CPC G06Q 20/24 (2013.01) [G06F 9/451 (2018.02); G06F 9/54 (2013.01); G06Q 20/2295 (2020.05); G06Q 20/322 (2013.01); G06Q 40/03 (2023.01); G06F 9/4484 (2018.02); G06F 2209/541 (2013.01)] | 20 Claims |
1. A computer-implemented method, comprising:
executing a host application on an electronic device;
invoking, by one or more processors of the electronic device, a child application from within the host application, wherein the child application is associated with a child application server, and wherein the child application is distinct from a host server associated with the host application;
receiving an input using the host application executed by the one or more processors of the electronic device, wherein the input is associated with a user purchase at the electronic device, and wherein the user purchase is associated with an offer;
transmitting, by the one or more processors of the electronic device, a request for user data associated with the child application;
receiving, by the one or more processors of the electronic device, the user data;
storing, by the one or more processors of the electronic device, the user data in a memory of the electronic device, wherein a portion of the user data is stored as personal information that is inaccessible to and unmodifiable by the host application, wherein the portion of the user data is stored using encryption in accordance with a security model of the child application, and wherein the portion of the user data is accessible by the child application; and
generating, by the one or more processors of the electronic device, the offer based on the personal information and purchase data for the user purchase, wherein the offer is generated while maintaining the personal information as inaccessible and unmodifiable by the host application.
|