METHODS AND SYSTEMS FOR SECURING CONTENT PLAYED ON MOBILE DEVICES
Methods and systems are disclosed herein for managing content, including advertising content, delivered to various network-connected devices, including screens, mobile devices, computers, televisions, radios, and the like, based on usage profiles associated with device-specific identifiers for mobile devices, short-distance wireless technologies for transmission of content and detection of proximity, and content targeting and management techniques.
This application claims the benefit of the following provisional application, which is hereby incorporated by reference in its entirety: U.S. Provisional App. No. 60/825,708 filed Sep. 14, 2006.
BACKGROUND1. Field
The methods and systems herein described relate to mobile device identification and authentication for access to and presentation of targeted content.
2. Description of the Related Art
Methods and systems exist for targeting content, including advertising content, directed to users of network-connected devices, such as televisions, mobile handsets, computers, radios, advertising screens and the like. Such content-targeting methods face various challenges, depending on the users and devices to which content is targeted. For example, television and radio advertisements are often directed to a mass audience, with little information about specific users. Internet advertisements may be based on cookies or similar mechanisms that indicate that a user is returning to a particular site, but targeting based on cookies and similar information are subject to limitations, among them being that multiple users may access the Internet through the same device. Mobile content may be targeted more easily to a specific user, such as based on information about the user in a database maintained by a wireless carrier or based on the user's interaction with content on the mobile handset, but the more limited range of content that can be delivered to mobile devices means that profiles based on that usage are often limited and sometimes misleading. Accordingly, a need exists for better methods of targeting content to users of all types of network-connected devices.
SUMMARYMethods and systems are disclosed herein for delivering content, including advertising content, to various network-connected devices. In various embodiments disclosed herein, methods and systems take advantage of capabilities and information available in various networking domains to deliver more targeted content to each of those domains, including using the collective capabilities and information derived from multiple domains to deliver content to each domain.
One embodiment of the methods and systems disclosed herein relates to television content and advertising. In certain such embodiments a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target television content, including advertisements, to the user. The network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices. In embodiments, a device-specific identifier (DSI) of a mobile device owned by a user, such as a MAC address of the user's mobile phone, may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device. Once the DSI is associated with one or more user names, activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities. Additionally, when a user interacts with network content using various network-connected devices and does not enter a username, activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded. As such activity may be derived from more than one user of the same device, patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device. Furthermore, when a user interacts with network content using a given network-connected device and does not enter a username, but during the same session of activity, on the same given network-connected device, as determined by proximity of access times, interacts with a second set of network content with a supplement of a username, activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity. Thus, a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains. Once a usage profile is generated, targeting techniques, such as hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the television of the user. In embodiments, use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management. In particular, a short-distance wireless communication between a mobile handset and another network-enabled device, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to the other network-enabled device. Thus, a user's proximity to a television screen can be determined by using a short-distance wireless protocol to access the MAC address of the handset. Once proximity is determined or verified, it can be used for various purposes, including tracking what the user (or other nearby users) view on the television screen, such as for ratings purposes, managing (including with digital rights management techniques) the content the user is allowed to view on the screen (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the screen), and targeting the content directed to the user on the screen, including advertising, for which a user-specific profile which includes the activities performed on a multitude of network-connected devices may be referenced. Thus, the methods and systems disclosed herein allow for user-specific control of content delivered to the screen the user is watching, based on proximity of the user's mobile handset to the screen.
Another embodiment of the methods and systems disclosed herein relates to radio advertising. In certain such embodiments a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target audio content, including advertisements, to the user. As in other embodiments, the network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices. In embodiments, a device-specific identifier (DSI) of a mobile device owned by a user, such as a MAC address of the user's mobile phone, may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device. Once the DSI is associated with one or more user names, activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities. Additionally, when a user interacts with network content using various network-connected devices and does not enter a username, activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded. As such activity may be derived from more than one user of the same device, patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device. Furthermore, when a user interacts with network content using a given network-connected device and does not enter a username, but during the same session of activity, on the same given network-connected device, as determined by proximity of access times, interacts with a second set of network content with a supplement of a username, activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity. Thus, a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains. Once a usage profile is generated, targeting techniques, such as hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the audio-enabled devices, such as Internet radios, of the user. In embodiments, use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management. In particular, a short-distance wireless communication between a mobile handset and another network-enabled device, such as an Internet-radio, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to the other network-enabled device. Thus, a user's proximity to an Internet radio can be determined by using a short-distance wireless protocol to access the MAC address of the handset. Once proximity is determined or verified, it can be used for various purposes, including tracking what the user (or other nearby users) listen to on the audio-enabled device, such as for ratings purposes, managing (including with digital rights management techniques) the content the user is allowed to listen to on the audio-enabled device (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the audio-enabled device), and targeting the content directed to the user on the audio-enabled device, including advertising. Thus, the methods and systems disclosed herein allow for user-specific control of content delivered to the audio-enabled device to which the user is listening, based on proximity of the user's mobile handset to the audio-enabled device.
