Method, system and apparatus for effecting targeted access to anonymous users of a network

a network and anonymous user technology, applied in the field of targeted access to anonymous users of networks, can solve the problem that the code cannot be employed by the second entity to directly contact the appliance user, and achieve the effect of enhancing the ability of the second entity to promote their content, without compromising the privacy or security of the appliance user

Inactive Publication Date: 2015-04-02
GOLDBERG PAUL R
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0011]The network connected appliance for collecting and communicating to the first entity an appliance user's consumer data resulting from the user's use of the appliance can be comprised of a processor, a memory, a network communications interface and a computer program stored in the memory and executed on the processor. Such a computer program could, for example, be downloaded from the first entity in the form of a software application. When these elements are employed to implement the network connected appliance of the present invention, the processor obtains authorization from the appliance user to collect and communicate the appliance user's consumer data to the first entity; the processor generates an appliance user anonymous identifier; the processor collects appliance user's consumer data; the processor links the generated appliance user anonymous identifier with the collected consumer data; and the network communications interface communicates the consumer data and appliance user anonymous identifier to the first entity. Prior to communication to the first entity, the processor may also encrypt the collected consumer data and / or perform in-appliance de-identification of the collected consumer data. The de-identification removes personally identifiable information (PII) from the collected consumer data and the encryption protects consumer data privacy and security.
[0014]At the time that the appliance user initiates communication with a second entity's ad campaign website, for example by clicking on an offer description, the network communication interface of the appliance of the present invention can communicate a message that includes the appliance user's anonymous identifier to the first entity, such message indicating that the appliance user has initiated communication with an ad campaign website of the second entity, and the second entity website the appliance user is in communication with. The first entity can then communicate to the network communication interface of the appliance a message that includes the identification code communicated to the second entity that identifies the audience in which the appliance user is a member and to which the second entity's offer description has been communicated to. The network communication interface of the appliance can in turn communicate this identification code to the second entity through the second entity's campaign website. This allows the second entity to compare the identification code communicated by the appliance's network communication interface with the identification code communicated to the second entity by the first entity and verify that the appliance user who is communicating with the second entity's campaign website is a member of the audience the second entity wishes to address. This verifies the authenticity of the appliance user as a qualified potential buyer of the second entity's offerings.
[0015]Thus, without compromising appliance user privacy or security, the present invention provides the second entity with verifiable access to a set of qualified appliance users who are members of an audience that have indicated by their consumer data that they are potentially interested in an offering of the second entity, thus greatly enhancing the second entity's ability to promote their content, product or service.

Problems solved by technology

However, the code cannot be employed by the second entity to directly contact the appliance user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and apparatus for effecting targeted access to anonymous users of a network
  • Method, system and apparatus for effecting targeted access to anonymous users of a network
  • Method, system and apparatus for effecting targeted access to anonymous users of a network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025]The present invention will now be described more fully hereinafter with reference to the accompanying drawings, which form a part thereof, and which show, by way of illustration, a specific embodiment by which the invention may be practiced. The invention may, however, be embodied in many different forms and should not be construed as limited to the embodiment set forth herein; rather, this embodiment is provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. Among other things, the present invention may be embodied as methods or devices. Accordingly, the present invention may take the form of an entirely hardware embodiment, and entirely software embodiment or an embodiment combining software and hardware aspects. The following detailed description is, therefore, not to be taken in a limiting sense.

[0026]Throughout the specification and claims, the following terms take the meanings explicitl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method, system, and apparatus for effecting targeted access to anonymous users of a network is provided. A second entity delineates parameters of an audience with heightened interest in an offering, and a first entity provides the second entity with access to an audience accordant with these parameters. Consumer data collected by a network connected appliance used by an appliance user is linked with an appliance user anonymous identifier, and communicated to the first entity. Using the parameters, the first entity analyzes the collected consumer data and aggregates the appliance user's anonymous identifier with anonymous identifiers of other appliance users, thereby generating an aggregate set of anonymous identifiers that point to members of the audience. This set is marked with an identification code that is communicated to the second entity that can be used by the second entity to gain access to the audience through the first entity.

Description

CROSS REFERENCE TO RELATED APPLICATIONS[0001]This application is a continuation-in-part of co-pending U.S. Non-Provisional application Ser. No. 13 / 802,243 filed Mar. 13, 2013.BACKGROUND OF INVENTION[0002]1. Field of Invention[0003]In general this invention relates to the promoting of content, products or services through use of an electronic network, without compromising the privacy and security of the users of the network. In particular, it relates to accessing anonymous users of a network and communicating to these users offers for content, products or services targeted to their interests.[0004]2. Discussion of Related Art[0005]Consumer data, that is data collected by a network connected appliance as a result of a consumer's use of the appliance, is being provided to a wide range of entities for the purpose of promoting content, products or services offered by many of these entities. Such promotion may be effected by delivering promotional campaigns, often in the form of advertise...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06Q30/02
CPCG06Q30/0201G06Q30/0255G06F21/6254G06Q30/0269
Inventor GOLDBERG, PAUL R.
Owner GOLDBERG PAUL R
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products