers are included in an Anonymized Bundle List, it is important that the aggregation constraints of each individual offer are satisfied.
- Step 5 255 Anonymized Bundle List: The Anonymized Bundle List is sent from the Anonymizer to the Service Provider. It is signed using the Anonymizer's private key, for authenticity. Although not limited in this respect, it may include a timestamp (either real or virtual) for freshness, and a list of “context packages” in random order.
- the Service Provider Upon receipt, the Service Provider unpacks the message, checking for authenticity and freshness. It then unpacks each “context package.” For each one, it takes the following steps:
- Step 6 265 The Reward Request List: The Reward Request List is sent from the Service Provider to the Reward Provider and contains a list of Reward Requests. Although the present invention is not limited in this respect, each Reward Request or the Reward Request List as a whole may be protected by signing with the Service Provider's private key (for authenticity) and encrypting with the Reward Provider's public key (for secrecy). Each reward request may contain:
- the Reward Provider Upon receipt, the Reward Provider prepares a Reward List with one entry for each Reward Request.
- Step 7 275 The Reward List: The Reward List is sent from the Reward Provider to the Anonymizer. It contains a list of Reward Messages. Each Reward Message or the Reward List as a whole may be signed using the Reward Provider's private key for authenticity and encrypted with the Anonymizer's public key for privacy. Each Reward Message in the Reward List contains:
- the Reward Provider may eventually (when the reward is redeemed) know the identity of the recipient (the Client), the Reward Provider never knows anything about the offer or the context delivered in response to that offer.
- the Anonymizer validates the authenticity of each Reward Message. It can now decrypt the identity of the client node and caches each reward for later delivery.
- Step 8 Aggregation 285 : The Anonymizer caches each reward for a random amount of time to prevent correlation across rewards. Aggregation is accomplished in a manner similar to that set forth above relating to step 4.
- Step 9 295 Reward: Each reward is then addressed to the specific recipient in a Reward message. It may contain the reward, still encrypted using the public key provided by the client for secrecy. Optionally, the reward could be signed by the Reward Provider for authenticity.
- Offer Constraints As noted in Step 1 of the basic protocol, unique properties in an offer or offer signature could enable a bundle to be traced by the Service Provider back to the Client. To reduce this risk, the Anonymizer may choose to enforce some or all of the following rules during processing of bundles in Step 3:
- Bundles containing offers that do not meet the desired set of criteria would be rejected.
- the Anonymizer may also choose to constrain offers to protect clients. For example, the Anonymizer could enforce a minimum level of aggregation or a minimum level of compensation required for release of a particular piece of context.
- the Anonymizer may not trust the Service Provider to deliver a reward to the recipient.
- the Anonymizer may signal the availability of the Anonymized Bundle List by sending a list of client public keys and obscured client identities to the Service Provider. The Service Provider can then follow Step 6, resulting in rewards being sent to the Anonymizer in Step 7.
- the Anonymized Bundle List can be sent to the Service Provider.
- the choice between this version of the protocol and the basic protocol depends on the relative trustworthiness of the Anonymizer and the Service Provider. However, in general, the basic protocol is sufficient, because the Anonymizer can determine that a given Service Provider is not trustworthy, if rewards are not eventually received.
- users may wish to deliver context as part of the regular service delivery process.
- the user may wish to utilize a video streaming web site, and deliver a list of their top 10 most frequently watched TV shows in exchange for some free content.
- embodiments of the present invention may integrate the anonymous context monetization capability with a typical service delivery mechanism. The resulting protocol is shown in FIGS. 7 and 8 as described below.
- the resulting protocol utilizes the same core interactions between Anonymizer, Service Provider, and Reward Provider. For backward compatibility with existing services, the client contacts the Service Provider directly.
- the protocol proceeds with the following steps:
- the Client makes a generic service request to the Service Provider.
- the Service Provider makes a generic service reply (e.g., a content page that does not include any additional free content) to the client, but adds to the response an offer (similar to Step 2 in the basic protocol).
- a generic service reply e.g., a content page that does not include any additional free content
- the Client wishes to share some context, it sends a second service request to the Service Provider.
- This request includes a context bundle (similar to Step 3 in the basic protocol, but sent directly to the Service Provider).
- the Service Provider cannot access the bundle. Instead, it sends the bundle to the Anonymizer.
- the Anonymizer validates the bundle, caches it in the anonymization cache, and sends a context affidavit to the Service Provider attesting to receipt of the requested context.
- the Service Provider won't receive the context until later in the process, once it has been anonymized.
- the Service Provider can now send an improved service reply to the Client (e.g., with the promised free content).
- This reply could provide the improved service itself, or a token that the Client can use to unlock an improved service, for either a limited or unlimited period of time.
- the protocol proceeds with the basic protocol, starting at Step 4, aggregating data, and eventually sending anonymized context data to the Service Provider and delivering the resulting rewards.
- the above protocol provides a good way for the user to receive preferred service, including delivery of a token that entitles the holder to preferred service.
- An alternative is to provide the token as the Reward in the Basic Protocol.
- the Service Provider is also acting as the Reward Provider, which violates an assumption that the Rewards Provider and the Service Provider do not collude.
- There is a danger that a redeemed token could be used by the Service Provider (who in the case is also the Reward Provider) to connect the Client with their anonymized context.
- the protocol above provides an alternative approach that does not have this disadvantage.
- FIG. 3 shown generally as 300 shows a flow chart of Client operation for basic monetization of anonymized context according to embodiments of the present invention.
- Client starts and at 315 user chooses to share context and at 320 sends offer request to the Service Provider.
- the Client has received an “offer” message from the Service Provider and a determination is made at 330 if offer is authentic. If NO return to client start. If YES at 335 determine if offer matches user interest. If NO return to Client start. If YES, at 340 the Client sends a context bundle to the Anonymizer and returns to start.
- the Client has received a “reward” message from the Anonymizer, at 350 decrypts and at 355 delivers to user and return to Client start.
- FIG. 4 at 400 depicts a flow chart of Anonymizer operation for basic monetization of anonymized context according to embodiments of the present invention.
- Anonymizer start at 405 if received “context bundle” message at 410 , decrypt at 410 and determine if message is authentic at 415 . If NO, return to Anonymizer start 405 . If YES determine if message is replay at 420 . If YES, return to Anonymizer start 405 . If NO, cache context bundle at 425 and at 430 determine if received sufficient context for offer. If NO, return to Anonymizer start 405 . If YES, bundle cached context into “anonymized bundle list” and sent to Service Provider at 435 . Then return to Anonymizer start 405 .
- FIG. 5 at 500 depicts a flow chart of service provider operation for basic monetization of anonymized context according to embodiments of the present invention.
- Service Provider start is shown at 505 with received “anonymized bundle list” message shown next at 510 . Then a determination is made at 515 if message is authentic and if NO return to service provider start 505 . If YES, the decrypt a bundle at 520 , process context 525 generate reward request at 530 and determine if more context bundles at 535 . If YES, return to step 515 and if NO, generate reward request list message and send to Reward Provider at 540 .