Another embodiment of the methods and systems disclosed herein relates to point-of-presence content delivery, such as live event content delivery and point-of-sale advertising. In certain such embodiments a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target point-of-presence content, including advertisements, to the user. As in other embodiments, the network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices. In embodiments, a device-specific identifier (DSI) of a mobile device owned by a user, such as a MAC address of the user's mobile phone, may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device. Once the DSI is associated with one or more user names, activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities. Additionally, when a user interacts with network content using various network-connected devices and does not enter a username, activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded. As such activity may be derived from more than one user of the same device, patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device. Furthermore, when a user interacts with network content using a given network-connected device and does not enter a username, however during the same session of activity, on the same given network-connected device, as determined by proximity of access times, interacts with a second set of network content with a supplement of a username, activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity. Thus, a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains. Once a usage profile is generated, targeting techniques, such as hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to a point-of-presence device, such as a screen or audio-enabled device, that is in proximity to the user. In embodiments, use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management. In particular, a short-distance wireless communication between a mobile handset and another network-enabled device, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to the other network-enabled device, in this case a point-of-presence device such as a screen at a live event, a point-of-sale screen, or a point-of-presence audio-enabled device. Thus, a user's proximity to such a point-of-presence device can be determined by using a short-distance wireless protocol to access the MAC address of the handset. Once proximity is determined or verified, it can be used for various purposes, including tracking what the user (or other nearby users) view on a screen or hear on an audio-enabled device, such as for ratings purposes, tracking the effectiveness of advertising, managing (including with digital rights management techniques) the content the user is allowed to view on the screen (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the screen), and targeting the content directed to the user on the screen, including advertising. Thus, the methods and systems disclosed herein allow for user-specific control of content delivered to the screen or audio-enabled device the user is watching, based on proximity of the user's mobile handset to the screen or audio-enabled device.
One embodiment of the methods and systems disclosed herein relates to Internet content. In certain such embodiments a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target Internet content, including advertisements, to the user. The network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices. In embodiments, a device-specific identifier (DSI) of a mobile device owned by a user, such as a MAC address of the user's mobile phone, may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device. Once the DSI is associated with one or more user names, activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities. Additionally, when a user interacts with network content using various network-connected devices and does not enter a username, activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded. As such activity may be derived from more than one user of the same device, patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device. Furthermore, when a user interacts with network content using a given network-connected device and does not enter a username, however during the same session of activity, on the same given network-connected device, as determined by proximity of access times, interacts with a second set of network content with a supplement of a username, activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity. Thus, a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains. Once a usage profile is generated, targeting techniques, such as hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the Internet-connected device of the user. In embodiments, use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management. In particular, a short-distance wireless communication between a mobile handset and another network-enabled device, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to the other network-enabled device. Thus, a user's proximity to an Internet-connected device can be determined by using a short-distance wireless protocol to access the MAC address or other DSI of the handset. Once proximity is determined or verified, it can be used for various purposes, including tracking what the user (or other nearby users) view on the Internet-connected device, such as for ratings purposes, managing (including with digital rights management techniques) the content the user is allowed to view or listen on the device (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the device), and targeting the content directed to the user on the device, including advertising. Thus, the methods and systems disclosed herein allow for user-specific control of content delivered to the screen the user is watching or the audio-device to which the user is listening, based on proximity of the user's mobile handset to the Internet-connected device.
One embodiment of the methods and systems disclosed herein relates to mobile advertising. In certain such embodiments a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target television content, including advertisements, to the user. The network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices. In embodiments, a device-specific identifier (DSI) of a mobile device owned by a user, such as a MAC address of the user's mobile phone, may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device. Once the DSI is associated with one or more user names, activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities. Additionally, when a user interacts with network content using various network-connected devices and does not enter a username, activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded. As such activity may be derived from more than one user of the same device, patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device. Furthermore, when a user interacts with network content using a given network-connected device and does not enter a username, however during the same session of activity, on the same given network-connected device, as determined by proximity of access times, interacts with a second set of network content with a supplement of a username, activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity. Thus, a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains. Once a usage profile is generated, targeting techniques, such as hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the mobile device of the user. In embodiments, use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management. In particular, a short-distance wireless communication between a mobile handset and another network-enabled device, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to another mobile device. Thus, a user's proximity to a mobile device can be determined by using a short-distance wireless protocol to access the MAC address or other DSI of the handset. Once proximity is determined or verified, it can be used for various purposes, including managing (including with digital rights management techniques) the content another user is allowed to access on another mobile device (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the other user's device), and targeting the content directed to the user on the other device, including advertising.
One advantage of the methods and systems herein is they enable a drastic improvement in the television advertising industry. There are certain technology and business drivers for a higher penetration of more advanced set-top boxes that may be associated with improvements in television advertising.
DVDs may become a technological non-necessity in a few years. Users will consume video via a direct feed/download. This video data will need to go through a data box in the home that routes not only video, but other data streams such as voice and Internet data inside the home. As a result, viewers that will not subscribe to premium television channels will likely have an advanced set-top box for the consumption of non-premium television channels and for watching movies.
Fixed-Mobile-Convergence (FMC) indicates that landlines may soon become a technological non-necessity. A device that switches a cell phone's connection from a cell-tower to the broadband connection inside the home (in the form of cable, satellite, Fixed WiMax, or other broadband connection) may become necessary. It is very reasonable to assume, especially with the triple and quadruple play packages being presented to consumers, that the features of such a device will eventually be embedded into the same unit that controls video downloads including television and movies.
Using the mobile device is potentially the only way to attain a real-time, live assessment of who is watching the television and tailor the advertisements delivered to the unique combinations of viewers. A father and son watching television content together represent two very unique advertising markets. To best take advantage of this blend of viewers simultaneously viewing television, for the purposes of accurate and proportional advertising, a device that is overwhelmingly individual specific such as the mobile handset may provide tremendous value.
Additionally, activity performed on a mobile handset as a portion of overall activity performed on a network-connected device, is increasing rapidly and will continue to do so in the foreseeable future.
For Internet publishers of websites, blogs, or for Internet retailers, the server-side software which facilitates the creation of user-specific profiles rooted in the mobile DSI but which also take into consideration all network-connected devices, is a technology that may but will not necessarily, provide the same value as a free advertising network for Internet websites, blog publishers, or Internet retailers allowing them access to the best available user-specific Internet usage metrics so they can serve the best possible ads on available ad inventory or in the case of an Internet retailer, promote the best products suited for visitors to the given Internet retailer's website. Based on the content, fees may be collected by a provider of a mobile DSI identification/authentication service, such as for video, unlimited viewing, extending the content on a given Internet platform to another platform such as television content, portable/flexible electronic screens used to make digital text portable, radio, and the like.
