Data security method for privacy protection

A method including receiving, at a first computing system from a second computing system, a first key and encrypted online interaction data, receiving, at the first computing system from a third computing system, a second key and encrypted offline action data encoding data indicating one or more off...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Werner, Margo, Cao, Yongle, Mcdonnell, Philip, Nistor, Eugen Cristian, Regunathan, Shreenath
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:A method including receiving, at a first computing system from a second computing system, a first key and encrypted online interaction data, receiving, at the first computing system from a third computing system, a second key and encrypted offline action data encoding data indicating one or more offline actions, receiving, at the first computing system from the third computing system, executable code comprising a third key, and executing, by the first computing system, the executable code. The executable code causing the first computing system to decrypt the encrypted online interaction data and the encrypted offline action data using the first key, the second key, and the third key, correlate one or more of the offline actions in the offline action data to one or more online interactions in the online interaction data, and generate aggregate data indicating a number of offline actions correlated to the online interactions.