摘要:
Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity.
摘要:
Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity.
摘要:
Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity.
摘要:
Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity.
摘要:
Disclosed are methods for extracting and using information about an entity that has a presence in a number of information domains. The entity has separate identifiers in each of several domains. Various techniques are described that bind together the identifiers of the entity across the domains. The results of the binding are provided to an interested party that can review information extracted about the entity's behavior in the multiple domains. The interested party is not given access to information that would compromise the confidentiality of the entity. A trusted broker has access to information about the behavior of the entity in the several domains. The broker analyzes that information and provides the analysis to the interested party, again without compromising the confidentiality of the entity. An “incentivizer” works with the broker to extract from the domains information that would be useful in binding together the different identifiers of the entity.
摘要:
A “message broker” personalizes messages based on the recipient's estimated “privacy sensitivity.” By carefully estimating the sensitivity, the message broker can achieve the advantages of personalized messaging without incurring the disadvantages of offending or scaring away the recipient. In a first set of embodiments, messages are sent to a recipient, and information about the recipient's responses is collected and analyzed. The sensitivity level of the recipient is estimated based on this collected information. In a second set of embodiments, messages are sent that include an offer in which an incentive will be given to the recipient in exchange for allowing a certain type of access to specific information associated with the recipient. In a third set of embodiments, the message broker sends messages that request information associated with the recipient, but the messages do not include explicit offers to give incentives in exchange for the information.
摘要:
A “message broker” personalizes messages based on the recipient's estimated “privacy sensitivity.” By carefully estimating the sensitivity, the message broker can achieve the advantages of personalized messaging without incurring the disadvantages of offending or scaring away the recipient. In a first set of embodiments, messages are sent to a recipient, and information about the recipient's responses is collected and analyzed. The sensitivity level of the recipient is estimated based on this collected information. In a second set of embodiments, messages are sent that include an offer in which an incentive will be given to the recipient in exchange for allowing a certain type of access to specific information associated with the recipient. In a third set of embodiments, the message broker sends messages that request information associated with the recipient, but the messages do not include explicit offers to give incentives in exchange for the information.
摘要:
A “message broker” personalizes messages based on the recipient's estimated “privacy sensitivity.” By carefully estimating the sensitivity, the message broker can achieve the advantages of personalized messaging without incurring the disadvantages of offending or scaring away the recipient. In a first set of embodiments, messages are sent to a recipient, and information about the recipient's responses is collected and analyzed. The sensitivity level of the recipient is estimated based on this collected information. In a second set of embodiments, messages are sent that include an offer in which an incentive will be given to the recipient in exchange for allowing a certain type of access to specific information associated with the recipient. In a third set of embodiments, the message broker sends messages that request information associated with the recipient, but the messages do not include explicit offers to give incentives in exchange for the information.
摘要:
A method intercepts correlation instructions related to a plurality of meta-content elements associated with a primary content. The primary content or the meta-content elements may have associated privacy rules. At least one meta-content element of the group is selected as having privacy protected information specified in the privacy rules. A set of meta-content items, of meta-content element, are determined that are subject to a correlation restriction based on evaluation of the privacy rules with respect to each meta-content item contained in the meta-content element, and the privacy rules for the set of meta-content items are enforced. The privacy rule enforcement may involve preventing execution of the correlation instructions, excluding the selected at least one meta-content element from a correlation based on the correlation instructions, excluding the set of meta-content items from a correlation based on the correlation instructions, or restricting access to a correlation result based on the correlation instructions.
摘要:
A method intercepts correlation instructions related to a plurality of meta-content elements associated with a primary content. The primary content or the meta-content elements may have associated privacy rules. At least one meta-content element of the group is selected as having privacy protected information specified in the privacy rules. A set of meta-content items, of meta-content element, are determined that are subject to a correlation restriction based on evaluation of the privacy rules with respect to each meta-content item contained in the meta-content element, and the privacy rules for the set of meta-content items are enforced. The privacy rule enforcement may involve preventing execution of the correlation instructions, excluding the selected at least one meta-content element from a correlation based on the correlation instructions, excluding the set of meta-content items from a correlation based on the correlation instructions, or restricting access to a correlation result based on the correlation instructions.