As a result of mobile carriers dealing with voice revenue decaying rapidly and as even the margins on data consumption are becoming hyper-competitive, mobile carriers are rapidly seeking ways to monetize their high penetration numbers through advertising. From business processes which rely upon the methods and systems disclosed herein, mobile carriers may receive a portion of advertising revenue from various sources of advertising, including television which accounts for 34% of all advertising dollars in the US or $72 billion in 2006. As video on the internet becomes more prevalent, advertising related revenue will only grow and through technological advances, television and internet advertising and content delivery will benefit.
Digital Rights Management synergies with content producers are enabled by the methods and systems herein. Content production companies such as News Corporation can enjoy digital rights management services to protect their premium content while using the methods and systems herein to aid in the serving of highly-precise, targeted ads, such as by using DSI based identification/authentication profiles.
Placing an emphasis on a mobile handset's device-specific identification (DSI) as a base for a user-specific profile generated from activity performed on various network-connected devices may be based on an understanding that it is essentially carried on a given user's person and thus is very individual-specific. Additionally, since it is carried on a given user's person, it follows the user in many places where other devices such as a PC/laptop might not, thus allowing user-specific profiles created with specific dependencies and ties to the mobile handset, to be portable by virtue of the inherent portability of mobile handset. Additionally, when attempting to aggregate all the Internet usage habits of a user across various devices, beginning with the mobile DSI may facilitate the aggregation by enabling the use of clues or information associated with the mobile handset DSI and the associated user to determine what other information, found as a result of Internet usage on other network-connected devices associated with the same user, to aggregate with it. Starting with a fixed position, or multi-user device, such as a PC, a television, or other stationary Internet-enabled device presents user identification challenges that the mobile handset does not. These challenges are mainly rooted on the basis that such devices may, and often, have multiple regular users. Therefore the mobile handset may serve as a primary identification device for a scenario in which the methods and systems herein (e.g. identification or authentication) could be applied for advertising, content/software as a service-authentication, and the like. The mobile handset is widely regarded as becoming the most frequently used computing interface, making it ideal for user authentication purposes. However, the methods and systems described herein do not all require a mobile component, and therefore, for the purposes of the unique methods and systems described herein, they can be associated with mechanisms that do include a mobile component.
These and other systems, methods, objects, features, and advantages of the present invention will be apparent to those skilled in the art from the following detailed description of the preferred embodiment and the drawings. All documents mentioned herein are hereby incorporated in their entirety by reference.
The invention and the following detailed description of certain embodiments thereof may be understood by reference to the following figures:
Referring to
In the embodiment of
To deliver targeted advertising 218 to a user of the mobile handset 202 who may be viewing the television 208, the set-top box 204 may extract the mobile handset DSI 212 by employing a short-distance wireless technology (WiFi, Bluetooth, WUSB, UWB, and the like) to locate mobile handsets within viewing proximity of the television 208. The mobile handset DSI 212 (also known as mobile DSI or just DSI) may then be uploaded from the set-top box 204 over the internet to the host 210 for matching to a user-specific authentication/identification profile (a user profile) that corresponds to the uploaded DSI 212. The servers 210 may be servers associated with the DSI platform 100, or may be associated with partners or affiliates of the platform 100. The server 210 may mine data across an uploaded user authentication/identification profile that corresponds to the extracted mobile DSI 212 and use the information for precision advertisement targeting. By using location based technology such as GPS/cellular/radio wave triangulation, a more precise location for the user may be determined so that advertising for a user viewing the television may be presented on the television 208. The location based technology information may be retrieved from the mobile handset 202, such as by querying the mobile handset 202 or the location information may be included in the initial extraction of the DSI 212 by the set-top box 204. The host server(s) 210 may then find the most appropriate advertisement 218 and distribute the advertisement back to the set-top box 204 for display on the television 208. In an example, advertisements 218 may come in the form of dynamic, embedded content advertisements 218. Interactivity during the period of display of the advertisement can be monitored and recorded by the servers 210 for the purposes of adding more data to the corresponding user authentication/identification profile.
An alternative embodiment for delivering targeted advertising 218 to a television that may be viewed by a user of a mobile handset is depicted in
In addition to, or in place of sending the DSI 212 to the server 210, the set-top box 204 may extract information, in its entirety or derived from the mobile handset's Internet browser cache and forward it to the servers 210. The extracted internet recent historical information 302, such as represented by a internet browser cache, may be combined with a user profile or usage profile corresponding to the DSI 212 to determine relevant analysis about the historical information 302. Alternatively, the recent historical information 302 may be analyzed alone. The information may be analyzed for demographic, interests, trends, and the like that may facilitate the servers 210 determining an appropriate offer or advertisement 218 to present on the television 208 that the user of the mobile handset 202 may be viewing.
In an embodiment, presence of a mobile phone may be used to identify the users who are present/within viewable proximity in front of a television or other electronic display by virtue of the distance of their mobile handsets from the television or other electronic display. Communication with a mobile phone or mobile handset 202 may include using short-distance wireless technologies, such as WiFi, Bluetooth, WUSB, and UWB to identify nearby mobile handsets 202. Precise user location may further be determined via device-specific GPS/cellular/radio wave triangulation alignment. Such detection may be used to derive real-time and accurate content audience ratings.
The methods and systems herein may facilitate real-time television or other electronic display audience rating/headcount via use of mobile DSI and/or mobile handset internet browser cache. Once it has been established that individuals, by virtue of the presence of their mobile handsets, are viewers in front of a given television or other electronic display, the methods and systems herein may include using the mobile DSIs of the given mobile handsets (and profiles of usage associated therewith, including usage of non-mobile devices) for the purposes of retrieving a real-time, audience ratings/headcount, which pertains to various demographic categories/metrics. This may involve the use of Internet usage profiles associated with the mobile DSI but also may take into consideration usage activity from non-mobile devices. Usage profiles provide a way of tracking of Internet activity which can result in strong assumptions of real-time, viewer-specific demographic data.
Alternatively real-time viewer attendance may be determined through the extraction of each proximate mobile handset's Internet browser cache, in place of extraction of the mobile DSI, which can also effectively report real-time viewer demographical data as determined by the Internet usage patterns which can be recognized by analyzing the mobile handset's Internet browser cache contents.
Referring to
Alternative to using the mobile device DSI and cross referencing it to a database of user identities, demographics and audience classification may be determined by analyzing an internet browser cache 302 associated with the proximate mobile handsets. Information such as historical browsing data, queries, locations, communication such as texting, email, and the like may be analyzed by the servers 210 to determine real-time viewing audience aspects.
Through this method, a mobile handset may effectively allow for the creation of real-time audience ratings which include various demographics determined by identifying the participants in a viewing audience as well as relative Internet usage metrics. The derived or measured real-time viewing information may be provided in a report to broadcasters, advertisers, and the like to become part of a broadcast or programming business process.
User-specific authentication/identification profiles may be based on mobile device or personal device device-specific identifications (DSIs), such as for the purposes of user-specific multi-device internet usage tracking and profiling. User-specific authentication/identification profiles may include a user identity, usage tracking, and the like. Establishing user-specific profiles may involve tracking of activities associated with user names that are linked or tied to the mobile DSI; and linking those usernames to other (non-mobile) DSIs to aggregate user-specific activities regardless of which device(s) the activities take place. One useful purpose for this aggregation of mobile and non-mobile activity tracking is targeted advertising.
Defining, extracting, and using mobile device specific identifiers (DSIs) may make use of server-side and/or client-side software. Server-side software may reside on the servers 210 or may reside elsewhere and be executed on the servers 210. Client-side software may be downloaded onto or otherwise configured into mobile and/or stationary devices used by end users. The client-side and server-side software may be used when a mobile device user visits a website in order to gain access to content residing on servers that require authentication and/or user identification. One or more of the client-side and the server-side software may include creating and updating logs associated with a mobile device DSI once a known visitor has gained access to servers providing access to the requested authentication protected content. DSI based logs may differ from cookies or other Internet usage logging technologies in that DSI logs may have the ability to completely mask the real world identities of users as their user-specific authentication/identification profiles can be created with a process that results in the complete morphing or excluding of anything that renders the user identifiable in the real world. Additionally, the DSI specific logs are initiated, conducted, and managed on the server side rather than on the device as is common for cookies. Also, client-side software may provide capabilities that pertain to uploading device-specific information and existing information already contained in the mobile device prior to engagement with the server 210 or with the website a given user is attempting to access. This results in an important difference from information/behavioral software existing today such as cookies that log behavioral activity on the client device.
For pedagogical purposes,
Referring to
Referring to
Referring to
Referring further to
In addition to checking usernames in usage logs against other usage logs, DSIs in usage logs may also be checked in a similar way. A usage log that contains a DSI but does not contain a username may be aggregated with a user profile by associating the DSI in the usage log with the information in the data store 1402 to determine an appropriate user profile for aggregating the usage log data.
Even when there is no direct correlation among usernames and DSIs, such as when a DSI does not have any username associated with it, a user profile may be created for the DSI so that all usage associated with that DSI may be aggregated under the DSI specific user profile. In this way, user authentication/identification profiles may be established and used even without a username or other personal identifying information associated with the profile.
Because users often perform a variety of activities during an on-line session or connection, time analysis of logs may facilitate determining user names for DSI log entries for which a user name is not required by the server generating the DSI log. If activity associated with a DSI is logged by a website that requires a username login, and another site that doesn't require a username logs activity from the same DSI at nearly the same time, such as shortly before or after the website requiring login, it can be determined that for those particular sessions of activity, the visitor is likely to be the same.
When a plurality usage profiles with different DSIs and without usernames, are collected by the host server 210, the host server may analyze the usage related data to determine associations that may allow the formation of a user profile associated with the different DSIs.
In
The methods and systems may enable ensuring privacy of select user-specific profile/profile activity data via server-to-server data morphing and data exclusion. The methods and systems herein may include the ability to morph or exclude specific parts of the user-specific authentication/identification profile or specific activity associated with a given profile for the purpose of making certain the real world identity associated with the given user-specific identification profile remains private. The result is a highly individualized profiling system that successfully leaves private, the real world identity of those being profiled.
By supporting real world identification to provide digital rights management for authentication protected content and then using morphed information related to the usage by the DSI accessing the protected content, such as for targeted advertising, both the protected individual and the public advertiser may benefit without creating a conflict between the private user and the targeted advertising provider.
Referring to
Using short-distance wireless communication to pass a mobile device-specific identification, such as a DSI, to another nearby device, such as another mobile device or an internet connected device, may allow the mobile device-specific identification to be used to secure content that is presented (e.g. displayed, stored, played, and the like) on the other device. Examples wherein the mobile DSI may be used to secure content presented on another device include authentication for digital rights management and content sharing. An example of content sharing may include playing music, movies, shows, and the like authenticated by a mobile device DSI, such as a mobile phone, while the phone is in proximity to the sharing device—but only while the phone is in proximity. When the phone is no longer in proximity, the content sharing device may be denied access to present the authenticated content. Digital rights/authentication could be associated with the authentication/identification profile corresponding to the mobile phone DSI. This authentication/identification profile may also be used for targeted advertising. However digital rights management data that is transferred to third parties may include an interface that is more transparent of the specific individual, such as by keeping other data (e.g. surfing habits) out of view or filtered from the third party.
In an embodiment of the digital rights authentication process herein described, content authentication may include tagging a representation of the authenticated mobile DSI onto the protected content/service prior to distributing the protected content/service to a device which is providing the sharing or presentation capability. In this way, client-side software associated with the sharing or presenting device may ensure that the authenticated DSI mobile device remains in proximity to the sharing device. When such proximity is no longer detected, the tagged content may be invalidated, deleted, or otherwise blocked from access by the sharing/presenting device.
