Embodiments generally relate to systems and methods for effectively anonymizing consumer transaction data so that a third party cannot de-anonymize the consumer information to reveal personally identifiable information (PII) or non-public information (NPI) of the consumers. In some embodiments, consumer transaction data is anonymized on a stock keeping unit (SKU) level by grouping consumers with similar transaction data and then only providing the consumer transaction data of groups having a minimum group size, which may be dictated by privacy regulations, to a third party for analysis to prevent de-anonymizing of that consumer transaction data.
Payment processors, networks and other entities create and process large amounts of consumer spending and payment-related data each day. The data is collected and stored to support transaction processing and for other purposes, such as ensuring that the parties involved in a transaction are properly compensated. The data has other potential uses as well, including for use to identify and/or analyze consumer spending patterns and behaviors. Thus, strict limitations and/or regulations have been applied to accessing and using such transaction data. For example, the United States enacted the Gramm-Leach-Bliley Act on Nov. 12, 1999, which addresses concerns relating to consumer financial privacy. In particular, provisions of the Gramm-Leach-Bliley Act limit when a financial institution may disclose a consumer's “nonpublic personal information” (sometimes referred to a “NPI”) to non-affiliated third parties. Accordingly, when a financial institution desires to transmit consumer transaction data to a non-affiliated third party, it is important that consumer transaction details be “de-identified” by removing any private or personally identifiable information (sometimes referred to as “PII”) of the consumers, or by “anonymizing” the consumer transaction data. Examples of a consumer's NPI and/or PII may include, but are not limited to, a name, address, telephone number, and numerous other personal facts such as homeownership status, income level, and birth date. Thus, de-identifying or anonymizing consumer PII before providing the consumer trnasaction data to a third party that wishes to identify and/or analyze consumer spending patterns, behaviors and/or tendencies, for example, is meant to protect the privacy of individual consumers.
Itemized purchase data is valuable for retailers and manufacturers, which is why many of them run loyalty programs. Unfortunately, much of this information cannot be shared (at least at a consumer level) because much of the consumer data can be de-anonymized. For example, in one famous instance, academics successfully de-anonymized a handful of Netflix profiles that were made public as part of a “Netflix challenge” by relying on groups of rare film information found in the data that are extremely uncommon. Since then, companies have shied away from sharing item level detail that is grouped at the customer level. But anonymized consumer data can also be advantageously used by marketers, retailers, and others to the benefit of themselves and consumers. For example, by knowing their customers' spending and buying habits, retailers can have adequate supplies on hand, gauge the proper prices for specific items, obtain more precisely tailored advertising, and determine the effectiveness of advertising and sales efforts. In addition, retailers may be able to better understand the lifestyle interests of consumers (for example, how many of their customers own cats and/or dogs, what hobbies are most prevalent in a particular group, and what types of magazines they read) and thus be able to, for example, make focused efforts via direct mail or e-mail communications, make smarter advertising decisions, and provide cross-promotions with other product or service providers.
It would be therefore be desirable to provide systems and methods for generating anonymized consumer transaction data for analysis by third party entities, wherein the anonymized consumer transaction data includes, for example, detailed item purchase histories per consumer (such as a payment card account holder), and wherein such anonymized transaction data cannot be de-anonymized or de-identified. Such anonymized consumer purchase transaction data can then be utilized by retailers, marketers or other third party organizations to conduct consumer profile analysis and/or determine business data, such as dynamic pricing data and the like. In particular, it would be desirable to provide anonymized SKU level purchase transaction data per consumer that cannot be de-anonymized or de-identified to determine personal consumer information.