- FIG. 6 at 600 shows a flow chart of Reward Provider operation for basic monetization of anonymized context according to embodiments of the present invention.
- Reward Provider start is shown at 605 with received “reward request list” message shown next at 610 .
- At 612 select next reward request and then determine at 615 if message is authentic and if NO return to 612 . If YES, the decrypt request at 620 , generate reward encrypted with public key provided by the Client at 625 generate reward at 630 and determine if more reward requests at 635 . If YES, return to step 612 and if NO, generate reward list message and send to Anonymizer 640 .
- FIG. 7 at 700 is a high-level message flow for monetization of anonymized context in conjunction with service delivery according to embodiments of the present invention. It illustrates message flow between Client 705 , Service Provider 710 , Anonymizer 715 and Reward Provider 720 .
- Messages may include the following messages between Service Provider 710 and Client 705 : 1) generic service request; 2) generic service response+offer; 3) service request+context bundle; 6) improved service response.
- Message may further include the following messages between Service Provider 710 and Anonymizer 715 : 4) context bundle; 5) context affidavit; 8) anonymized bundle list.
- Reward Provider 720 may communicate 10) reward list to Anonymizer and receive a reward request list 9) from Service Provider 710 .
- FIG. 8 at 800 is a detailed communication protocol for monetization of anonymized context in conjunction with service delivery. It illustrates protocol flow between Client 805 , Anonymizer 810 , Service Provider 815 and Reward Provider 820 .
- Some embodiments of the present invention may further provide a computer readable medium encoded with computer executable instructions, which when accessed, cause a machine to perform operations comprising offering anonymous incentive based context to service providers by delivering context information of a user to the service provider, wherein prior to delivery of the context information to the service provider, the context is anonymized by removing identifying information and aggregating it with context from additional users.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Marketing (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Game Theory and Decision Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Medical Informatics (AREA)
- Databases & Information Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
An embodiment of the present invention provides a method of offering anonymous incentive based context to service providers, comprising delivering context information of a user to the service provider, wherein prior to delivery of the context information to the service provider, the context is anonymized by removing identifying information and aggregating it with context from additional users.
Description
- The present application is a continuation of U.S. patent application Ser. No. 12/754,643, filed on Apr. 6, 2010, entitled “TECHNIQUES FOR MONETIZING ANONYMIZED CONTEXT” which is hereby incorporated herein by reference in its entirety and for all purposes.
- The rapid development of wireless devices and their ever-improving mobile capabilities have enabled users to depend on them for increasing numbers of applications while the devices can obtain a wide variety of personal information. Users of such devices are increasingly able to capture contextual information about their environment, their interactions, and themselves on various platforms. These platforms include, but are not limited to, mobile computing/communication devices (e.g., PDAs, phones, MIDs), fixed and portable computing devices (laptops, desktops, and set-top-boxes), and cloud computing services and platforms. Both raw context and profiles derived from this context have a potentially high value to the user, if the user can properly manage and share this information with service providers. Service providers may use this information to better tailor offers to the user, to better understand their customers, or to repackage and sell (or otherwise monetize).
- The user potentially stands to benefit through a better service experience or through a specific incentive. The user's ability to leverage this context is currently limited in the following ways: there is no automated way to share, combine, or integrate context across platforms owned by the same user; there is no automated and/or standardized way for the user to share this context with service providers, with or without compensation; and there is no simple mechanism for controlling access to context.
- Currently this type of information may be collected and monetized in a variety of ways:
-
- Context is collected by cloud service providers, via web logs, credit card traces, and other artifacts of day-to-day life. Such context might identify life events or in-market interests. The user often has no knowledge or control over this information and gains nothing in its use.
- Context is collected automatically on the user's platforms and delivered back to a service provider. For example, set-top boxes often collect information about TV viewing patterns, and cell phones often track location.
- Users may explicitly share context by filling out a survey about their interests, demographics, or personal history.
- In the above examples, users are not always aware their context is being collected. They may or may not be given the opportunity to opt-out and in most cases, the user will receive no compensation for their context. Also, users do not have a way to allow the gathering of their information anonymously. Thus, a strong need is present for techniques for anonymized monetizing of context information.
- The subject matter regarded as the invention is particularly pointed out and distinctly claimed in the concluding portion of the specification. The invention, however, both as to organization and method of operation, together with objects, features, and advantages thereof, may best be understood by reference to the following detailed description when read with the accompanying drawings in which:
-
FIG. 1 depicts a high-level message flow for basic monetization of anonymized context according to embodiments of the present invention; -
FIG. 2 depicts a detailed communication protocol for basic monetization of anonymized context according to embodiments of the present invention; -
FIG. 3 shows a flow chart of client operation for basic monetization of anonymized context according to embodiments of the present invention; -
FIG. 4 depicts a flow chart of anonymizer operation for basic monetization of anonymized context according to embodiments of the present invention; -
FIG. 5 depicts a flow chart of service provider operation for basic monetization of anonymized context according to embodiments of the present invention; -
FIG. 6 shows a flow chart of reward provider operation for basic monetization of anonymized context according to embodiments of the present invention; -
FIG. 7 is a high-level message flow for monetization of anonymized context in conjunction with service delivery according to embodiments of the present invention; and -
FIG. 8 is a detailed communication protocol for monetization of anonymized context in conjunction with service delivery. - It will be appreciated that for simplicity and clarity of illustration, elements illustrated in the figures have not necessarily been drawn to scale. For example, the dimensions of some of the elements are exaggerated relative to other elements for clarity. Further, where considered appropriate, reference numerals have been repeated among the figures to indicate corresponding or analogous elements.
- In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those skilled in the art that the preset invention may be practiced without these specific details. In other instances, well-known methods, procedures, components and circuits have not been described in detail so as not to obscure the present invention.
- Although embodiments of the invention are not limited in this regard, discussions utilizing terms such as, for example, “processing,” “computing,” “calculating,” “determining,” “establishing”, “analyzing”, “checking”, or the like, may refer to operation(s) and/or process(es) of a computer, a computing platform, a computing system, or other electronic computing device, that manipulate and/or transform data represented as physical (e.g., electronic) quantities within the computer's registers and/or memories into other data similarly represented as physical quantities within the computer's registers and/or memories or other information storage medium that may store instructions to perform operations and/or processes.
- Although embodiments of the invention are not limited in this regard, the terms “plurality” and “a plurality” as used herein may include, for example, “multiple” or “two or more”. The terms “plurality” or “a plurality” may be used throughout the specification to describe two or more components, devices, elements, units, parameters, or the like. For example, “a plurality of stations” may include two or more stations.
