The present invention relates to marketing offers and personal information privacy, and in particular to a method and system for a location-based service provider to provide a location-based marketplace for third-party businesses to market or advertise location and/or need based offers to users while maintaining the privacy of the user's information.
In today's highly competitive business world, advertising to customers, both potential and previous, is a necessity. Businesses are always looking for ways to increase revenue, and increasing its sales to customers through advertising plays a large part in many business's plans for growth. Advertising has shown to be an effective method to inform, persuade or remind target buyers of the business's goods, services or goodwill, with the ultimate goal being that an advertisement will result in the sale of the goods or services. Studies have confirmed that the more that an advertisement can be made relevant and timely for a particular intended recipient, the more likely that it is to be successful. Location-based service (LBS) providers allow a business to provide a location-based service, e.g., coupon, advertisements, brochures, information, etc., to potential customers that are both timely and relevant. For example, a smart-phone (or other networked mobile device) user may register with the LBS provider to be provided with a service when the user is in the proximity of a selected business. This typically provides both the business and the LBS provider with the identification of the user, and also allows both the business and the LBS provider to determine both the location and needs of the user. Typically this is done by the user disclosing her needs and location to the LBS provider, and the LBS provider aggregating this information and using it to solicit offers from third party businesses.
A problem with the conventional method for providing advertisements/services as described above is that both the business and the LBS provider obtain knowledge of the user's identification, location and needs. This is in direct contrast to the desires of today's mobile savvy consumers, who prefer to utilize such services while maintaining their location and personal information confidential.
The present invention alleviates the problems described above by enabling a LBS provider to provide a location-based marketplace for third-party businesses to market or advertise location- and/or need-based offers to users while keeping the users' information confidential from both the LBS provider and the third party businesses. While the LBS provider is able to identify a user, it cannot learn his/her needs. The third party businesses can learn the user needs, but not the identity of the users with the need.
In accordance with embodiments of the present invention, cryptographic techniques relating to the class of additive homomorphic cryptosystems and private information retrieval (PIR) are leveraged. The cryptosystem allows a business to compare its target location for marketing/advertising campaign to the user's location, such that it can learn when a user is currently at a target location. However, the business will fail to learn the identity of a user in the target location, or any information about the users current location when outside of the target location. PIR enables a user to retrieve a record from a database, without the LBS provider being able to learn any information about which particular record the user has retrieved. PIR is utilized to retrieve public key information of businesses doing advertising/marketing campaigns in a location that is of interest to the user, and to retrieve offers made to the user in a manner that hides which offer was retrieved from the LBS provider.
Therefore, it should now be apparent that the invention substantially achieves all the above aspects and advantages. Additional aspects and advantages of the invention will be set forth in the description that follows, and in part will be obvious from the description, or may be learned by practice of the invention. Moreover, the aspects and advantages of the invention may be realized and obtained by means of the instrumentalities and combinations particularly pointed out in the appended claims.
The accompanying drawings illustrate presently preferred embodiments of the invention, and together with the general description given above and the detailed description given below, serve to explain the principles of the invention. As shown throughout the drawings, like reference numerals designate like or corresponding parts.
In describing the present invention, reference is made to the drawings, wherein there is seen in
Such other devices can include one or more devices operated by a user 20, e.g., user mobile device 22. User mobile device 22 comprises a processing device and can include personal computers, tablets, smartphones or any other type of electronic device that has network capability and can allow a consumer to access other devices via any suitable network. It should be understood that there is no limit to the number of devices and/or users of such devices. The users 20 are interested in receiving free products, discounts, coupons or similar offers relevant to their real time needs and location, and yet they want to keep their needs and location information private and make their identity not linkable by the business to the needs they express. System 10 also includes one or more businesses 30 that operate a computing device 32, which can be similar to the user mobile device 22 or server 12 described above. A business 30 can be any type of service provider, merchant or third party acting on behalf of such entities that is interested in doing location-based marketing/advertising campaigns. They want a high response rate for their campaigns and they anticipate that learning the real time needs of users would help make their campaign more successful. It should be understood that there is no limit to the number of businesses. The present invention, as described below, helps businesses 30 target users 20 by their location and needs, and helps users 20 keep their information private even as they benefit from offers relevant to their real time needs and location.
The present solution utilizes a spatial grid structure having a plurality of cells to quantize and index locations of users 20. A grid can be defined in many ways, provided that each location with a given latitude/longitude is associated with a unique cell of the grid. For example, the United States can be divided in many 100×100 meter cells that are each associated with a unique identifier. The longitude and latitude of a users current location will determine the grid used to situate the user. It should be understood, of course, that the cell size need not be limited to the example provided above, and could be any size as desired. In fact, any spatial grids, regions and range-based subdivision should suffice to quantize location information.
