Embodiments of this invention relate, generally, to consumer data in computing systems, and in particular, to computing systems which manage and protect consumer data and increase the accuracy of consumer purchasing alternatives.
There are numerous individual computing and software systems that collect data about each consumer (also interchangeably referred to herein as a customer, buyer, prospective buyer, user or the like) of the computing systems. For example, a search engine running in a browser of the computer tracks some or all of the user's various searches and activity on the internet. If a user visits an e-commerce website, a cookie may be created which relates to the user's activity on that particular e-commerce website. As another example, a user may opt in to a hotel rewards program which tracks the user's historical purchases of hotel rooms, locations, services, as well as user profile information which the user expressly provides when establishing their hotel rewards account. As another example, a user's social network account (such as Facebook) maintains large amounts of data including the user's background and preferences (such as “likes” or “dislikes”) of products and services as well as online activities on the social networking site and affiliated sites. As recognized by the present inventors, for a consumer, there may be hundreds of different collections of personal consumer data that are stored in and by hundreds of different websites, companies, entities, and computing devices.
However, as recognized by the present inventors, each conventional system (i) maintains a partial view of the consumer based on the consumer's interaction with that particular conventional system, (ii) collects information about the consumer in a manner over which the consumer has little, if any, control, and (iii) makes use of collected consumer information in a manner over which the consumer has little, if any, control. In other words, (i) the data relating to the consumer that is maintained by a conventional system or social networking site is not necessarily shared with a company running the hotel rewards program and a company collecting the consumer's search engine data, (ii) the information collection generally occurs without the consumer's conscious knowledge and often without the consumer's explicit permission, and (iii) the collected information is often retained and used to the financial benefit of third parties other then the consumer without the consumer's conscious knowledge and often without the consumer's explicit permission.
A February 2013 Business Week article highlighted the need for more effective means of protecting privacy and confidentiality of consumer information:
Concern over the confidentiality of consumer information is not limited to the United States. In a February 2013 New York Times article, Viviane Reding—the Vice President of the European Commission and the Justice Commissioner of the European Union, noted that:
Moreover, as recognized by the present inventors, conventional systems and conventional websites typically do not provide a means by which a consumer/user can review or edit the information maintained by the systems/websites about the consumer.
As recognized by the present inventors, what is needed are systems and methods for private and secure collection and management of a user's personal consumer data.
According to one broad aspect of an embodiment of the present invention, methods and systems are disclosed herein for a private data concierge (PDC) that privately and securely collects information about users and selectively discloses such information to third-parties under the control of the user. In one example of the invention, a computer-implemented method for collecting information includes collecting a plurality of data relating to a user from a plurality of unaffiliated data sources, wherein the data comprises data of varying formats. In particular, the collecting at one or more of the plurality of unaffiliated data sources is performed in part under authorization by the user. Also, at least one data source is unaffiliated with another unaffiliated data source such that data is not otherwise shared between those unaffiliated data sources. The method includes aggregating the data collected from the plurality of unaffiliated data sources. The method may also include normalizing the data that is collected and aggregated into a standardized form. The method also includes generating an aggregated data profile associated with the user based on the data that is collected and aggregated. The aggregated data profile includes information relating to characteristics and/or activities of the user.
In this manner, the aggregated data profile contains significant amounts of information about the user gathered from numerous data sources, which helps form a more comprehensive view of the user and their interests and characteristics.
The user can revise or edit one or more items of the aggregated data profile, and the user can control disclosure of one more items of the user's aggregated data profile, for instance to explore possible transactions with vendors on an anonymous basis or with limited disclosure of identifying information. Vendors can be provided with access to portions of user's aggregated data profiles, without disclosing identities or other private information of the users, so that vendors can have access to highly qualified leads of prospective customers.
According to another broad aspect of another embodiment of the present invention, another computer-implemented method for collecting information is disclosed herein. In one example, the method includes collecting a plurality of data comprising online and offline activities of a user from a plurality of unaffiliated data sources, wherein the data comprises disparate data of varying formats. Collection of information at one or more of the plurality of unaffiliated data sources is performed in part under authorization by the user. At least one data source is unaffiliated with another unaffiliated data source such that data is not otherwise shared cooperatively between those unaffiliated data sources. The method includes aggregating the data collected from the plurality of unaffiliated data sources. The method includes normalizing the data that is collected and aggregated into a standardized form. The method includes generating an aggregated data profile associated with the user based on the data that is collected and aggregated. The aggregated data profile includes information relating to characteristics and/or activities of the user. The method includes controlling release of one or more items of data of the aggregated data profile to one or more third parties under authorization of the user.
In this manner, the user can control the release of portions of the aggregated data profiles to third-parties such a vendors, which gives the user control over private user information.
According to another broad aspect of another embodiment of the present invention, a system for collecting information is disclosed. The system includes an online platform configured to generate a plurality of aggregated data profiles for a plurality of users. The system includes a collecting component configured for collecting a plurality of data relating to a user from a plurality of unaffiliated data sources, wherein the data includes disparate data of varying formats. The collecting component performs the collecting at one or more of the plurality of unaffiliated data sources in part under authorization by the user. At least one data source is unaffiliated with another data source such that data is not otherwise shared between those data sources. The system includes an aggregation component for aggregating the data collected from the plurality of unaffiliated data sources. The system may also include a normalizing component for normalizing the data that is collected and aggregated into a standardized form. The system also includes a user profile generator for generating an aggregated data profile associated with the user based on the data that is collected and aggregated. The aggregated data profile includes information relating to characteristics and/or activities of the user.
In this manner, the aggregated data profile contains significant amounts of information about the user gathered from numerous data sources, which helps form a comprehensive view of the user and their interests and characteristics.