- As mentioned above, users are increasingly capable of capturing contextual information about their environment, their interactions, and themselves on various platforms. These platforms may include, but are not limited to, mobile computing/communication devices (e.g., PDAs, phones, MIDs), fixed and portable computing devices (laptops, desktops, and set-top-boxes), and cloud computing services and platforms. Both raw context and profiles derived from this context have a potentially high value to the user, if the user can properly manage and share this information with service providers. Further, embodiments of systems of the present invention may provide a platform that is an information assimilation and communication platform.
- Although several context collection mechanisms are in current use today, none provide all of the following features (1) automatic context collection, (2) user control, (3) user compensation, and (4) data privacy via anonymization.
- Although existing mechanisms allow context collected on the user's personal platforms to be controlled by the user and monetized, this capability does not provide anonymization. Some embodiments of the present invention provide for aggregated context and provide anonymization services and a communication protocol that enables a user to choose to monetize aggregated context in a privacy-preserving way. This guarantees both anonymous aggregation of context and compensation to each context contributor.
- In this way, users can monetize context collected on the platform, for both accuracy and user control and will be more likely to share context because it is shared in a more anonymous way. Service providers typically only need aggregated data, and can pay less for each individual user's data if it is aggregated and other parties to the transaction may receive recurring revenue by acting as a context aggregation service provider.
- Embodiments of the present invention enable users to enter into an agreement with a service provider such that:
-
- The user contributes some personal context;
- Prior to delivery to the service provider, the context is anonymized by removing identifying information and aggregating it with context from many other users; and
- The user receives appropriate compensation for their contribution.
- This may be provided by integrating an anonymization service with a context monetization capability. Looking now at
FIG. 1 , generally as 100, is provided a high-level message flow for basic monetization of anonymized context of embodiments of the present invention. There are four key parts to embodiments of the present invention. -
- The
Client 110 delivers context and receives a reward; - The Anonymization Service 120 knows the identities of the clients but has no access to context or monetary rewards;
- The
Service Provider 130 receives anonymized context but cannot attribute it to specific clients. It also arranges for delivery of monetary rewards. - The
Reward Provider 140 generates rewards but has no immediate knowledge of recipients or what they are being compensated for.
- The
- The identity of the client that provided a given piece of context is protected unless two of more of the above participants collude. In an embodiment of the present invention,
client 110 may send anoffer request 105 toservice provider 120 which may return anoffer 115 back toclient 110. Client may then send at 125 a context bundle toanonymizer 120 which aggregates the client's context with the context of other clients at 135 and sends at 145 toservice provider 130. At 155 a reward request list is provided fromservice provider 130 to rewardprovider 140, which at 165 sends a reward list toanonymizer 120. At 175anonymizer 120 sends reward toclient 110. - Note that the Anonymization Service represents a recurring revenue opportunity. Such a service can work in conjunction with specific platforms (mobile, PC, set-top, cloud) that generate user context.
- The Basic Protocol is shown in
FIG. 2 , generally as 200, which depicts a detailed communication protocol for basic monetization of anonymized context. The flow chart provides the communication protocol betweenClient 210,Anonymizer 220,Service provider 230 andReward Provider 240. The flow diagrams of the Client, Anonymization Service, Service Provider and Reward Provider algorithms are illustrated in greater detail below. The protocol assumes that an identifier, ID, known only to theclient 210 and theAnonymizer 220 has been establish by some means not described here, and that ID is capable of generating message authentication values. The specific embodiment described here assumes that ID is an asymmetric key pair. A step-by-step description of the protocol follows: - Step 1: Offer Request 215: The client asks the Service Provider for a list of available offers. The user's identity is known at this point; however, no context is promised or delivered. Optionally, this request could be forwarded through the Anonymizer. Upon receipt, the Service Provider selects a set of offers to deliver to the Client. These offers may be filtered based on client identity or past client relationships, but they should not be unique to the specific client.
- Step 2: Offer 225: One or more offers are returned. Each offer specifies:
-
- The set of desired context;
- The level of aggregation (over how many users) that this data will receive before delivery;
- The form and amount of compensation;
- An offer may be signed using the private key of the Service Provider, for authenticity. Upon receipt of an offer, the Client chooses whether to participate. Selection of an offer may utilize a user interaction or a previously formulated user-defined policy.
-
Step 3 235: Context Bundle: To accept an offer, the Client sends the context bundle to the Anonymizer to be aggregated with the context of other users. This message is protected from tampering by signing with a private key tied to the client's ID, and accessible only by the Anonymizer, since it is encrypted with the anonymizer's public key. The message contains: -
- The identity of the client;
- A timestamp (real or virtual) for freshness;
- A copy of the original offer, still signed for authenticity;
- A “context package” for the service provider, encrypted using the public key of the service provider (for privacy), containing:
- The original offer;
- The context requested in the offer;
- An obscured form of the node's identity (encrypted using the public key of the anonymizer); and
- A public key owned by the client that will be used to encrypt rewards data for delivery to the client. Note that for maximum privacy protection this should be a one-time use key to prevent correlation over time by the Service Provider and Rewards Provider.
- Upon receipt, the Anonymizer unpacks the message. If the data is stale or inauthentic, it is discarded, otherwise, it is stored for later forwarding. Note that the offer specifies the number of users over which to aggregate the data before it is forwarded.
-
Step 4 245: Aggregation: Once context is collected from the required number of users for a given offer, the “context packages” are assembled in random order into an Anonymized Bundle List. Transmission of the Anonymized Bundle List could be randomly delayed to further protect the identities of the set of Clients whose data are contained in the bundle. - Alternatively, an Anonymized Bundle List can be sent to a given Service Provider at regular intervals. The subset and order of Client data included in a given Anonymized Bundle List would be determined randomly, with a random distribution weighted such that older data is more likely to be included (preventing data from becoming too stale). In this case, no Anonymized Bundle List should be sent to a Service Provider unless a sufficiently large number of entries are available.
- In either case, the Anonymized Bundle List can include context packages from multiple offers (since each is labeled with the specific offer). If context packages for multiple offers are included in an Anonymized Bundle List, it is important that the aggregation constraints of each individual offer are satisfied.
-
Step 5 255: Anonymized Bundle List: The Anonymized Bundle List is sent from the Anonymizer to the Service Provider. It is signed using the Anonymizer's private key, for authenticity. Although not limited in this respect, it may include a timestamp (either real or virtual) for freshness, and a list of “context packages” in random order. - Upon receipt, the Service Provider unpacks the message, checking for authenticity and freshness. It then unpacks each “context package.” For each one, it takes the following steps:
-
- Validates the offer;
- Saves the context for further processing (application specific);
- Formulates a Reward Request using the obscured node identity and public key; and
- All of the above reward requests are combined into a Reward Request List.
-
Step 6 265: The Reward Request List: The Reward Request List is sent from the Service Provider to the Reward Provider and contains a list of Reward Requests. Although the present invention is not limited in this respect, each Reward Request or the Reward Request List as a whole may be protected by signing with the Service Provider's private key (for authenticity) and encrypting with the Reward Provider's public key (for secrecy). Each reward request may contain: -
- A timestamp for freshness;
- The value (and perhaps type) of the requested reward;
- The obscured identity of the recipient; and
- The public key provided by the recipient.