In reference to
In embodiments, once on the mobile handset, protected content may be streamed to another device via short distance wireless communication (e.g., WiFi, Bluetooth, WUSB, or UWB) during which time playback software on the receiving device may temporarily play content as it is transmitted from the mobile handset to the receiving device. The receiving device may then, such as using client-side software installed on the receiving device, upload a tag for the protected content (such as a tag that is or is associated with the DSI of the sending handset) for authentication on a host server. In embodiments both a DSI of the receiving handset and a DSI of the sending handset may be used to manage rights of the users to play the content.
Depending on terms that may be set between the authentication entity (such as the DSI platform 100) and the rightful distributor of the protection enabled content, only information that is necessary for authentication may be submitted to the authentication entity. Limiting the information sent to the authentication entity may restrict what the authentication entity knows about the user's digital rights. In an example, authentication deal terms are solely on a transaction percentage/fixed fee basis. Therefore, information transferred to an authentication entity may only include financial transaction information related to the authentication entities fee structure. As such, each time a transaction takes place in which the authentication entity is entitled to a fee, the authentication entity would be notified only of that specific information which allows the authentication entity to determine and verify the revenue owed to the authentication entity. In another example, the authentication entity has a financial institution as a partner website. The authentication company and the financial institution will work out a deal such that for each user that the financial institution wishes to authenticate to access their account information, the authentication company will charge 10 cents annually. In this example, the authentication company would receive data pertaining to each time a user account is created and each time one is deleted. No other information would flow from the financial institution to the authentication entity. In another example, the authentication entity has a completely non-financial deal with an online site that provides content to registered users (e.g. a social networking site, an online version of a newspaper that charges for subscription, a pure-online newspaper, a content provider to registered users, and the like). In this example, the authentication entity may receive user information, such as the user's real name and identity or a user identity determined from a mobile DSI associated with the authentication request. The information might include entertainment interests, demographic information, and the like. The selected user information can be used in a multitude of ways and can be a set of market data, the value of which could be further enhanced through operational combinations using processes described herein.
Mobile DSI-enabled personal online account digital rights management may be associated with the methods and systems herein described. Users may be allowed, on their own discretion, to limit access to an online facility, such as certain personal online accounts (e.g. email, social network, bank, brokerage, etc.) so that those accounts may only be accessed if a mobile handset, which users assign at their own discretion, is nearby the device through which access is attempted to one of the personal accounts. Users may identify specific DSIs or specific users that may be associated with a mobile handset DSI. The specified users or DSIs may be maintained by an authentication entity so that requests to access to a DSI protected account may be authenticated based on proximity of one or more user specified mobile handsets to the device through which the request to access the online facility is made. An authentication response may be provided from authentication functionality embodied in the authentication entity, or in an entity associated with the DSI protected account. Based on the response, access to the online facility may be allowed or denied. In addition, the user may specify DSIs that must not be in proximity to the requesting device to enable authenticated access to the account.
The methods and systems herein may allow users, on their own discretion, to limit access to certain personal content (e.g. documents, pictures, video, and the like) accessible through an online facility so that the protected personal content, wherever it resides (e.g. an online social network, online photo album, online video server) may only be accessed by a user as assigned by the personal content publisher/owner. In an example, Mary allows her mom and her brother to view online photo album X while allowing her brother to access online photo album X and online video Y. When Mary's mother and brother seek access to online photo album X, they are granted access when one or more of the mobile DSIs associated with Mary's mother or brother are in proximity to the device requesting access. However, only when Mary's brother's mobile device DSI is within proximity to the requesting device, will access to video Y be granted. Access is granted using similar DSI authentication methods described herein that may include an authentication server, an authentication, tagging of protected content, and the like. Authentication may include matching the DSIs of devices in proximity to a list of authorized users by determining a user associated with each DSI to be matched. The matching may be performed by an authentication entity. Alternatively, the server-side software may receive a list of authorized DSIs (such as from an authentication entity) and may perform the matching. Personal authentication services may be offered to individuals for a fee, may be provided as part of a DSI based digital rights management protection package, or may be provided free of charge to individuals. Alternatively, content providers or servers may pay a fee to use DSI-based authentication services.
DSI-based user identification and profiling may allow layered viewer-specific advertising. Layered user-specific television, radio, and/or internet advertising support another layer of advertising within an existing advertising space. This may be embodied as multiple configurable or selectable images essentially in a stack that is selectable by the user or by display device software based DSIs of devices that are in proximity to the display device. Layered user-specific advertising may include the ability to split up each advertisement frame among multiple ads or among various categories of ads so that a reconstituted advertisement based on the user-specific identification/authentication profiles of the viewers who are in front of the display device (or audio device) can be presented to the user(s). Layering may enable various portions of an advertisement to be customized and targeted to the viewers local to a presentation device.
Layered user-specific advertisements may also include a concept of a blanket advertisement that is targeted using general demographics based on the user profiles determined from the DSIs in viewing proximity. The blanket advertisement may be replaceable by the presentation device by an advertisement that is targeted to specific viewers. In an example, two families viewing the same television program through two different set-top boxes may see different advertisements. One family may have viewers with no mobile devices in proximity to the set-top box (or with devices providing DSIs that have no determinable association to targeted advertising) so that family may view the blanket advertisement. The other family may include viewers who are carrying mobile devices that present DSIs that can be determined to satisfy a requirement for a targeted advertisement. This family may not be presented the blanket commercial. Instead the set-top box (or server connected to the set-top box) may present a targeted advertisement in place of the blanket advertisement. While this concept supports layering of entire advertisements, it also extends to layering portions of an advertisement.