According to another broad aspect of another embodiment of the present invention, disclosed herein is a computer system, comprising a module providing for collecting, from a plurality of data sources, one or more items of personal consumer data related to a user; a module providing for securely storing, in one or more databases, the one or more items of personal consumer data related to a user to form an aggregated data profile of the user; and a module providing controls for the user to revise at least one of the items of personal consumer data in the user's aggregated data profile. In one example, the plurality of data sources includes one or more social networking sites, internet search engines, credit card accounts of the user, or other data sources as described herein.
In one example, the aggregated data profile includes at least one interest in a product or service as derived from the one or more items of personal consumer data collected from the plurality of data sources.
In one example, the module providing controls for the user to revise at least one of the items of personal consumer data in the user's aggregated data profile, includes a graphical user interface that selectively displays the at least one of the items of personal consumer data. The controls may include controls for the user to confirm, delete or modify at least one of the items of personal consumer data.
In another embodiment of the invention, the computer system may also include a module for anonymously identifying users to vendors wherein the users match one or more queries from one or more vendors and wherein the identification is based on the contents of the user's aggregated data profile.
In another embodiment of the invention, the computer system may also include a module for identifying vendors to one or more users, wherein such vendors match one or more requests for product information from the users.
In another embodiment of the invention, the computer system may also include a module for recommending to one or more users one or more products for purchase, wherein the recommending is based in part on the contents of the user's aggregated data profile.
In another embodiment of the invention, the computer system may also include a module for recommending to one or more users one or more other users, wherein the recommending is based in part on the contents of the user's aggregated data profile.
In another embodiment of the invention, the computer system may also include a module for providing users that have authority over other users with the ability to control the activities of subordinate users, wherein the control is based in part on activities that the authority user designates in advance as being approved and/or permissible.
The features, utilities and advantages of various embodiments of the invention will be apparent from the following more particular description of embodiments of the invention as illustrated in the accompanying drawings.
Disclosed herein are various systems and methods for private and secure collection and management of a user's personal consumer data. As described herein, various embodiments of the invention include a private data concierge (PDC) 50 (see
Embodiments of the invention form a secure and comprehensive aggregated data profile 58 of a user 54 by collecting information related to the user from across various disparate data sources 56; and once the aggregated data profile 58 of the user is securely formed, embodiments of the present invention permit the user to either anonymously communicate with or selectively disclose the user's identity and/or the user's aggregated data profile 56 (or portions thereof) to vendors, advertisers or other entities 60 that are interested in communicating with the user 54 (for instance, to possibly enter into a purchase transaction) based on one or more of the user's characteristics as expressed in the user's aggregated data profile 58. In this manner, embodiments of the invention provide for forming a more complete and accurate profile of a consumer/user in a secure manner that is controlled by the user, thereby providing the user with improved control over the user's personal consumer data and privacy.
Additionally, embodiments of the invention provide for facilitating interactions and communications 62 (
In one embodiment, a PDC 50 is configured to collect and use information 52 related to a user 54. The operations performed by one example of the PDC are described in Equations 1 and 2, below. More specifically, the first part of Equation 1 relates to the input of information into the PDC. Specifically, the collection of information by the PDC is controlled by the user, and is expressed as “User Control” (UC). Further, the collection of information is performed over multiple “Unaffiliated Data Systems” (UDS), numbered 1-N. The second part of Equation 1 relates to the output of information from the PDC. Uniquely, the output of information by the PDC is also controlled by the user, as expressed by the reuse of the term “User Control” (UC). That is, the user controls access to and use of PDC information collected by multiple “Authorized Third Parties or Vendors” (ATPs). Equation 1 is defined, as follows:
PDC=(UC×UDS1−n)+(UC×ATP1−n) (1)
As recognized by the present inventors, most data collection services focus on information related to “online” activities. In embodiments of the present invention, the PDC 50 is configured to include both information relating to online activities (“OLA”) as well as information related to offline activities (“OFA”), as is expressed in Equation 2, as follows:
PDC=OLA+OFA (2)
More particularly,
More particularly,
For purposes of the present application, the term “online” activity refers to activity that occurs while connected to a computer or telecommunications network, such as, the internet as compared to “offline” activity which refers to activity that occurs in the real (or physical) world; it should be noted that information with regard to both online and offline activity may be captured, collected, reported, etc. via electronic or telecommunications mechanisms—the difference between the terms pertains to whether the underlying activity in question occurs online or in the real (or physical) world.
Google chairman, Eric Schmidt, has expressed his opinion that there are “Four Horsemen” 120 driving the consumer revolution on the internet—Amazon, Apple, Facebook and Google. Chiang, Lulu. “Google's Schmidt Remembers Steve Jobs.” CNBC, 6 Oct. 2011, available at http://www.cnbc.com/id/44808266/Googlersquos_Schmidt_Remembers_Steve_Jobs. Information collected by each of the Four Horsemen 120 is shown in
Each of these Four Horsemen 120 and Others 125 influence the internet consumer revolution by controlling one or more of four key online platforms: 1) Mobile Operating System; 2) Mobile Hardware; 3) Internet Browser; and/or 4) Social Media. However, each of these Four Horsemen and Others control only that “Online Information” (OLI) processed by those platforms over which they exercise influence and/or control.
Further, each of the Four Horsemen fail to effectively incorporate consumer information from non-online sources of “Offline Information” (OFI). Offline information is related to offline activities of a user, and may be facilitated through some online activity, or defined in combination with online activity. For instance, the user may perform online research regarding an automobile purchase, and perform offline activity when actually purchasing the automobile through a dealership.