- Upon receipt, the Reward Provider prepares a Reward List with one entry for each Reward Request.
-
Step 7 275: The Reward List: The Reward List is sent from the Reward Provider to the Anonymizer. It contains a list of Reward Messages. Each Reward Message or the Reward List as a whole may be signed using the Reward Provider's private key for authenticity and encrypted with the Anonymizer's public key for privacy. Each Reward Message in the Reward List contains: -
- The reward, which may be an electronic certificate (application specific) with some value. It can be unique, but it is not linked to a specific user (the user is not known to the reward provider at this time). For example, the reward might be a code for an Itunes gift card or an Amazon gift certificate. In an embodiment of the present invention, the reward may be encrypted (for privacy) with the public key provided by the intended recipient.
- It is noted that the obscured identity of the recipient and the public key provided by the recipient are obtained from the reward request and were originally provided by the client in the Context Bundle.
- It may also be noted that while the Reward Provider may eventually (when the reward is redeemed) know the identity of the recipient (the Client), the Reward Provider never knows anything about the offer or the context delivered in response to that offer.
- Upon receipt, in embodiments of the present invention, the Anonymizer validates the authenticity of each Reward Message. It can now decrypt the identity of the client node and caches each reward for later delivery.
- Step 8: Aggregation 285: The Anonymizer caches each reward for a random amount of time to prevent correlation across rewards. Aggregation is accomplished in a manner similar to that set forth above relating to step 4.
-
Step 9 295: Reward: Each reward is then addressed to the specific recipient in a Reward message. It may contain the reward, still encrypted using the public key provided by the client for secrecy. Optionally, the reward could be signed by the Reward Provider for authenticity. - Note that one of two properties must hold: (1) the reward is generic (a single code given to all users), or (2) the Reward Provider must be independent of the Service Provider. Validation of these properties is the responsibility of the Client, though the Anonymizer could provide a service that assists Clients in determining the trustworthiness of rewards. Property (1) is difficult to validate and should be considered highly suspect.
- Offer Constraints. As noted in
Step 1 of the basic protocol, unique properties in an offer or offer signature could enable a bundle to be traced by the Service Provider back to the Client. To reduce this risk, the Anonymizer may choose to enforce some or all of the following rules during processing of bundles in Step 3: -
- All responses being anonymized in satisfaction of a given offer must contain an identical copy of the offer and signature.
- All offers may follow a generic format that contains four fields: the context being requested, the level of aggregation, the amount of compensation, and the type of compensation. Each field would be restricted to a small set of fixed values.
- Valid offers (including their signature) must be registered in advance with the Anonymizer. The Anonymizer could then choose to track (and perhaps limit) the number of different offers currently valid for a given Service Provider.
- Bundles containing offers that do not meet the desired set of criteria would be rejected. The Anonymizer may also choose to constrain offers to protect clients. For example, the Anonymizer could enforce a minimum level of aggregation or a minimum level of compensation required for release of a particular piece of context.
- In some cases, the Anonymizer may not trust the Service Provider to deliver a reward to the recipient. In this case, prior to
Step 5, the Anonymizer may signal the availability of the Anonymized Bundle List by sending a list of client public keys and obscured client identities to the Service Provider. The Service Provider can then followStep 6, resulting in rewards being sent to the Anonymizer inStep 7. Once the Anonymizer has validated receipt of the rewards, the Anonymized Bundle List can be sent to the Service Provider. The choice between this version of the protocol and the basic protocol depends on the relative trustworthiness of the Anonymizer and the Service Provider. However, in general, the basic protocol is sufficient, because the Anonymizer can determine that a given Service Provider is not trustworthy, if rewards are not eventually received. - In some cases, users may wish to deliver context as part of the regular service delivery process. For example, the user may wish to utilize a video streaming web site, and deliver a list of their top 10 most frequently watched TV shows in exchange for some free content. To reduce the need to modify existing services and client software, embodiments of the present invention may integrate the anonymous context monetization capability with a typical service delivery mechanism. The resulting protocol is shown in
FIGS. 7 and 8 as described below. - The resulting protocol utilizes the same core interactions between Anonymizer, Service Provider, and Reward Provider. For backward compatibility with existing services, the client contacts the Service Provider directly. The protocol proceeds with the following steps:
- 1. The Client makes a generic service request to the Service Provider.
- 2. The Service Provider makes a generic service reply (e.g., a content page that does not include any additional free content) to the client, but adds to the response an offer (similar to
Step 2 in the basic protocol). - 3. If the Client wishes to share some context, it sends a second service request to the Service Provider. This request includes a context bundle (similar to
Step 3 in the basic protocol, but sent directly to the Service Provider). - 4. The Service Provider cannot access the bundle. Instead, it sends the bundle to the Anonymizer.
- 5. The Anonymizer validates the bundle, caches it in the anonymization cache, and sends a context affidavit to the Service Provider attesting to receipt of the requested context. The Service Provider won't receive the context until later in the process, once it has been anonymized.
- 6. The Service Provider can now send an improved service reply to the Client (e.g., with the promised free content). This reply could provide the improved service itself, or a token that the Client can use to unlock an improved service, for either a limited or unlimited period of time.
- 7. At this point, the protocol proceeds with the basic protocol, starting at
Step 4, aggregating data, and eventually sending anonymized context data to the Service Provider and delivering the resulting rewards. - The above procedure results in almost the same anonymization as the basic protocol, except that the Service Provider knows which clients contributed context. However, it still doesn't know which context each Client contributed. As a result, Clients of this version of the protocol will probably want to limit their participation to offers with a higher aggregation factor than the basic protocol.
- The above protocol provides a good way for the user to receive preferred service, including delivery of a token that entitles the holder to preferred service. An alternative is to provide the token as the Reward in the Basic Protocol. However, in this case, the Service Provider is also acting as the Reward Provider, which violates an assumption that the Rewards Provider and the Service Provider do not collude. There is a danger that a redeemed token could be used by the Service Provider (who in the case is also the Reward Provider) to connect the Client with their anonymized context. The protocol above provides an alternative approach that does not have this disadvantage.