A resource-efficient program runs in the background on the user's mobile device 22, which provides a user interface for interaction. This program collects information about the user's location from the device's GPS, through a WiFi positioning system, cell tower triangulation, or any other known means for determining position. The program also collects information about what the user 20 needs, either from the user making the input directly or by the program reading such needs from sensors connected (wirelessly, e.g., via Bluetooth) to the mobile device 22. Examples of the kinds of information that may be collected and possible uses are: (i) Targeting based on information about the user's current location: Alice is a tourist in NYC walking along Broadway on a Saturday evening and may be interested in obtaining promo tickets for shows. Ticketmaster and similar businesses in the event marketing and entertainment space may be interested in offering their last few tickets at promo rates for shows holding that evening. (ii) Targeting using information about what the user needs right now: Bob is going to be serving pizza to a dozen friends coming over this evening, and he is wondering if he could get promotions/offers from pizza stores. Bob inputs pizza as a need to the program. (iii) Targeting based on a combination of what and when: Trent's car is due for oil change, and he needs coupons redeemable today at any of the nearby oil change centers.
As part of the setup for system 10, an additively homomorphic or fully homomorphic cryptosystem, such as Elgamal's, Pallier's, Damgård-Jurik's, Gentry's etc., is utilized, with the following high-level parameters. A public key homomorphic encryption scheme is a public key encryption scheme that allows certain operations on the encrypted information without the knowledge of the private key. The present invention utilizes a homomorphic encryption scheme that has the following property: Given encryptions E(m1) and E(m2) of two messages m1 and m2 respectively, E(m1−m2) can be efficiently computed without the knowledge of the secret (private) key. The key generation, encryption and decryption algorithms (G, E, D, respectively) of the cryptosystem is over a finite cyclic group of order p, and we fix Zp=(0, . . . , p−1). When a business 30 first joins the system 10 it gets a secret key sk from the server 12, which is shared with other businesses 30. This key is simply a random element of Zp\{0} for the Elgamal cryptosystem instance. The corresponding public key pk is known to the LBS provider server 12, and pre-configured on the program running on the mobile device 22 of users 20. In addition, we assume a secure hash function H(•) and a block cipher (i.e., F(key, •) and F−1(key, •)).
A business 30 may be interested in providing any user 20 in their location of interest (i.e., target location) with an offer, may only desire to make offers to users with a matching need, or may simply want to sample the number of users in a target location to determine what offers to make. A business 30 identifies a central grid j for the location to target and establishes a radius that will include all grids that intersect a circle of that radius having its center at the initial grid. Similarly, a target location may consist of grids forming any shape and the grids may be non-contiguous. Any user 20 within this set of grids that has previously sent a user request to the LBS provider server 12 that is stored in the database 14 are prospects.
After matching available requests with the campaign and/or after finding a reasonable number of matches in step 70, then in step 72 the business computing device 32 generates pseudonym-offer pairs (ρ,θ). Optionally, this list of pseudonym-offer pairs can be permuted to make linking it with the request database nontrivial. This prevents anyone from linking any observed pseudonyms-offer pair with a specific user request. In step 74, the business computing device 32 sends the list (ρ,θ) to the LBS provider server 12, which stores it in database 14 as part of an offer database. In step 76, the LBS provider server 12 may optionally provide a notification to the programs running on user mobile devices 22 that a business 30 may have made an offer in response to their earlier requests. The LBS provider server 12 is able to probabilistically determine which user 20 to notify because it knows which users made entries to its user request database and it is aware of offers being made by a business 30 to its offer database. Note that the LBS prodder server 12 cannot learn any information without user requests or the offers made that are stored in the database 14. There might be false positives because a user's location and/or need may have failed the business matching process. A user may also opt not to receive any notification, to receive not only for businesses they have previously setup with the LBS provider as businesses of interest, or simply to receive every notification. The user, business and/or LBS provider may associate expiration dates with each user request and business offer, so that the LBS provider server 12 will automatically remove expired user requests and business offers from the database 14.
In step 78, the program running on users' mobile devices 22 would subsequently leverage keyword-based private information retrieval (PIR) queries to retrieve business offers associated with the random pseudonym ρ from the database 14 of the LBS provider server 12. Note that with PIR, the program is able to retrieve the business offers associated with the pseudonym without the LBS provider or any other third parties being able to learn any information about which pseudonym was used in the PIR query and which particular offer was retrieved. Since the response time of PIR queries is linear in relation to the size of the database, users may provide the LBS provider server 12 with date ranges of offers to query to improve performance. Users who consider the disclosure of business names as non-confidential may equally use such to reduce the amount of processing done by the PIR server. In step 80, the business offers retrieved from the database 14 can be displayed to the user 20 on the mobile device 22.
While preferred embodiments of the invention have been described and illustrated above, it should be understood that these are exemplary of the invention and are not to be considered as limiting. Additions, deletions, substitutions, and other modifications can be made without departing from the spirit or scope of the present invention. Accordingly, the invention is not to be considered as limited by the foregoing description but is only limited by the scope of the appended claims.