Other examples of offline activities include grocery shopping, wherein the purchases made by a user at a grocery store are offline activities; and to the extent that the grocery store tracks or maintains data relating to what the user purchased, for instance through a rewards or loyalty card, such data related to the user's offline activities and purchases can be communicated to or obtained by the PDC to form part of the user's aggregated data profile. Other examples of offline activity may include, but are not limited to, exercises performed by a user and tracked via the user's smartphone; travel conducted by the user and tracked by the user's airline, hotel and car rental loyalty accounts. These are but a few possible user offline activities where data related to the user's offline activities can be obtained by the PDC for inclusion in the user's aggregated data profile.
One uniqueness of the anonosphere 200 is that information that otherwise would be separate and independent of each other is collected and aggregated into one anonosphere 200 for a particular user 54. As such, the collected and derived information included within anonosphere 200 is more complete than any profile associated with any of the Four Horseman 120 or other entities 125.
Additionally, in accordance with one aspect of the present invention, the information contained within the anonosphere 200 is anonymous to entities 60 outside of the PDC 50. In one embodiment of the present invention, information is selectably released through authorization of the user, such that the user is able to specify which information or types of information is released, and to what degree. In that manner, information is released with degrees of security, will be described in more detail below. As such, the user is able to operate around an axis 270 of anonymity, wherein the anonymity is controlled by the user.
If desired, the PDC 50 can receive and categorize information regarding product and service offerings from manufacturers/advertisers 60. In one example, the PDC examines and compares interests of the users/consumers 54 (as contained in the user's aggregated data profile 58) with the offerings of the manufacturers/advertisers, and the PDC notifies the manufacturer/advertisers 60 of the existence of a perspective buyer on an anonymous basis. For instance, a consumer interested in a category of product or service offerings can be anonymously communicated by the PDC 50 to the relevant manufacturer/advertisers 60 to determine whether there is a match between consumer defined criteria and the manufacturer/advertisers. When a match is determined, limited information necessary to initiate a transaction may be exchanged with the user's consent between the consumer and the manufacturer, and if desired by the user, additional identifying information about the user may also be provided to the manufacturer/advertiser.
In another example, the PDC 50 examines the consumer interests and behavior data in the user's aggregated data profile 58, and the PDC suggests or recommends products/services to the user 54 without identifying the consumer to the manufacturers and advertisers 60. In this way, recommendations are made to the user 54 without the disclosure of the user's identity which thereby enhances the privacy of the user and can reduce or prevent the creation of unwanted e-mails or other unwanted communications from manufacturers/advertisers to the user. Also, the aggregation of data 58 from multiple unaffiliated data sources 56 related to the consumer's preferences/activities increases the accuracy of recommendations made by the PDC or by vendors to the consumer based on their aggregated profile 58 information.
In the example of
As shown in
The PDC engine 50 implements one or more of the operations, processes, or process steps as described herein, and may include other operations or process steps as desired depending upon the particular implementation. The PDC engine 50 gathers information 52 (such as 120, 125 and/or 130 shown in
There are a variety of different types of consumer information and data 52 including but not limited to the following: structured, unstructured, big, behavioral (implicit), individual (explicit), derived, personal identifying information (PII), as well as other types of data suitable for collection and classification or as described herein.
Structured data includes data that has an enforced composition of data types and/or layouts with a predetermined relationship one to another, such as, those associated with a user or participant. For example, in a particular registration form, the first field is used to identify the name of the participant, the second field is used for age, the third field is used for address, etc.
Unstructured Data includes data stored in an unstructured format with no conceptual definition or data type definition—e.g., in textual documents, a word is simply a word.
Further, Frank Moss describes “Big Data” in his article entitled “How Small Businesses Are Innovating With ‘Big Data’ Business.” Moss, Frank. “How Small Businesses Are Innovating With ‘Big Data’.” MSN—Business On Main, available at http://businessonmain.msn.com/browseresources/articles/inventingan dnewideas.aspx?cp-documentid=30009963#fbid=rMM72SDnRvP. Specifically, “Big Data” is defined as “ . . . the explosion of structured and unstructured data about people—you, me and everyone . . . . Computers, smart phones, GPS devices, embedded microprocessors, sensors—all connected by the mobile internet—are forming a ‘societal nervous system’ that is generating a cloud of data about people that is growing at an exponential rate . . . . Every time we perform a search, tweet, send an email, post a blog, comment on one, use a cell phone, shop online, update our profile on a social networking site, use a credit card, or even go to the gym, we leave behind a mountain of data, a digital footprint, that provides a treasure trove of information about our lifestyles, financial activities, health habits, social interactions, and much more . . . . For decades, public and private institutions have been storing data about individuals through employee records, customer transactions and electronic medical records . . . . But it's been accelerated by the spectacular success of social networks like Facebook, Twitter, Foursquare and LinkedIn, and video/picture sharing services like YouTube and Flickr. When acting together, these services generate exponential rates of growth of data about people in astonishingly short periods of time . . . . Once the stuff of sci-fi, it's now possible to use mobile phones and wireless sensors to collect huge volumes of data about people's emotions ‘in the wild’—where they live, work and play. These data sets reveal important patterns that can revolutionize how consumer products are conceived, designed and marketed.”
Behavioral or implicit data includes data gathered by tracking a consumer's activity. For example, behavioral data may be gained from tracking a user's everyday actions on a retailer's website.
Individual or explicit data includes data expressly provided by a consumer. For example, explicit data is collected by means of completing registration forms, surveys, quizzes, etc.
Derived Data includes data derived from other information using a mathematical, logical, or other type of transformation—e.g., arithmetic formula, composition, aggregation. Generally, original data used to determine derived data cannot be reconstituted from the derived data—e.g., a credit score for a consumer.
Personal Identifying Information (PII) includes information that reveals facts about a person. As an example, PII forms a basis to determine the identity of the person. Various forms of PII include, but are not limited to, social security number, bank account number, etc.