- Continuing with the figures,
FIG. 3 shown generally as 300 shows a flow chart of Client operation for basic monetization of anonymized context according to embodiments of the present invention. At 310 Client starts and at 315 user chooses to share context and at 320 sends offer request to the Service Provider. At 325 the Client has received an “offer” message from the Service Provider and a determination is made at 330 if offer is authentic. If NO return to client start. If YES at 335 determine if offer matches user interest. If NO return to Client start. If YES, at 340 the Client sends a context bundle to the Anonymizer and returns to start. At 345 the Client has received a “reward” message from the Anonymizer, at 350 decrypts and at 355 delivers to user and return to Client start. -
FIG. 4 at 400 depicts a flow chart of Anonymizer operation for basic monetization of anonymized context according to embodiments of the present invention. After Anonymizer start at 405, if received “context bundle” message at 410, decrypt at 410 and determine if message is authentic at 415. If NO, return to Anonymizer start 405. If YES determine if message is replay at 420. If YES, return to Anonymizer start 405. If NO, cache context bundle at 425 and at 430 determine if received sufficient context for offer. If NO, return to Anonymizer start 405. If YES, bundle cached context into “anonymized bundle list” and sent to Service Provider at 435. Then return to Anonymizer start 405. - When received “reward list” message at 440, determine if message is authentic at 445. If YES, decrypt node identity at 450, cache reward and set
random timer 455 and return toAnonymizer 405. If reward timer expires at 455, send reward messages to Client nodes at 460 and then return to Anonymizer start 405. -
FIG. 5 at 500 depicts a flow chart of service provider operation for basic monetization of anonymized context according to embodiments of the present invention. Service Provider start is shown at 505 with received “anonymized bundle list” message shown next at 510. Then a determination is made at 515 if message is authentic and if NO return toservice provider start 505. If YES, the decrypt a bundle at 520,process context 525 generate reward request at 530 and determine if more context bundles at 535. If YES, return to step 515 and if NO, generate reward request list message and send to Reward Provider at 540. -
FIG. 6 at 600 shows a flow chart of Reward Provider operation for basic monetization of anonymized context according to embodiments of the present invention. Reward Provider start is shown at 605 with received “reward request list” message shown next at 610. At 612 select next reward request and then determine at 615 if message is authentic and if NO return to 612. If YES, the decrypt request at 620, generate reward encrypted with public key provided by the Client at 625 generate reward at 630 and determine if more reward requests at 635. If YES, return to step 612 and if NO, generate reward list message and send toAnonymizer 640. -
FIG. 7 at 700 is a high-level message flow for monetization of anonymized context in conjunction with service delivery according to embodiments of the present invention. It illustrates message flow betweenClient 705,Service Provider 710, Anonymizer 715 andReward Provider 720. Messages may include the following messages betweenService Provider 710 and Client 705: 1) generic service request; 2) generic service response+offer; 3) service request+context bundle; 6) improved service response. Message may further include the following messages betweenService Provider 710 and Anonymizer 715: 4) context bundle; 5) context affidavit; 8) anonymized bundle list.Reward Provider 720 may communicate 10) reward list to Anonymizer and receive a reward request list 9) fromService Provider 710. -
FIG. 8 at 800 is a detailed communication protocol for monetization of anonymized context in conjunction with service delivery. It illustrates protocol flow betweenClient 805,Anonymizer 810,Service Provider 815 andReward Provider 820. - Some embodiments of the present invention may further provide a computer readable medium encoded with computer executable instructions, which when accessed, cause a machine to perform operations comprising offering anonymous incentive based context to service providers by delivering context information of a user to the service provider, wherein prior to delivery of the context information to the service provider, the context is anonymized by removing identifying information and aggregating it with context from additional users.
- While certain features of the invention have been illustrated and described herein, many modifications, substitutions, changes, and equivalents may occur to those skilled in the art. It is, therefore, to be understood that the appended claims are intended to cover all such modifications and changes as fall within the true spirit of the invention.
Claims (27)
1. A method of offering anonymous incentive based context to service providers, comprising:
delivering context information of a user to said service provider, wherein prior to delivery of said context information to said service provider, said context is anonymized by removing identifying information and aggregating it with context from additional users.
2. The method of claim 1 , further comprising said user receiving compensation for their contribution to said aggregated context information.
3. The method of claim 2 , wherein an anonymization service provides said anonymizing and knows the identities of users but has no access to context or monetary rewards and wherein said service provider receives said anonymized context but cannot attribute it to a specific source and optionally arranges for said compensation and wherein a reward provider generates rewards but has no immediate knowledge of recipients.
4. The method of claim 1 , further comprising:
said user submitting an offer request for a list of available offers from said service provider and upon receipt, said service provider selects a set of offers to deliver to said user; and
wherein upon receipt of at least one offer, said user chooses whether to participate.
5. The method of claim 4 , wherein if said user chooses to participate, a context bundle is delivered to an anonymizer in one of the following manners:
a context bundle is sent from said user to said anonymizer to be aggregated with the context of other users; or
a context bundle is sent from said user to said service provider, wherein context is initially provided by the client to the service provider in an obscured form as part of the service request, said service provider then forwards said obscured context to said anonymizer, said anonymizer attests to said service provider that said context has been delivered, said service provider provides an improved service response to the client.
6. The method of claim 5 , wherein after receiving said context bundle said anonymizer removes identifying information, and once said context is collected from a required number of users for a given offer, context packages are randomly assembled into an anonymized bundle list and sent from said anonymizer to said service provider.
7. The method of claim 6 , wherein upon receipt, said service provider unpacks each context package and reward requests are combined into a reward request list that is sent from said service provider to a reward provider and contains a list of reward requests, whereafter a reward list is sent from said reward provider to said anonymizer; and
wherein said Anonymizer caches each reward for a random amount of time to prevent correlation across rewards and each reward is then addressed to a specific recipient in a reward message.
8. The method of claim 7 , wherein if said service provider is not a trusted service provider, an anonymizer signals availability of a context bundle and waits for a reward prior to delivering said bundle to said service provider.
9. The method of claim 6 , wherein said Anonymizer is adapted to choose to enforce some or all of the rules during processing of bundles from the rules group consisting of:
All responses being anonymized in satisfaction of a given offer must contain an identical copy of the offer and signature;
All offers follow a generic format that contains four fields: the context being requested, the level of aggregation, the amount of compensation, and the type of compensation;
Valid offers must be registered in advance with said Anonymizer; and
Bundles containing offers that do not meet the desired set of criteria would be rejected.
10. The method of claim 4 , wherein each offer is signed using a private key of said service provider for authenticity and specifies: the set of desired context; the level of aggregation that this data will receive before delivery; and the form and amount of compensation and selection of an offer may utilize a user interaction or a previously formulated user-defined policy.
11. The method of claim 5 , wherein said context bundle is protected from tampering by signing with a private key tied to the client's identity, and accessible only by said anonymizer since it is encrypted with said anonymizer's public key and wherein said context bundle contains: the client's identity, a real or virtual timestamp for freshness; a copy of an original offer, still signed for authenticity; a context package for said service provider, encrypted using the public key of the service provider containing said original offer; the context requested in said offer; an obscured form of a node's identity encrypted using the public key of the anonymizer; and a public key generated by said client.
12. The method of claim 6 , wherein transmission of said anonymized bundle list is randomly delayed to further protect identities of a set of clients whose data are contained in said bundle.
