Acxiom Corporation Patent applications |
Patent application number | Title | Published |
20150312221 | SECURE DATA EXCHANGE TECHNIQUE - Techniques utilizing common encryption approaches for data from multiple parties enable those parties to discover information that is held in common by the parties without disclosing to any party information that is not held in common by the parties. Encrypted information for each party can be compared to determine which encrypted values match, and those encrypted values can be returned to any of the parties such that a party can determine which corresponding data the parties have in common without having access to any other data of any other parties. | 10-29-2015 |
20150088649 | Quick Audience Search and Recommendation Apparatus and Method - A system and method for facilitating searching and recommendation for reaching a particular consumer audience with a marketing message operates across multiple media channels. Syndicated survey data for consumer behaviors is combined with consumer segmentation schema to create a subset of segments best associated with the product or service that is the subject of the marketing message. An average propensity index is calculated for that subset of best segments, and displayed for a user along with the total number of consumers in that subset of segments across multiple possible media channels. | 03-26-2015 |
20150088612 | Method for Analyzing Website Visitors Using Anonymized Behavioral Prediction Models - A method for analyzing web visitors using anonymized behavior production models begins with a website visitor accessing a website. The website includes a web beacon, which redirects the website visitor's browser to the server of a marketing services provider (MSP). The MSP server reads a cookie previously set by the MSP that includes an anonymous link. The anonymous link may be used to match data related to the website visitor that is maintained by the MSP, and browsing activity for that visitor is stored in an activity database from which periodic reports may be constructed for the website owner. The anonymous link is not associated with any personally identifiable information (PII), and thus privacy for the visitor is maintained. | 03-26-2015 |
20130212697 | SECURE DATA EXCHANGE TECHNIQUE - Techniques utilizing common encryption approaches for data from multiple parties enable those parties to discover information that is held in common by the parties without disclosing to any party information that is not held in common by the parties. Encrypted information for each party can be compared to determine which encrypted values match, and those encrypted values can be returned to any of the parties such that a party can determine which corresponding data the parties have in common without having access to any other data of any other parties. | 08-15-2013 |
20110271093 | SECURE DATA EXCHANGE TECHNIQUE - Techniques utilizing common encryption approaches for data from multiple parties enable those parties to discover information that is held in common by the parties without disclosing to any party information that is not held in common by the parties. Encrypted information for each party can be compared to determine which encrypted values match, and those encrypted values can be returned to any of the parties such that a party can determine which corresponding data the parties have in common without having access to any other data of any other parties. | 11-03-2011 |
20100011205 | SECURE DATA EXCHANGE TECHNIQUE - Techniques utilizing common encryption approaches for data from multiple parties enable those parties to discover information that is held in common by the parties without disclosing to any party information that is not held in common by the parties. Encrypted information for each party can be compared to determine which encrypted values match, and those encrypted values can be returned to any of the parties such that a party can determine which corresponding data the parties have in common, without having access to any other data of any other parties. | 01-14-2010 |
20090216850 | METHODS AND APPARATUS FOR CATEGORIZING FAILURE MESSAGES THAT RESULT FROM EMAIL MESSAGES - Techniques for classifying failure messages received from email messages that are sent are provided. A plurality of rules are created that are used to classify a plurality of failure types for email messages. Email messages are sent to an email address associated with an Internet service provider. When an email message fails, a failure message is determined. A rule that applies to the failure message is then determined and based on the rule, a failure type associated with the rule is determined. Once a failure type is determined, an action may be performed based on the failure type. For example, the email address associated with the email message may be marked as invalid. | 08-27-2009 |