All of these various types of data may be collected by the PDC 50 both in online and offline environments, as further described below depending upon the particular implementation. In brief, in an online environment, the information may be pulled both by third party vendors and the PDC in the sense that the user's activities are collected. Also, information may be pushed to those third party vendors, and/or the PDC, such as, when the user actively provides information. In an offline environment, information is pushed to or pulled by the PDC, such as various activities performed by a user is related to the PDC or requested by the PDC.
For example, consumer data and information can be gathered by the PDC 50 in a variety of manners including, but not limited to, direct input by consumers, placing a tracking cookie on the consumer's machine which reports all internet use to the PDC, automatic importing of information from third party systems (i.e., 56) with which the consumer interacts with the explicit permission of the consumer by means of delivery of the information by such third parties to the PDC, signing on to third party systems using credentials provided by the consumer such as user ID and password to extract desired information, or population by third party data providers such as Axiom. Desirable information about the user 54 includes, but is not limited to, searches conducted, products purchased, posts to social networks, browsing activity on visited sites and purchasing activity online and at physical locations.
The PDC engine 50 then makes the aggregated data profile 58 securely available to the respective user 54 so that the user can view, modify and supplement the profile 58 as desired. The PDC engine 50 maintains the aggregated data profile 58 in a secure manner, and, in one example with the explicit permission of the user, uses portions of information contained in the user's aggregated data profile 58 to identify, on an anonymous basis, the existence of a prospective buyer to one or more advertisers/retailers/manufacturers or other entities 60.
In this manner, interested companies 60 can utilize embodiments of the present invention for locating, anonymously, highly qualified leads for the potential purchase and sale of products and services; and this system (i.e., 80) can assist in facilitating communications between the user 54 and such companies 60. In particular, the PDC 50 is able to generate one or more highly qualified leads of PDC users 54 for a particular third party vendor 60 (e.g., in the sale of a product or service), wherein a highly qualified lead is an individual or entity 54 that is associated with attributes that has been historically found to be closely associated with an actual purchaser. By way of example, such communications can include without limitation, providing an anonymous profile (or portions thereof) of an interested user 54 to a vendor 60, alerting a user to potential vendors of interest to the user and enabling the user to communicate with the vendor through the PDC without disclosing any personal information, and others.
As shown,
Specifically, at 510 the method includes collecting a plurality of data relating to a user from a plurality of unaffiliated data sources. The data includes disparate data of varying formats (e.g., structured and unstructured data). The collection of data from one or more of the plurality of unaffiliated data sources is performed in part under authorization by the user. Further, in the plurality of data sources, at least one data source is unaffiliated with another data source, such that data is not otherwise shared between those unaffiliated data sources without benefit of embodiments of the present invention. In one embodiment, the operations performed at 510 are executed by the collecting component 560 of the PDC 500B of
Also, at 520 the method includes aggregating the data collected from the plurality of unaffiliated data sources. In this manner, data from one unaffiliated data source is combined and relatable to other data from other unaffiliated data sources. In one embodiment, the operations performed at 520 are executed by the aggregating component 570 of the PDC 500B of
At 530, the method includes normalizing the data that is collected and/or aggregated into a standardized form. In that manner, relevant data distilled down to a standardized format is capable of being efficiently analyzed. In one embodiment, the operations performed at 530 are executed by the normalizing component 580 of the PDC 500B of
At 540, the method includes generating an aggregated data profile associated with the user based on the data that is collected and aggregated. More specifically, the aggregated data profile includes information relating to characteristics and/or activities of the user. That is, representations of data collected and aggregated are included within the aggregated data profile. In one embodiment, the operations performed at 540 are executed by the user profile generator 590 of the PDC 500B of
As mentioned above, the specific user data to populate data fields 600 of the user's aggregated data profile 58 can be obtained—in real-time or periodically—by the PDC from a plurality of different data sources, such as but not limited to social networks, search engines, financial entities, e-commerce websites, vendor websites, an portable devices like smart phones and tablet computers. The PDC 50 may also request such information directly from the user or provide a graphical user interface so that the user can add/supplement and modify/edit certain of the information contained in the data fields of the user's aggregated data profile.
Embodiments of the present invention can also utilize a unique proxy identifier for each user (e.g., such identifier including alphanumeric text in one example). Such unique proxy identifiers associated with each user provide an additional level of security, whereby the consumer's actual identity is not revealed to an outside party (unless specifically authorized by the consumer) but rather the unique proxy identifier is generated by the PDC and used. In one example, only the PDC knows how to relate back each unique proxy identifier back to the respective user/consumer in the system. If desired, the proxy identifier itself can be changed on a regular basis to provide further protection. For example, on day 1 a user might be associated with a proxy identifier 1234 but the next day a different proxy identifier (e.g., “abcd”) could be assigned, and so forth; with the database(s) of the PDC keeping track of the then current (and past) proxy identifiers associated with each of the users/consumers in question. Hence, embodiments of the invention as described herein may utilize unique proxy identifiers for each user as a way of identifying a user without disclosing their identity.
One of the benefits of embodiments of the present invention relates to the security of information related to users. Consumer information stored by other disparate data sources (i.e., vendors/marketers/websites) is subject to the vagaries and disparate levels of security provided by such parties maintaining the data. By concentrating consumer data within the PDC system as disclosed herein, embodiments of the invention can be adapted to provide the highest levels of data protection and associated certifications (e.g., ISO 27001, SSAE 16/SOC 1, and SOC 2 certifications) and leverage those capabilities to protect each user's aggregated data profile as stored in the database(s) of the PDC system. This structure of data security protection is expected to be more effective than in the alternative case where each of the different data sources/repositories would have to invest separately in data security to get the same benefit.
In one example, the PDC is in communication with a defined set of data sources such as search engines, e-commerce retailers, social networks, vendors, financial service entities, or other entities, databases, websites. At operation 730, the information maintained by the data sources identified in operation 720 related to the user is transferred via one of numerous conventional means of data transfer such as via terminal emulation (Telnet), File Transfer Protocol (FTP), SSH (Secure SHell) or Secure CoPy (SCP) by appropriate means given time sensitivity of the data and associated cost considerations such as via “stream mode” where data is sent in a continuous stream, “block mode” where the data is segregated into logical blocks or “compressed mode” where data is compressed before sending using an algorithm that is then used following receipt to decrypt the data. Desired data may exist in a predictable “structured” format that can be transferred by any of the aforementioned manners or, if unstructured, can be converted into a specified format prior to, or after, submission to the PDC so as to reside in the PDC in an expected, predictable, normalized format.
The collection of information from unaffiliated data sources includes proprietary information derived and/or collected by one or more unaffiliated data sources. This proprietary information may be defined in varying degrees of security and privacy, in relation to the holding third party vendor. For instance, a level 1 proprietary information may include relatively public information related to a user, such as, information provided on a social media website associated with the user. That information may be collected through direct access to that website, and with authorization by the user. Lower levels of proprietary information includes derived data, such as, behavioral statistics, or information that is derived from user activity, behavioral statistics, etc. When the user owns that information, user authorization allows the PDC to gain access to that information.
However, when the third party vendor owns that information, collection of that information is achieved through authorization by that third party vendor. A third party vendor authorizes the delivery of information to the PDC because it benefits the third party vendor. That is, the PDC is able to aggregate proprietary information from one or more unaffiliated data sources, in order to generate a more complete and accurate aggregated data profile of that PDC user. In one embodiment, the proprietary information is secure within the PDC environment, and not released to other third party vendors. The information and targeting of the user using the PDC aggregated data profile is used by the PDC to provide qualified leads that are of higher quality than those produced by any one of the unaffiliated data sources. This is because any one of the unaffiliated data sources only has an incomplete picture or profile of the user that only includes proprietary information obtained by the data source, whereas the PDC aggregated data profile of the user contains information that is read and collected across multiple unaffiliated data sources.
At operation 740, the information obtained at operation 730 is securely stored in the appropriate data fields of the user profile/template, thereby forming the aggregated data profile of the user. At operation 750, for each data source, operations 730-740 are repeated until each piece of relevant user data maintained by the data sources is stored in the appropriate data field of the user's aggregated data profile. At operation 760, the data in the user's aggregated data profile is updated in real time, or periodically, by repeating steps 720-750 in real-time or periodically. For instance, periodic updates to the users aggregated data profile could occur on a daily basis; or alternatively or in combination, real-time updates could occur if the data sources provide a notification (i.e., an event notification or interrupt) to the PDC that updated data exists or status changes have occurred such that the PDC then obtains such new information and updates the user aggregated data profile. As such, in one embodiment a user's profile is favorably or unfavorably modified via periodic and/or real-time updates for purposes of targeting by third party vendors.
In one example of an embodiment of the invention, product and service offerings can be requested by users (i.e., “pulled”), or sent (i.e., “pushed”) to the users/consumers based on any of the following or a combination thereof: (i) stated user preferences, (ii) tracking of activity related to the user, and/or (iii) specified data and/or changes in data—examples of which could include but are not limited to (a) birth dates, anniversaries, status such as single or married, or religious affiliation. The interaction and overlapping of these different criteria could help to more accurately reflect proposed products/services with a higher level of likelihood of meeting the needs of a particular user/consumer.
At operation 910, a user's aggregated data profile, including the user's preferences and purchasing history, is reviewed and analyzed. At operation 920, the user's aggregated data profile, or specific data fields therein, are compared to the vendor's offerings, without disclosing any user identification information to the vendor. At operation 930, to the extent that there is a match or potential match between a vendors offerings and a user's desire for products or services as expressed in the user's aggregated data profile, one or more recommendations is made to the user. Because the recommendation is made to the user without disclosing any user identification information to the vendor, the recommendations of operation 930 can be made privately to the user.
In one embodiment, information concerning products is collected, in part, through crawling vendor sites online and determining what is available to the consuming public. In another embodiment, the PDC is configured to allow vendors to sign up and directly provide a description of the available products along with pricing, etc. Vendors would be interested in providing this information because as noted in a TechCrunch article entitled The Ecommerce Revolution Is All About You, “. . . [t]he best way to begin understanding the opportunity of personalization in the future is to realize the immense challenge that retailers face when approaching personalization . . . . When you go to Nordstrom you have a shopping assistant who helps direct you, basically saying ‘I'm here to help, what do you need and here's where to find this.’ No online retailer has quite nailed that . . . [f]or most retailers, the toughest hurdle is to have enough data on an individual to actually help personalize the experience. For the majority of buyers who purchase from a specific site once every few months, or even less frequently, a retailer may have no real sense of direction on how to present similar products.” Reo, Leena. “The Ecommerce Revolution Is All About You.” AOL Tech—Tech Crunch. 29 Jan. 2012, available at http://techcrunch.com/2012/01/29/the-ecommerce-revolution-is-all-about-you.