13. The method of claim 6 , wherein when said anonymized bundle list is sent from said anonymizer to said service provider, it is signed using said anonymizer's private key, for authenticity and further includes a timestamp for freshness, and a list of context packages in random order.
14. The method of claim 7 , wherein upon receipt, said service provider unpacks said anonymized bundle list, checks for authenticity and freshness and then unpacks each context package and takes the following steps: validates the offer; saves said context for further processing; and formulates a reward request using an obscured node identity and public key
15. The method of claim 7 , wherein said reward request is protected by signing with said service provider's private key for authenticity and encrypting with said reward provider's public key for secrecy and wherein each reward request contains: a timestamp for freshness; the value of the requested reward; the obscured identity of the recipient; and the public key provided by the recipient.
16. A computer readable medium encoded with computer executable instructions, which when accessed, cause a machine to perform operations comprising:
offering anonymous incentive based context to service providers by delivering context information of a user to said service provider, wherein prior to delivery of said context information to said service provider, said context is anonymized by removing identifying information and aggregating it with context from additional users.
17. The computer readable medium encoded with computer executable instructions of claim 1 , further comprising said user receiving compensation for their contribution to said aggregated context information.
18. The computer readable medium encoded with computer executable instructions of claim 16 , wherein an anonymization service provides said anonymizing and knows the identities of users but has no access to context or monetary rewards and wherein said service provider receives anonymized context but cannot attribute to a specific source and arranges for said compensation and wherein a reward provider generates rewards but has no immediate knowledge of recipients.
19. The computer readable medium encoded with computer executable instructions of claim 16 , further comprising said user submitting an offer request for a list of available offers from said service provider and upon receipt, said service provider selects a set of offers to deliver to said user;
wherein upon receipt of an offer, said user chooses whether to participate;
wherein if said user chooses to participate, either a context bundle is sent from said user to said anonymizer to be aggregated with the context of other users, or
a context bundle is sent from said user to said service provider, wherein context is initially provided by the client to the service provider in an obscured form as part of the service request, said service provider then forwards said obscured context to said anonymizer to be aggregated with the context of other users, said anonymizer attests to the service provider that said context has been delivered, said service provider provides an improved service response to the client.
20. The method of claim 19 , wherein once said context is collected from a required number of users for a given offer, context packages are randomly assembled into an anonymized bundle list and sent from said anonymizer to said service provider;
wherein upon receipt, said service provider unpacks each context package and all reward requests are combined into a reward request list that is sent from said service provider to a reward provider and contains a list of reward requests, whereafter said reward list is sent from said reward provider to said anonymizer; and
wherein said Anonymizer caches each reward for a random amount of time to prevent correlation across rewards and each reward is then addressed to a specific recipient in a reward message.
21. The computer readable medium encoded with computer executable instructions of claim 20 , wherein said Anonymizer is adapted to choose to enforce some or all of the rules during processing of bundles from the rules group consisting of:
All responses being anonymized in satisfaction of a given offer must contain an identical copy of the offer and signature;
All offers follow a generic format that contains four fields: the context being requested, the level of aggregation, the amount of compensation, and the type of compensation;
Valid offers must be registered in advance with said Anonymizer; and
Bundles containing offers that do not meet the desired set of criteria would be rejected.
22. The computer readable medium encoded with computer executable instructions of claim 20 , wherein when said context bundle is sent from said user client to said anonymizer to be aggregated with the context of other users, said message is protected from tampering by signing with a private key tied to the client's identity, and accessible only by said anonymizer by encrypting with an anonymizer public key.
23. The computer readable medium encoded with computer executable instructions of claim 22 , wherein said message contains a timestamp for freshness; a copy of an original offer, still signed for authenticity; and a context package for said service provider, encrypted using the public key of the service provider.
24. A system, comprising:
an information assimilation and communication platform adapted to offer anonymous incentive based context to service providers by delivering context information of a user to said service provider, wherein prior to delivery of said context information to said service provider, said context is anonymized by removing identifying information and aggregating it with context from additional users.
25. The system of claim 24 , further comprising said user receiving compensation for their contribution to said aggregated context information.
26. The system of claim 25 , wherein an anonymization service provides said anonymizing and knows the identities of users but has no access to context or monetary rewards and wherein said service provider receives anonymized context but cannot attribute to a specific source and arranges for said compensation and wherein a reward provider generates rewards but has no immediate knowledge of recipients.
27. The system of claim 24 , further comprising:
said user submitting an offer request for a list of available offers from said service provider and upon receipt, said service provider selects a set of offers to deliver to said user;
wherein upon receipt of an offer, said user chooses whether to participate;
wherein if said user chooses to participate, a context bundle is sent from said user to said anonymizer to be aggregated with the context of other users and once said context is collected from a required number of users for a given offer, context packages are randomly assembled into an anonymized bundle list and sent from said anonymizer to said service provider;
wherein upon receipt, said service provider unpacks each context package and all reward requests are combined into a reward request list that is sent from said service provider to a reward provider and contains a list of reward requests, whereafter said reward list is sent from said reward provider to said anonymizer; and