An advertisement may be composed of layers, frames, regions, elements, primitives, and the like that may be customizable through a targeting process. One or more of these layered portions of an advertisement may be customized with targeted content based on the determined viewers of the advertisement. In an example a sporting goods store advertisement may allow targeting various individuals by allowing products included in the advertisement to be user specific. While a base of the advertisement may be common to all presentations of the advertisement, a viewer with a usage profile that indicates the user has an interest in golf may be presented with golf product promotions, whereas a viewer determined to have an interest or have expressed an interest in basketball may be presented with basketball related product promotions within the advertisement, such as during the same advertisement on the same internet-enabled device such as a television connected to an internet-enabled set-top box.
When more than one viewer with differing targeting criteria is viewing output from the same set-top box (or internet connected device), the layering may allow more complex targeting. In an example, an advertisement for a sports drink may include images of a person active in a sport who needs a sport drink to be refreshed. The sport images may be targeted to one of the viewers, and the sport drink may be targeted to another of the viewers, thereby presenting an advertisement with relevance to both viewers.
In
The mobile device providing the DSI may be used as an interactive controller, such as a remote control or user input device to interact with the user-specific targeted advertisements. Data inputted by the viewers may be anticipated using predictive algorithms that may take into consideration the user-specific authentication/identification profile that may be retrieved once the mobile DSI is extracted. The range of interactivity may be based on aspects of the user-specific authentication/identification profile corresponding to the extracted mobile D SI. Advertising interactivity may allow a viewer to respond to a television, electronic multimedia display, radio advertisement, and the like via inputting information into the mobile handset which is then wirelessly transmitted to the device controlling the presentation of the advertisement. Another way of connecting the user inputted responses to the interactive advertisement is by interfacing the mobile handset to the device controlling the interactive advertisement through a network such as a cellular network and the Internet. Example use of a mobile handset interacting with an interactive targeted advertisement may include book marking advertisements, referring advertisements to friends, responding to interactive games, polls, chat services, and the like. However, when viewers watch this content, the storefront of the restaurant may change to reflect an actual local restaurant nearby the physical location of the viewers. This may further allow for interactivity which allows the viewer(s) to reference this actual local restaurant's current menus to proceed towards a transaction for a delivery of food, a reservation for a meal, etc
User actions may be predicted based on a combination of the presented targeted content, such as an advertisement and aspects of the user-specific authentication/identification profile. In an example, usage data associated with a viewer may indicate that the viewer may be likely to forward relevant content to one or more members of his social network. Based on this usage data and based on the content of the targeted advertisement, a list of likely recipients of the content may be prepared so that the viewer may easily interact through the mobile handset to forward the content to the likely recipients. The list of likely recipients may be based on usage data—such as based on frequency of including one or more recipients in prior forwarded advertisements. The list may be based on an association of aspects of the targeted content to user-specific profiles of users in the viewer's online social network. Many other associations are possible in determining what type of interaction may be predicted for the viewer of targeted advertising.
The presentation devices depicted in
In
In the timeline depicted in
Referring to
Automatic exchange of contact information in the physical person, as described above and in
Enabling Sarah to view only the portions of John's social networking information viewable to his coworkers takes only two steps. A first step may include one of John requesting Sarah for her contact information, John accepting Sarah's request to receiver her contact information, or John and Sarah both accepting a mutual swap of contact information. A second step involves John categorizing Sarah under a pre-made group of coworkers thereby assigning her accessibility rights to his social networking profile.
Referring to
Alerting a user to the presence of a mobile handset user meeting one or more classifications, categorizations, or interest pools may be determined through a DSI based authentication process. In an embodiment, at a step 2802 software executing on a recipient mobile handset that receives a DSI from another mobile handset seeking to be alerted may run a check to see if the user of the seeking mobile handset is of any interest to the recipient. If so, the recipient may acknowledge the DSI by exchanging information such as messages, pictures, current GPS/cellular/radio wave triangulated location, and the like.
Referring to
Referring to
Physical person social networking may be facilitated by software executing on a mobile handset that transmits a limited social networking profile associated with the user of the mobile handset so that it can be received by surrounding mobile handsets. Software running on the surrounding mobile handsets may perform checks against categories, and the like as described above to determine if contact information exchange may be beneficial. If so, requests for contact exchange may be performed between proximate DSI-based mobile handsets as described in reference to
Referring to
Referring to
The methods and systems described in this document and the referenced documents include many possible alternate combinations for the described methods and systems, such as wireless protocols and/or device-specific identifications. In an example, utilizing a device's MAC address, which is a standard unique identification assigned to every WiFi/WiMax adapter and Ethernet card (fixed—for facilitating a wired broadband internet connection) as a basis for a device-specific identification (DSI) or mobile end user identification (MEUI) in a wireless protocol is one alternative combination. In this example, another alternative may include the wireless protocol being based on Bluetooth, WUSB, UWB, and the like, instead of being based on WiFi/WiMax/Ethernet connection.
In the various embodiments of the methods and systems disclosed herein, various technologies may be employed. In certain preferred embodiments, the methods and systems disclosed herein identify and/or authenticate use of Internet-connected devices (mobile handsets—including cellular phones), PCs/laptops, television set-top boxes, televisions, and the like) using, primarily but not limited to, a variety of device-specific identification (DSI) types and techniques associated with various wireless protocols. This objective may be associated with WiFi and WiMax (both of which may utilize MAC addresses), WUSB (Wireless USB), UWB (Ultra-wide Band), Bluetooth (e.g. Bluetooth 3.0), and other forms of device-specific identifications. Other forms of DSI may not be derived from an identification associated with a wireless protocol.
The methods and systems herein may facilitate building privacy-sensitive and device-specific user identification and/or authentication profiles. The methods and systems may allow aggregation of various DSIs that belong to a number of different devices that may include any combination of devices (i.e. 1 mobile handset, 1 PC, 1 set-top box and 2 laptops OR 2 mobile handsets, 3 PCs, 1 laptops, etc.) and may tie it to specific users WITHOUT necessarily revealing a given user's “real world” identity (e.g. to non-affiliated third parties). A mobile handset's DSI is an example of a source of DSI used in the creation of identification/authentication profiles. The mobile handset's DSI may be the primary or base DSI associated with the identification/authentication profile. Other device DSIs may become associated with a profile based on usage from those devices being associated with the usernames/surfing habits associated with the mobile handset's DSI.
The methods and systems herein provide mechanisms that may transparently monitor the flow of device-specific or profile-specific information, such as a user-profile, while enabling a user's “real world” identity to be scrambled or encrypted (herein referred to as morphed) such that providers or facilitators who have access to the communications within the process would be not be capable of deriving the user's real world identity. Such morphing of real world identities may occur by creating unique algorithms that scramble a DSI or username-specific profile as the information associated with that profile is transferred from a partner's server (a partner may include but is not limited to internet search and content companies such as Google, MySpace, internet email sites such gmail.com or mail.yahoo.com, retail websites such as Amazon.com, and the like.)
User-specific identification and/or authentication profiles may be utilized for, but not limited to targeted advertising. Targeted advertising may include delivering targeted advertising across various media forms including but not limited to internet websites, television, internet television, outdoor advertising, mobile handset advertising, portable LCD-advertising, Internet radio, and the like. Mechanisms for delivering targeted advertisements across each media form may vary but may benefit from the core concepts of the methods and systems herein.
The methods and systems herein may facilitate creating content authentication and management systems or digital rights management systems using a mobile DSI, such as authenticating and managing access rights to and management of content (e.g. free content or content provided for a fee) and Internet software-as-a-service information content such as Lexis Nexus, Gartner, IDC, digital textbooks, and other digital media/digital information providers that grant conditional access (for payment, or otherwise).
In regards to digital rights management/content authentication, due to a mobile device's individual specific nature and its portability, a mobile DSI may provide a higher level of accuracy and flexibility than using a system in which access to content is tied to a particular PC/laptop, set-top box, and the like. The latter is a system that is commonly used in many current digital rights management schemes. Through the methods and systems herein described, a user may essentially carry all of his online digital rights with him as it is rooted in a DSI from his mobile handset. Although content may be exchanged with the user's mobile handset through other devices, (e.g. a set top box, PC/laptop, television, kiosk, external advertising device, and the like), the mobile handset DSI provides the means for authentication—independent of any other device in the content transfer chain. This is beneficial in that the other device(s) in the content transfer chain may have multiple users, may not be secure, may not support digital rights management and most importantly may be stationary in its location and thus not allowing the authenticated user to carry his digital rights with him. Make the comparison to a DVID? You bought it, you can take it with you. Not being able to do that for digital content is a step backwards, not forward. In such a system, if a user attempts to access a Mobile DSI-protected online account through a PC/laptop, or other internet-connected device, short distance communication would take place between the user's mobile handset and the internet-connected device at which point the user's mobile DSI would be passed to internet servers for authentication. The server at which the protected account exists may then attempt to match an entered username/password combination against a pre-registered mobile DSI. The username/password may be collected at the time a user's account is registered or at the time of an update/replacement of a mobile DSI for the user's account). If the username/password combination matches up with the mobile DSI, then the user will be granted access to the mobile DSI-protected account. If the mobile DSI does not match the username/password of the account, the user will not be granted access. Standard mechanisms for lost passwords or for resetting a password may also be applied, such as the use of pre-registered secret password questions.
Mobile handsets provide a variety of device-specific identification types on which a DSI may be based. A mobile handset that is WiFi or WiMax enabled will have a MAC address, this MAC address may serve as a DSI. A mobile handset that is Bluetooth-enabled will have a Bluetooth Device Address. This Bluetooth Device Address may serve as a DSI. A unique identification, potentially a serial code that identifies a mobile handset's central processing unit (CPU) may serve as a DSI. A unique identification, potentially a serial code, that identifies a mobile handset's WUSB (wireless USB) or UWB (Ultra Wide-band) chipset may serve as a DSI. A mobile telephone number that is used to dial a voice connection or send a TXT message to a mobile handset may serve as a DSI. GSM phones use the International Mobile Equipment Identity or IMEI that may serve as a DSI. CDMA phones use Mobile Equipment Identifiers or MEIDs that may serve as a DSI. Other similar device-specific identifications that are unique to a single physical mobile handset may serve as a mobile DSI.
When connected wired or wirelessly, PC/laptops may contribute device-specific information that may be used as a basis for a DSI. A PC/laptop that has a fixed wired connection via an Ethernet card will have a MAC address, this MAC address may serve as a DSI. A PC/laptop that is WiFi or WiMax enabled will have a MAC address, this MAC address may serve as a DSI. A PC/laptop that is Bluetooth-enabled will have a Bluetooth Device Address. This Bluetooth Device Address may serve as a DSI. A unique identification, potentially a serial code, which identifies a PC/laptop's central processing unit (CPU), may serve as a DSI. A unique identification, potentially a serial code, which identifies a PC/laptop's WUSB (wireless USB) or UWB (Ultra Wide-band) connection, may serve as a DSI.
Other consumer electronic devices that can be connected to an electronic network such as the Internet may also have DSI. If the consumer electronic device is capable of accessing an electronic network such as the Internet, it may do so using a wired Ethernet connection using a Ethernet card, or a wireless connection using a WiFi/WiMax connection, in both such scenarios, the device should have a MAC address that will be used as its DSI>. Examples of such consumer electronic devices capable of being connected to an electronic network include Television set-top boxes, Televisions, LCDs fixated outdoors, within retail stores, taxi cabs, other public transportation, Radio devices that are Internet-enabled, car radio devices that are Internet-enabled, and the like. These other consumer electronic devices may use many of the same or similar DSIs as mentioned above for mobile handsets or PCs/laptops including the MAC address as a DSI if its available.
The role of MAC addresses in Internet protocol v4 and v6 may require unique treatment. In Internet Protocol version 4, or IPv4, the IP Address of a given device is 32 bits long and is assigned without embedding the device's unique, permanent, MAC-address. However, In IPv6, the MAC-address of a device is intended to be embedded into a device's IP Address.
