Methods and systems for enabling, tracking, and correlating anonymous user activity
Methods are disclosed for identity key management in networked application execution. In one embodiment, an identifier request is transmitted from a client system to a server system, in which an identity key value in the identifier request is blank. Upon detecting the blank identity key value at the...
Saved in:
Main Authors | , , |
---|---|
Format | Patent |
Language | English |
Published |
24.07.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Methods are disclosed for identity key management in networked application execution. In one embodiment, an identifier request is transmitted from a client system to a server system, in which an identity key value in the identifier request is blank. Upon detecting the blank identity key value at the server system, the server system operates to generate a new identity key value and an identifier for the new identity key value. The new identity key value and the identifier for the new identity key value are transmitted from the server system to the client system. The new identity key value is stored in a local store of the client system. The local store of the client system is secured by a passcode and persists data through power cycling of the client system. The identifier is used to track execution of a networked application in an anonymous execution mode. |
---|---|
Bibliography: | Application Number: US201514810365 |