wherein said Anonymizer caches each reward for a random amount of time to prevent correlation across rewards and each reward is then addressed to a specific recipient in a reward message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/060,116 US20140046743A1 (en) | 2010-04-06 | 2013-10-22 | Techniques for monetizing anonymized context |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/754,643 US9202230B2 (en) | 2010-04-06 | 2010-04-06 | Techniques for monetizing anonymized context |
US14/060,116 US20140046743A1 (en) | 2010-04-06 | 2013-10-22 | Techniques for monetizing anonymized context |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/754,643 Continuation US9202230B2 (en) | 2010-04-06 | 2010-04-06 | Techniques for monetizing anonymized context |
Publications (1)
Publication Number | Publication Date |
---|---|
US20140046743A1 true US20140046743A1 (en) | 2014-02-13 |
Family
ID=44710727
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/754,643 Active 2030-12-26 US9202230B2 (en) | 2010-04-06 | 2010-04-06 | Techniques for monetizing anonymized context |
US14/060,116 Abandoned US20140046743A1 (en) | 2010-04-06 | 2013-10-22 | Techniques for monetizing anonymized context |
US14/060,135 Abandoned US20140046749A1 (en) | 2010-04-06 | 2013-10-22 | Techniques for monetizing anonymized context |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/754,643 Active 2030-12-26 US9202230B2 (en) | 2010-04-06 | 2010-04-06 | Techniques for monetizing anonymized context |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/060,135 Abandoned US20140046749A1 (en) | 2010-04-06 | 2013-10-22 | Techniques for monetizing anonymized context |
Country Status (6)
Country | Link |
---|---|
US (3) | US9202230B2 (en) |
EP (1) | EP2556479A4 (en) |
JP (3) | JP5623965B2 (en) |
CN (2) | CN103632293B (en) |
RU (1) | RU2541878C2 (en) |
WO (1) | WO2011126912A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10810324B2 (en) | 2018-04-20 | 2020-10-20 | At&T Intellectual Property I, L.P. | Methods, systems and algorithms for providing anonymization |
Families Citing this family (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9202230B2 (en) | 2010-04-06 | 2015-12-01 | Intel Corporation | Techniques for monetizing anonymized context |
US9898620B2 (en) * | 2012-09-28 | 2018-02-20 | Panasonic Intellectual Property Management Co., Ltd. | Information management method and information management system |
US10672008B2 (en) | 2012-12-06 | 2020-06-02 | Jpmorgan Chase Bank, N.A. | System and method for data analytics |
US9047488B2 (en) * | 2013-03-15 | 2015-06-02 | International Business Machines Corporation | Anonymizing sensitive identifying information based on relational context across a group |
US9419946B2 (en) * | 2013-07-03 | 2016-08-16 | Verizon Patent And Licensing Inc. | Method and apparatus for anonymously acquiring service information |
US9665883B2 (en) * | 2013-09-13 | 2017-05-30 | Acxiom Corporation | Apparatus and method for bringing offline data online while protecting consumer privacy |
US10990686B2 (en) * | 2013-09-13 | 2021-04-27 | Liveramp, Inc. | Anonymous links to protect consumer privacy |
US11157944B2 (en) * | 2013-09-13 | 2021-10-26 | Liveramp, Inc. | Partner encoding of anonymous links to protect consumer privacy |
WO2015099662A1 (en) * | 2013-12-23 | 2015-07-02 | Intel Corporation | Improved techniques for context information management |
GB2540817A (en) * | 2015-07-30 | 2017-02-01 | Ford Global Tech Llc | Improvements in or relating to distributed vehicular data management systems |
JP6862456B2 (en) * | 2015-12-31 | 2021-04-21 | アクシオム コーポレーション | Geographically targeted message delivery using point-of-sale data |
US10264447B2 (en) * | 2017-08-21 | 2019-04-16 | T-Mobile Usa, Inc. | Communication record privacy protection validation |
US11374738B2 (en) * | 2018-06-18 | 2022-06-28 | Make Great Sales Limited | Methods and systems for generating, recording and retrieving digital transaction records |
US20200380148A1 (en) * | 2019-06-03 | 2020-12-03 | Otonomo Technologies Ltd. | Method and system for aggregating users' consent |
CN113507452B (en) * | 2021-06-18 | 2023-01-24 | 北方工业大学 | Vehicle networking privacy protection data sharing system based on block chain |
CN114065253B (en) * | 2021-11-22 | 2023-03-24 | 上海旺链信息科技有限公司 | Method for anonymous sharing and verification of certificate and result |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030080997A1 (en) * | 2001-10-23 | 2003-05-01 | Marcel Fuehren | Anonymous network-access method and client |
US20050021402A1 (en) * | 2003-06-04 | 2005-01-27 | Strasser Stephen M. | Method and apparatus for providing internet based marketing channels |
US7209892B1 (en) * | 1998-12-24 | 2007-04-24 | Universal Music Group, Inc. | Electronic music/media distribution system |
US20090157475A1 (en) * | 2007-12-18 | 2009-06-18 | Jordan Chase Crafton | Method and system for electronic incentive distribution and task management |
Family Cites Families (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101303717B (en) | 1995-02-13 | 2015-04-29 | 英特特拉斯特技术公司 | Systems and methods for secure transaction management and electronic rights protection |
US6865545B1 (en) * | 1996-03-13 | 2005-03-08 | Trs Holding, Inc. | Method for providing consumers with offers |
US20020026351A1 (en) * | 1999-06-30 | 2002-02-28 | Thomas E. Coleman | Method and system for delivery of targeted commercial messages |
AU6229000A (en) * | 1999-07-26 | 2001-02-13 | Iprivacy Llc | Electronic purchase of goods over a communication network including physical delivery while securing private and personal information |
US7630986B1 (en) * | 1999-10-27 | 2009-12-08 | Pinpoint, Incorporated | Secure data interchange |
US6571216B1 (en) * | 2000-01-14 | 2003-05-27 | International Business Machines Corporation | Differential rewards with dynamic user profiling |
US20010034647A1 (en) * | 2000-02-03 | 2001-10-25 | Marks Michael B. | Providing benefits by the internet to minimally identified users |
JP2002007847A (en) * | 2000-06-16 | 2002-01-11 | Duplo Kk | Benefit-enjoyable database system, and information providing method using the system |
US20020143705A1 (en) | 2000-07-28 | 2002-10-03 | Koninklijke Philips Electronics N.V. | Business model for content and software providers |
JP2003022332A (en) * | 2001-07-06 | 2003-01-24 | Hitachi Ltd | Portal site for providing monitored and observed information, and method for utilizing monitored and the observed information |
WO2003039182A1 (en) * | 2001-10-29 | 2003-05-08 | Swisscom Mobile Ag | Method and system for transmitting anonymous messages by means of a telecommunication network |
JP2003248780A (en) * | 2002-02-25 | 2003-09-05 | Fujitsu Ltd | Purchase information management system, purchase information anonymization server, and purchase information management method |
JP2003316965A (en) | 2002-04-19 | 2003-11-07 | Omron Corp | Information collecting system, information providing system, intermediary processor, information anomyzing device, program for information providing process and program for information relaying process |
US7444655B2 (en) * | 2002-06-11 | 2008-10-28 | Microsoft Corporation | Anonymous aggregated data collection |
US7512788B2 (en) * | 2002-12-10 | 2009-03-31 | International Business Machines Corporation | Method and apparatus for anonymous group messaging in a distributed messaging system |
US20040199789A1 (en) * | 2002-12-30 | 2004-10-07 | Shaw Terry D. | Anonymizer data collection device |