Public sources of information regarding the difference of the IPv6 address and its relevance to MAC-addresses describe IPv6 addresses as typically composed of two logical parts: a 64-bit sub-network prefix, and a 64-bit host part, which is either automatically generated from the interface's MAC address or assigned sequentially. Because the globally unique MAC addresses offer an opportunity to track user equipment, and so users, across time and IPv6 address changes, RFC 3041 (http://tools.ietf.org/html/rfc3041) was developed to reduce the prospect of user identity being permanently tied to an IPv6 address, thus restoring some of the possibilities of anonymity existing at IPv4. RFC 3041 (http://tools.ietforg/html/rfc3041) specifies a mechanism by which time-varying random bit strings can be used as interface circuit identifiers, replacing unchanging and traceable MAC addresses
In IPv6, the possibility arises, that since the IP address includes the MAC address, that the IP address may become an easier and quicker way to derive a device-specific identification. The methods and systems herein support methodologies using IPv6 and IPv4. In particular an IPv6 IP Address or a MAC-address suited for IPv6 may facilitate determining and using a DSI. It is anticipated that while IPv4 is the popular standard today, a transition to IPv6 is imminent.
Targeted television advertising may be associated with personal devices, such as through mobile DSI-enabled identification or with mobile device internet browser cache/history content. Mobile DSI-enabled identification←what?. Advertisement targeting may be improved through the use of mobile DSI device detection within proximity of a front of a television. Mobile DSI, as herein described, may uniquely identify an individual through an association of a user profile with the Mobile DSI. By detecting a mobile device (through Mobile DSI detection) that is positioned within viewing distance of a television and identifying advertisements targeted to the user of the detected mobile device, the targeted advertisement may be presented to the television, or a set-top box controlling the television, and displayed for the user. The advertisement may be targeted based on a variety of factors associated with the mobile DSI including a user profile associated with the mobile DSI.
Advertisements may be targeted to and presented to a user based on the user's mobile DSI through a process that includes: gathering the device identifier or device-specific identification (DSI) from the user's mobile device, associating the gathered DSI with a user identity to provide a usage profile that may include usage tracking of content interaction through the mobile device and other internet enabled devices, using the usage profile to identify an advertisement or offer, determining which screen provides a good proximity to the user based on the relative distance of the user's mobile DSI device from a screen, and displaying the advertisement or offer on the screen.
Alternatively in the methods and systems, PC and/or laptops can have wired connections, whereas for mobile devices this is typically not the case. As such, referring to a wire connected PC/laptop MAC address is the equivalent of a wireless PC/Laptop/Mobile Handset's WiFi MAC address. As a result of such considerations, in the following described processes and diagrams, device-specific identifications, including those which are associated with wired or wireless technologies, are collectively referred to as DSIs.
The elements depicted in flow charts and block diagrams throughout the figures imply logical boundaries between the elements. However, according to software or hardware engineering practices, the depicted elements and the functions thereof may be implemented as parts of a monolithic software structure, as standalone software modules, or as modules that employ external routines, code, services, and so forth, or any combination of these, and all such implementations are within the scope of the present disclosure. Thus, while the foregoing drawings and description set forth functional aspects of the disclosed systems, no particular arrangement of software for implementing these functional aspects should be inferred from these descriptions unless explicitly stated or otherwise clear from the context.
Similarly, it will be appreciated that the various steps identified and described above may be varied, and that the order of steps may be adapted to particular applications of the techniques disclosed herein. All such variations and modifications are intended to fall within the scope of this disclosure. As such, the depiction and/or description of an order for various steps should not be understood to require a particular order of execution for those steps, unless required by a particular application, or explicitly stated or otherwise clear from the context.
The methods or processes described above, and steps thereof, may be realized in hardware, software, or any combination of these suitable for a particular application. The hardware may include a general-purpose computer and/or dedicated computing device. The processes may be realized in one or more microprocessors, microcontrollers, embedded microcontrollers, programmable digital signal processors or other programmable device, along with internal and/or external memory. The processes may also, or instead, be embodied in an application specific integrated circuit, a programmable gate array, programmable array logic, or any other device or combination of devices that may be configured to process electronic signals. It will further be appreciated that one or more of the processes may be realized as computer executable code created using a structured programming language such as C, an object oriented programming language such as C++, or any other high-level or low-level programming language (including assembly languages, hardware description languages, and database programming languages and technologies) that may be stored, compiled or interpreted to run on one of the above devices, as well as heterogeneous combinations of processors, processor architectures, or combinations of different hardware and software.
Thus, in one aspect, each method described above and combinations thereof may be embodied in computer executable code that, when executing on one or more computing devices, performs the steps thereof. In another aspect, the methods may be embodied in systems that perform the steps thereof, and may be distributed across devices in a number of ways, or all of the functionality may be integrated into a dedicated, standalone device or other hardware. In another aspect, means for performing the steps associated with the processes described above may include any of the hardware and/or software described above. All such permutations and combinations are intended to fall within the scope of the present disclosure.
While the invention has been disclosed in connection with the preferred embodiments shown and described in detail, various modifications and improvements thereon will become readily apparent to those skilled in the art. Accordingly, the spirit and scope of the present invention is not to be limited by the foregoing examples, but is to be understood in the broadest sense allowable by law.
All documents referenced herein are hereby incorporated by reference.
Claims
1. A method, comprising:
- creating an advertisement to be embedded in content, wherein the advertisement is dynamically changed to suit a profile of a listener to the content, wherein the profile is determined based on user activity associated with a mobile device specific identifier.
Type: Application
Filed: Oct 28, 2007
Publication Date: Jun 5, 2008
Inventor: Shah Ullah (Brooklyn, NY)
Application Number: 11/926,018
International Classification: G06Q 30/00 (20060101); G06F 17/00 (20060101);