Features and advantages of some embodiments, and the manner in which the same are accomplished, will become more readily apparent upon consideration of the following detailed description taken in conjunction with the accompanying drawings, which illustrate preferred and exemplary embodiments and which are not necessarily drawn to scale, wherein:
Embodiments generally relate to systems and methods to anonymize consumer transaction data in a manner to protect against de-anonymization to ensure the privacy and identity of individual consumers, and for providing third parties, such as marketers and/or retailers with the anonymized consumer transaction data for analysis. The types of information that the third party may be able to glean from the anonymized transaction data of groups and/or subgroups of consumers may include information about consumer lifestyles, buying habits, demographics, and the like. More particularly, embodiments relate to systems and methods that include preparing the consumer transaction data and then anonymizing the consumer transaction data using one or more anonymization methods, techniques or combinations thereof. The processes described herein provide anonymized consumer transaction data that cannot be de-anonymized, for example, by a third party cross-referencing the consumer transaction data to publicly available data in order to obtain personally identifiable information of one or more consumers. Thus, the anonymized consumer transaction data obtained according to the systems and processes described herein may be provided to third parties to conduct further consumer transaction analysis without fear of de-anonymization and thus without invading consumer privacy and/or without violating consumer privacy rules, regulations and/or laws.
A number of terms are used herein. For example, the term “anonymized data” or “de-identified data” are used to refer to data or data sets that have been processed or filtered to remove any personally identifiable information (PII) of consumers. In addition, the term “payment card network” or “payment network” as used herein refers to a payment network or payment system operated by a payment processing entity, such as MasterCard International Incorporated, or other networks which process payment transactions on behalf of a number of merchants, issuers and payment account holders (such as credit card account and/or debit card account and/or loyalty card account holders, commonly referred to as cardholders). Moreover, the terms “payment card network data” or “network transaction data” or “payment network transaction data” refer to transaction data associated with payment or purchase transactions that have been processed over a payment network. For example, network transaction data may include a number of data records associated with individual payment transactions (or purchase transactions) of consumers that have been processed over a payment card network. In some embodiments, network transaction data may include information that identifies a cardholder, a payment device or payment account, a transaction date and time, a transaction amount, items that have been purchased, and information identifying a merchant and/or a merchant category. Additional transaction details may also be available in some embodiments.
Examples of anonymization process embodiments are illustrated in the accompanying drawings, and it should be understood that the drawings and descriptions thereof are not intended to limit the invention to any particular embodiment(s). On the contrary, the descriptions provided herein are intended to cover alternatives, modifications, and equivalents thereof. Thus, although numerous specific details are set forth in order to provide a thorough understanding of the various embodiments, some or all of these embodiments may be practiced without some or all of the specific details. In other instances, well-known process operations have not been described in detail in order not to unnecessarily obscure novel aspects.
Referring again to
With regard to a payment transaction, a consumer typically enters a retail store and makes a purchase with his or her payment card, such as a credit, debit, convenience, or ATM card, at a merchant point-of-sale (POS) terminal or device (not shown). The POS device transmits purchase transaction data that includes the consumer's payment card account information (for example, the primary account number (PAN) and other data), the stock keeping unit (SKU) identifiers of merchandise and/or other item identifiers, the transaction amount, and/or a merchant identifier to an acquirer financial institution (FI), which transmits a transaction authorization request data to the payment network 112. The payment network 112 determines which financial institution issued that consumer's payment card account, generates a purchase transaction authorization request and transmits it to the issuer FI 116 that issued the consumer's payment card. If all is in order (for example, the issuer FI determines that the consumer's payment card account includes sufficient credit to cover the cost of the purchase transaction), the payment network 112 receives a purchase authorization response which is then transmitted to the merchant acquirer FI and forwarded to the POS device so that the consumer can take possession of the purchased item(s) or merchandise. The payment network 112 also collects the purchase transaction data including the authorization response, builds a transaction file that contains, for example, credit card or debit card information, card number, type(s) of item(s) purchased, transaction amount, and the date of the transaction, and stores the transaction file in the payment network transaction database 118.
In some embodiments, the data preparation engine 104 processes consumer transaction data stored in the transaction data files and then transmits it to the anonymization engine 106 for anonymizing processing. In some implementations, the data preparation engine 104 removes from the consumer transaction data purchased item data for items or products that have been for sale in the marketplace for less than a minimum predetermined period of time (for example, six months) to guarantee that such “new” or newly-introduced items or products will not be present and/or included in any of the resultant consumer profiles. Removal of such newly-introduced items helps to further anonymize a consumer's purchase transaction history. After the consumer transaction data is anonymized, it is then transmitted to the reporting engine 108 to output to, for example, a third party marketing company. According to processes described herein, the purchase transaction data is anonymized such that it cannot be de-anonymized or de-identified to protect the privacy of the consumers personal identity information (or non-public information) from the third party.
In the example system 100 shown in
It should be understood that the various blocks or modules shown in
As used herein, a module of executable code could be a single instruction, or many instructions, and may even be distributed over several different code segments, among different programs, and across several memory devices. Similarly, operational data may be identified and illustrated herein within modules, and may be embodied in any suitable form and organized within any suitable type of data structure. The operational data may be collected as a single data set, or may be distributed over different locations including over different storage devices, and may exist, at least partially, merely as electronic signals on a system or network. In addition, entire modules, or portions thereof, may also be implemented in programmable hardware devices such as field programmable gate arrays, programmable array logic, programmable logic devices or the like or as hardwired integrated circuits.
Referring again to
Referring again to
With regard to the anonymization processes described above with regard to
Thus, in accordance with the processes disclosed herein, anonymized consumer data may be provided to third party entities for analysis and preparation of a number of reports that can be generated without revealing any consumer PII.
It should be noted that the embodiments described herein may be implemented using any number of different hardware configurations. For example,
The processor 402 is also configured to communicate with a storage device 410. The storage device 410 may comprise any appropriate information storage device, including combinations of magnetic storage devices (e.g., a hard disk drive), optical storage devices, and/or semiconductor memory devices. The storage device 410 may therefore be any type of non-transitory computer readable medium and/or any form of computer readable media capable of storing computer instructions and/or application programs and/or data. It should be understood that non-transitory computer-readable media comprise all computer-readable media, with the sole exception being a transitory, propagating signal.
In some embodiments, the storage device 410 stores computer programs and/or applications and/or computer readable instructions operable to control the processor 402 to operate in accordance with any of the processes and/or embodiments described herein. For example, a data preparation module 412 may include instructions configured to cause the processor to prepare consumer transaction data from one or more consumer transaction data sources for anonymization processing. The storage device 410 may also store one or more anonymization modules 414 including instructions configured to cause the processor 402 to anonymize the prepared consumer transaction data in accordance with one or more of the processes described herein with regard to
As used herein, information may be “received” by or “transmitted” to, for example, the consumer data anonymization computer 400 from/to another device. Also, information may be received or transmitted between a computer software application or module within the consumer data anonymization computer 400 and another software application, module, or any other source.
Referring again to
Pursuant to some embodiments, the operation of the consumer transaction data anonymization computer 400 and/or the consumer transaction data anonymization computer subsystem 102 may be based on several assumptions or rules to protect PII. Such assumptions or rules may include ensuring that any particular combined or matched consumer transaction data set (for example, a combined consumer transaction data set that includes consumer transaction data from a payment network, consumer transaction data from one or more merchants, and consumer transaction data from one or more social media operators) is anonymized before transmission or disclosure to a third party (who is the client requesting consumer transaction data for analysis).
It should be understood that the flow charts and descriptions thereof herein do not necessarily prescribe a fixed order of performing the method steps described. Rather, the method steps may be performed in any order that is practicable, including combining one or more steps into a combined step. In addition, in some implementations one or more method steps may be omitted.
Although embodiments disclosed herein have been described in connection with specific exemplary implementations, it should be understood that various changes, substitutions, and alterations apparent to those skilled in the art can be made without departing from the spirit and scope of the invention as set forth in the appended claims. Although a number of “assumptions” are provided herein, the assumptions are provided as illustrative but not limiting examples of one or more particular embodiments, and those skilled in the art appreciate that other embodiments may have different rules or assumptions.
This application claims the benefit of U.S. patent application Ser. No. 14/543,442 filed on Nov. 17, 2014, the contents of which are hereby incorporated by reference for all purposes.
Number | Date | Country | |
---|---|---|---|
Parent | 14543442 | Nov 2014 | US |
Child | 17703518 | US |