The above TechCrunch quote highlights difficulties caused by having too little data in connection with a “push” strategy for offering customized offerings to consumers. The existence of a common repository of data concerning the totality of likes, dislikes, preferences, actions, location, etc. for each consumer would enable a highly accurate “pull” strategy in which consumers who are “highly qualified prospects” could request products or services they desire. Embodiments of the present invention would not only make a more effective “pull” strategy possible but would also address issues related to ownership and privacy of consumer data. For example, an aggregated user profiled of a PDC user includes both structured and unstructured data collected from one or more unaffiliated and disparate data sources both online and offline. The user may directly provide structured data online to the PDC that indicates a preference for country music. Additional information about that user is collected by the PDC combination of online and/or offline from an unaffiliated data source, such as a credit card company, that indicates that the user bought tickets to a country music concert highlighting a performance by country music Singer A. From another unaffiliated offline data source, such as a department store, information is collected or delivered to the PDC indicating that the user purchased a t-shirt promoting country music Singer A. As such, the PDC aggregated user profile may indicate that the user is a highly motivated fan of Singer A, and may be willing to purchase additional items and services associated with Singer A. For example, a third party vendor providing suite tickets to an upcoming concert preformed by Singer A may want targeted access to any PDC user who possesses characteristics and/or participates in activity which is considered by the vendor as indicating high potential interest in purchasing the suite tickets. In that manner, the PDC is able to provide access to one or more highly qualified PDC users that may be particularly interested to purchase those suite tickets at a premium. Further, the targeting may be performed in an anonymous or more public manner, as dictated by the user.
As an example,
Hence, it can be seen that embodiments of the present invention provide for aggregating personal consumer information from a plurality of disparate sources, in order to form a comprehensive and secure data profile of the user that is controlled by each user. In this manner, the user's personal consumer data is protected and the user's privacy while using the internet is enhanced. This anonymity is enhanced both during “research” as well as any “purchasing” phase of their activity by enabling consumers to surf the web through a proxy server to ensure web site analytics do not detect the actual identity of the user. This further exemplifies the fact that the user is able to control use of the information within an associated aggregated user profile, which is enhanced through controlled anonymity of the user.
At operation 1210, with a user's permission, the user's aggregated data profile is obtained and one or more elements of the user's aggregated data profile are analyzed to determine one or more characteristics. At operation 1220, other users who have expressly elected to participate in this exercise, are identified that have one or more similar characteristics or traits in their aggregated data profiles when compared with the aggregated data profile of the user as obtained and analyzed at operation 1220. When a match is found between the present user's aggregated data profile and one or more other users' aggregated data profiles, operation 1220 also examines the products and services purchased by those other users in order to identify potential recommendations of products and services for possible purchase by the present user. These recommendations are formulated without disclosing the identity of the present user or of the other users. At operation 1230, the product and service recommendations formulated by operation 1220 are presented to the present user for consideration. In this manner, the aggregated data profiles of each of the users maintained by the system can be utilized to make recommendations to the users within the system of potential products and services that may be of interest without having to reveal the identity of any user. If desired, a user can disable this recommendation feature from their PDC account.
More particularly, embodiments of the present invention distinguish themselves from standard collaborative filtering approaches used in the industry by including data from unaffiliated data sources as well as by including not just buying behavior but also other data in the decision making process. For example, collected information may include wall posts either posted on a user's social networking site about the product, or information related to other posts on the user's wall read from friends' posts about the product. All this collected information helps to shape the type of offer(s) received.
In addition, providing the consumer with a means to further refine the product/service matching recommendations by indicating how close a fit the proposed match or targeting produces help the PDC refine the matching process with respect to that user. Examples of user interaction with the PDC to relay preferences to received targeting include, “good/spot-on”, “bad/way-off”, or similar buttons.
At operation 1310, the system obtains vendor requests of characteristics of users in the system, so that such users who have expressly elected to participate in this exercise can be contacted for the vendor's study or survey of the vendor's proposed products or services. For instance, if a vendor is looking to conduct a survey of men between the ages of 25-30 in the northeast part of the country who have an interest in outdoor clothing such as ski jackets, such request is formulated and transmitted to the system.
At operation 1320, the system searches for matching characteristics in the aggregated data profiles of the users within the system who have expressly elected to participate in this exercise, based on the request of operation 1310.
At operation 1330, upon the system locating users having matching characteristics as requested by the vendor, the system alerts the vendor of the existence of matches to the vendors requests, without disclosing to the vendor any identifying information of those matched users. For instance, continuing with the example described above, the system may indicate to the vendor that 724 males have been identified within the system that are between the age of 25-30 in the northeast part of the country who have an interest in outdoor clothing such as ski jackets.
At operation 1340, the system facilitates communications between the match users and the vendors on either an anonymous basis, limited identity disclosure basis, identity disclosed basis, or any variation thereof, as desired by each user. The communications can include controls for each user to accept or decline the vendor's requests that the user participate in the product study or survey.
At operation 1350, the system may be configured to facilitate compensation from the vendors to the users that participate in the vendors study or survey. This may be done on an anonymous basis, limited identity disclosure basis, identity disclosed basis, or any variation thereof, as desired by each user.
Hence it can be seen that embodiments of the system disclosed herein can be utilized to facilitate product or service related studies, surveys or questionnaires to targeted users having certain characteristics as specified by the vendor, without revealing the identities or identifying information (such as email addresses) of the users. This also allows for such studies, surveys, or questionnaires to provide to vendors significantly greater amounts of relevant information from highly targeted audiences, when compared with conventional survey techniques. If desired, a user can disable this feature from their PDC account.
In another embodiment, providing survey type information to vendors allows for a platform configured for connecting those vendors to “influencers” in the desired product/service area. Influencers are identified and respected as a good source of information with regard to a particular product(s) or service(s) and exert influence on the decisions of other prospective purchasers based on their opinions, recommendations and/or actions. Influencers can exist both online (e.g., an influential in social media) and offline (e.g., a neighborhood car expert). By collecting additional metrics about how a user participates in online activities (e.g., within the context of social media) from a variety of disparate data sources and/or how influential the person is on a topic offline, vendors would find this a valuable resource. In one example of the connection between a vendor and an influencer and the benefits provided to a vendor and consumers, a vendor may desire to provide new products/services to one or more influencers for free in exchange for them either providing feedback and/or talking about the products/services in their online and offline networks.
At operation 1410, the system obtains and analyzes aggregated data profiles of a plurality of participating users. At operation 1420, the users' aggregated data profiles are compared to other users' aggregated data profiles, in order to identify potential commonalities between the users, assess commonalities that can be used to form the basis for recommending potential friends, traveling companions, dates, affiliations, social network connections, or other connection or relationship development. Operation 1420 is performed without disclosing, to any user, any identifying information of other users. As part of the aggregated data profile comparison, the system can examine the dynamic real-time activity data of various users as contained within each users aggregated data profile, such activity data including hobbies, interests, actual activities performed and recorded in the aggregated data profile such as exercise, product purchases, restaurant choices, or other activities. This information extends well beyond the static profile information submitted by users when they fill out their profile; and instead includes dynamic information based on a user's actual real-time activities and other actions.
At operation 1430, recommendations are formulated and made to a user of potential friends, traveling companions, dates, affiliations, social network connections, or other connection or relationship development. What differentiates some embodiments of the invention from current matching sites is having access to multiple unaffiliated data sources such as social media posts, websites visited, articles read (among other things) both online and offline which would provide additional details to enable greater likelihood of successful matches based on common likes, dislikes and similar factors. As such, the aggregated data profile of the user includes information of greater variety and number, which in turn provides more accurate information relating back to the user.
Hence, it can be seen that embodiments of the present invention can be utilized to make relationship recommendations to one or more users and the system based on users' dynamic, real-time information as maintained in their aggregated data profiles.
Embodiments of the present invention can also be used by vendors, manufacturers, retailers, advertisers, and other entities wishing to identify, on an anonymous basis, potential customers that meet the vendors criteria, thereby providing the vendors with highly qualified leads to potential customers. The system can then facilitate communications between a user and a vendor in order to conduct a transaction such as a purchase of a product or service.
Some examples of possible uses of embodiments of the present invention are described herein. For instance, one consumer benefit to aspects of the present invention is that the system can provide users with anonymity while shopping. For instance, the identity of a user conducting research on potential cars can be kept confidential and when purchasing a car a user can receive offers based on their priorities as filtered through the PDC system without having to reveal their identity. By using the facilities of the PDC, car dealers do not have consumer contact information unless expressly authorized by users and therefore cannot bombard the users with unwanted or hard-sell communications or marketing.
Another example is that consumers will be able to control and profit from the disclosure of their identity information. Everyone knows that when a person gives their name to one mailing list, that information is sold to other lists and third parties. Through the use of aspects of embodiments of the present invention, consumers have the opportunity to not only take control, but also to profit by providing their data to sources that will pay for it (e.g.,
Another benefit to embodiments of the present invention is that users will, over time, receive marketing that is more relevant to their interests. iTunes™ knows what music you like; Amazon™ knows what books you read; Open Table™ knows what restaurants you like; other companies know where you live and your hobbies. As that information is aggregated by the PDC with the express permission of users as described above, the cross-platform data can be used to improve the relevance of offers made to the users. For instance, if Amazon knew what music you liked using embodiments of the present invention, it could recommend a book you would love; if Open Table knew you just bought a book on Indian Cooking, it could recommend a new restaurant in your neighborhood using embodiments of the present invention, and Groupon™ could send you an offer to such restaurant. If iTunes knew where you lived, using embodiments of the present invention, it could recommend a concert as soon as the concert was announced so that you could purchase great seats early on.
Another benefit to embodiments of the present invention is that companies can obtain information from embodiments of the system to refine locations for upcoming events. For instance, if Tina Turner's record label company is looking for locations to perform a few select shows, embodiments of the system can tell the company, without revealing any names or otherwise identifying information, that 75% of the residents of a small town in Colorado have purchased more than one Tina Turner album from Amazon or iTunes within the last year. The record label company can then plan a concert with high prospects of success in a town that would have otherwise been overlooked.
Another benefit to embodiments of the present invention is that companies or vendors can use embodiments of the present invention to make targeted time sensitive or inventory sensitive offerings. For example in the field of specialty foods, assume a high-end specialty food store ordered rare matsutake, or mattake mushrooms at a cost of $1,000 per pound. The demand for the mushrooms was less than expected and 100 pounds of mushrooms must be sold within the next hour or risk becoming worthless. By leveraging real-time Global Positioning Satellite (GPS) information and stored eating/purchasing data as maintained by embodiments of the present invention, the system could alert the food store of users with expressed interest in matsutake mushrooms that are or become proximately located within 10 miles of the store over the next hour so the store can offer such users a special price to purchase the mushrooms, which could result in sales significantly at higher rates and prices than to a less qualified or interested group of customers.
Referring to
Assuming the user selects the control 1520 to “Select Data Sources to Manage”, in
In the example display screen of
In the example display screen of
In
By way of explanation of the example of
Assume that the user wishes to correct and confirm aspects of his aggregated data profile as to his interests in cars—such that the user would like to be more specific as to his interest in the Audi A8 and selects the Modify control 2150 for the Audi A8; wishes to confirm his interest in the BMW 325i by selecting the Confirm control 2140 for the BMW 325i; and wishes to delete the data related to an interest in the Ford Focus by selecting the Delete control 2160 for the Ford focus. Then in
If desired, one or more controls can be provided to enable the user to prioritize or weight one or more user interests or user characteristics relative to other interest or characteristics (or in absolute form) as maintained in the user's aggregated data profile. For instance, in the example above, if the user is more interested in a silver-colored Audi A8 than the user is interested in a low price, a graphical user interface can be developed which provides the user with an ability to indicate such prioritization or weighting of such interests relative to one another or in absolute form.