US20050076089A1 (en) * | 2003-09-18 | 2005-04-07 | Fonseca Arnoldo Medeiros | Method and system for communication from anonymous sender(s) to known recipient(s) for feedback applications |
WO2005091138A1 (en) * | 2004-03-16 | 2005-09-29 | Grid Analytics Llc | System and method for aggregation and analysis of information from multiple disparate sources while assuring source and record anonymity using an exchange hub |
US20070067297A1 (en) * | 2004-04-30 | 2007-03-22 | Kublickis Peter J | System and methods for a micropayment-enabled marketplace with permission-based, self-service, precision-targeted delivery of advertising, entertainment and informational content and relationship marketing to anonymous internet users |
US20080312946A1 (en) * | 2004-05-03 | 2008-12-18 | Valentine Christopher H | Trade show information management |
US7974928B2 (en) * | 2004-07-13 | 2011-07-05 | Pitney Bowes Inc. | System and method for securing database records from tampering and managing and recovering from component failure in devices such as postage value dispensing systems |
US7707413B2 (en) * | 2004-12-02 | 2010-04-27 | Palo Alto Research Center Incorporated | Systems and methods for protecting private information in a mobile environment |
US7406453B2 (en) * | 2005-11-04 | 2008-07-29 | Microsoft Corporation | Large-scale information collection and mining |
US8560456B2 (en) * | 2005-12-02 | 2013-10-15 | Credigy Technologies, Inc. | System and method for an anonymous exchange of private data |
US20080114651A1 (en) * | 2006-02-02 | 2008-05-15 | Microsoft Corporation | Omaha - user price incentive model |
US20080015927A1 (en) * | 2006-07-17 | 2008-01-17 | Ramirez Francisco J | System for Enabling Secure Private Exchange of Data and Communication Between Anonymous Network Participants and Third Parties and a Method Thereof |
US20080120308A1 (en) * | 2006-11-22 | 2008-05-22 | Ronald Martinez | Methods, Systems and Apparatus for Delivery of Media |
US8055536B1 (en) * | 2007-03-21 | 2011-11-08 | Qurio Holdings, Inc. | Automated real-time secure user data sourcing |
JP2009053819A (en) | 2007-08-24 | 2009-03-12 | Nec Corp | Statistical information collecting device, method and program |
US20090083118A1 (en) * | 2007-09-21 | 2009-03-26 | Maritz Inc. | Segmented motivation profiles |
US9269089B2 (en) * | 2007-11-22 | 2016-02-23 | Yahoo! Inc. | Method and system for media promotion |
US8548925B2 (en) * | 2008-01-15 | 2013-10-01 | Apple Inc. | Monitoring capabilities for mobile electronic devices |
KR100958427B1 (en) | 2008-01-16 | 2010-05-18 | 씨네이십일아이 주식회사 | method of managing content data playing and system thereof |
US20100121696A1 (en) * | 2008-05-16 | 2010-05-13 | Daniel James Green | System and method for providing customers access to incentive deals |
US9286108B2 (en) | 2008-10-30 | 2016-03-15 | Oracle America, Inc. | Method to track application context and application identification |
US9098723B2 (en) | 2009-02-02 | 2015-08-04 | Waldeck Technology, Llc | Forming crowds and providing access to crowd data in a mobile environment |
US20100257036A1 (en) * | 2009-04-02 | 2010-10-07 | Nec Laboratories America, Inc. | Method and System for Anonymity and Incentives in User-Assisted Mobile Services |
US9202230B2 (en) | 2010-04-06 | 2015-12-01 | Intel Corporation | Techniques for monetizing anonymized context |
-
2010
- 2010-04-06 US US12/754,643 patent/US9202230B2/en active Active
-
2011
- 2011-03-31 EP EP11766516.6A patent/EP2556479A4/en not_active Withdrawn
- 2011-03-31 WO PCT/US2011/030623 patent/WO2011126912A2/en active Application Filing
- 2011-03-31 RU RU2012141593/08A patent/RU2541878C2/en active
- 2011-04-05 JP JP2011083339A patent/JP5623965B2/en active Active
- 2011-04-06 CN CN201310683636.6A patent/CN103632293B/en active Active
- 2011-04-06 CN CN201110137572.0A patent/CN102215225B/en active Active
-
2013
- 2013-10-22 US US14/060,116 patent/US20140046743A1/en not_active Abandoned
- 2013-10-22 US US14/060,135 patent/US20140046749A1/en not_active Abandoned
- 2013-11-13 JP JP2013234939A patent/JP2014078242A/en active Pending
-
2015
- 2015-12-01 JP JP2015235032A patent/JP6359506B2/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7209892B1 (en) * | 1998-12-24 | 2007-04-24 | Universal Music Group, Inc. | Electronic music/media distribution system |
US20030080997A1 (en) * | 2001-10-23 | 2003-05-01 | Marcel Fuehren | Anonymous network-access method and client |
US20050021402A1 (en) * | 2003-06-04 | 2005-01-27 | Strasser Stephen M. | Method and apparatus for providing internet based marketing channels |
US20090157475A1 (en) * | 2007-12-18 | 2009-06-18 | Jordan Chase Crafton | Method and system for electronic incentive distribution and task management |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10810324B2 (en) | 2018-04-20 | 2020-10-20 | At&T Intellectual Property I, L.P. | Methods, systems and algorithms for providing anonymization |
Also Published As
Publication number | Publication date |
---|---|
JP5623965B2 (en) | 2014-11-12 |
CN103632293B (en) | 2017-09-08 |
CN103632293A (en) | 2014-03-12 |
US20140046749A1 (en) | 2014-02-13 |
US9202230B2 (en) | 2015-12-01 |
WO2011126912A3 (en) | 2012-02-23 |
RU2012141593A (en) | 2014-04-10 |
JP2014078242A (en) | 2014-05-01 |
EP2556479A2 (en) | 2013-02-13 |
RU2541878C2 (en) | 2015-02-20 |
US20110246273A1 (en) | 2011-10-06 |
CN102215225B (en) | 2017-03-01 |
JP2016053985A (en) | 2016-04-14 |
EP2556479A4 (en) | 2016-03-16 |
JP2011222014A (en) | 2011-11-04 |
JP6359506B2 (en) | 2018-07-18 |
CN102215225A (en) | 2011-10-12 |
WO2011126912A2 (en) | 2011-10-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9202230B2 (en) | Techniques for monetizing anonymized context | |
US10469887B2 (en) | Technologies for selective content licensing and secure playback | |
Feigenbaum et al. | Privacy engineering for digital rights management systems | |
US7975150B1 (en) | Method and system for protecting queryable data | |
US8015117B1 (en) | Method and system for anonymous reporting | |
US9898621B2 (en) | Automatic application dependent anonymization | |
US7614081B2 (en) | Managing and sharing identities on a network | |
KR101845872B1 (en) | Publication and removal of attributes in a multi-user computing system | |
KR20050085233A (en) | Method for ensuring privacy in electronic transactions with session key blocks | |
WO2023030450A1 (en) | Data sharing method and electronic device | |
US20140101679A1 (en) | Secure transfer of credit card information | |
US20100131760A1 (en) | Content using system and content using method | |
US20200351560A1 (en) | Video streaming playback system and method | |
WO2023005838A1 (en) | Data sharing method and electronic device | |
JP4929048B2 (en) | Content distribution service system | |
US11556959B2 (en) | Internet data usage control system | |
Artail et al. | A privacy-preserving framework for managing mobile ad requests and billing information | |
US9122844B2 (en) | Proxy device for managing digital rights | |
US11991286B2 (en) | Systems and methods for using a non-fungible digital asset to facilitate accessing an access-restricted resource | |
CN106161187B (en) | Method, equipment and system for providing public information service based on instant message | |
EP3895368A1 (en) | Preventing fraud in aggregated network measurements | |
Cha et al. | Telecommunication Use Cases for Blockchain Technology | |
EP4165577A1 (en) | Internet data usage control system | |
Langendörfer et al. | Privacy-Enhancing Technique: A Survey and Classification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |