Methods and systems for enabling, tracking, and correlating anonymous user activity

Methods are disclosed for identity key management in networked application execution. In one embodiment, an identifier request is transmitted from a client system to a server system, in which an identity key value in the identifier request is blank. Upon detecting the blank identity key value at the...

Full description

Saved in:
Bibliographic Details
Main Authors Ghanekar, Joy, Carroll, Dorion, Ravi, Rohith
Format Patent
LanguageEnglish
Published 24.07.2018
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Methods are disclosed for identity key management in networked application execution. In one embodiment, an identifier request is transmitted from a client system to a server system, in which an identity key value in the identifier request is blank. Upon detecting the blank identity key value at the server system, the server system operates to generate a new identity key value and an identifier for the new identity key value. The new identity key value and the identifier for the new identity key value are transmitted from the server system to the client system. The new identity key value is stored in a local store of the client system. The local store of the client system is secured by a passcode and persists data through power cycling of the client system. The identifier is used to track execution of a networked application in an anonymous execution mode.
Bibliography:Application Number: US201514810365