Having gathered various data items related to the user from disparate data sources to form the user's aggregated data profile, and having provided the user with the controls 2130, 2140, 2150 to confirm, modify, or delete specific items of data in the user's aggregated data profile, the aggregated data profile can be utilized for various purposes as described herein for the benefit of the user and, with the express permission of the user, for the benefit of various vendors, companies or other entities. In
Assuming that the user has selected the “Cars” subcategory, the graphical user interface (
In
Alternatively, in the example of
The user's interest in a product is communicated, at the request of the user, by the PDC to one or more vendors that the system identifies as potential vendors that can satisfy the user's interest. For instance, in this example of
Referring to
There are various manners in which embodiments of the PDC can facilitate transactions between users and vendors. For instance, one or more controls in a graphical user interface can be provided for the user to advance a possible transaction with the vendor; for instance as shown in the example of
Also, access to third party information sources that are relevant to vendors can also be provided to users such as hyperlinks to Better Business Bureau reports on the vendor, or “Car Fax” reports which would provide title, accident and repair history for the VIN.
Also, as shown in the example of
In addition, one or more controls 2960 may be provided for a user to specify the level of identity disclosure of user information to the vendor. For instance, as the possible transaction moves forward, the user may desire to disclose more personal information about the user, such as but not limited to the user's email address, mobile phone number, credit rating or score, and/or similar information to advance the dialogue with the vendor and as the transaction is being finalized, the user may wish to disclose the user's name, address, and payment information such as credit card data. This could be facilitated by providing the user with customizable radio buttons that would enable them to select which level of detailed information to provide to a vendor at different points in their interaction with each vendor. Alternatively, the PDC can provide access to or utilize third-party payment mechanism (such as PayPal™ or other conventional payment mechanisms), so that the user's identity, credit card information or other related data need not necessarily be disclosed to consummate the user's transaction with the vendor.
Once payment is arranged or made, the PDC can gather information relating to order fulfillment if desired. Also, an optional survey of questions about the vendor could be asked of the user immediately after the purchase as well as at subsequent intervals to provide feedback about the vendor, the product and aid in modeling as well as potentially offering up the feedback when another user is thinking about buying that product or using that vendor.
In still another embodiment, the PDC is configured to provide users that are authority figures the capability to set up and exercise control over accounts for one or more subordinates. Examples of authority/subordinate relationships include parent/child and employer/employee relationships. These accounts can have established levels of detailed information and/or transaction authority that can be provided to third parties or to colleagues that cannot be overridden without access to a special password, multi-factor authentication (MFA) device or other means so that the capabilities of the PDC can be set and controlled by the authority. In the case of a parent/child account, this control provides for the beneficial protection of children. In the case of an employer/employee account, this control provides for management of permissible activities by employees.
In still another embodiment, access to services provided by the PDC engine is provided for non-members on a limited basis. This non-member, open-to-the public aspect can be implemented for purposes of attracting additional users to use services and products provided by the PDC engine. As such, the non-member use of the PDC allows non-members access to a subset of the benefits afforded to those who are members. For example, a non-member may use the PDC engine and/or platform to take advantage of a television deal (e.g., purchase of a high-definition 60 inch, flat screen television) negotiated by the PDC for the benefit of its members.
Hence, it can be seen that embodiments of the present invention provide for a user to form an aggregated data profile using personal information obtained from disparate data sources; and provide for a user to review and revise various data elements as reported by each data source that make up the user's aggregated data profile. Embodiments of the invention also facilitate users and vendors to exchange offers and other information to facilitate purchases of products and services. Embodiments of the invention also facilitate users being made aware of other users with whom they share common interests, activities and/or other factors to facilitate recommending potential friends, traveling companions, dates, affiliations, social network connections or other connections or relationship development. Embodiments of the invention also facilitate the creation of accounts which enable authority figures to exercise control over the activities of subordinates.
While the methods disclosed herein have been described and shown with reference to particular operations performed in a particular order, it will be understood that these operations may be combined, sub-divided, or re-ordered to form equivalent methods without departing from the teachings of the present invention. Accordingly, unless specifically indicated herein, the order and grouping of the operations is not a limitation of the present invention.
It should be appreciated that reference throughout this specification to “one embodiment” or “an embodiment” or “one example” or “an example” means that a particular feature, structure or characteristic described in connection with the embodiment may be included, if desired, in at least one embodiment of the present invention. Therefore, it should be appreciated that two or more references to “an embodiment” or “one embodiment” or “an alternative embodiment” or “one example” or “an example” in various portions of this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures or characteristics may be combined as desired in one or more embodiments of the invention.
It should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed inventions require more features than are expressly recited in each claim. Rather, inventive aspects lie in less than all features of a single foregoing disclosed embodiment, and each embodiment described herein may contain more than one inventive feature.
While the invention has been particularly shown and described with reference to embodiments thereof, it will be understood by those skilled in the art that various other changes in the form and details may be made without departing from the spirit and scope of the invention.
This application is a Continuation of co-pending U.S. patent application Ser. No. 13/764,773 filed Feb. 11, 2013 entitled “Systems And Methods For Private And Secure Collection And Management Of Personal Consumer Data” which claims the benefit of U.S. Provisional Patent Application No. 61/675,815 filed Jul. 26, 2012 entitled “Computer System for Private and Secure Collection/Management of Personal Consumer Data aka The Computerized Private Data Concierge,” the disclosures of which are incorporated herein by reference in their entirety.
Number | Date | Country | |
---|---|---|---|
61675815 | Jul 2012 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13764773 | Feb 2013 | US |
Child | 14671763 | US |