REAL WORLD BEHAVIOR MEASUREMENT USING IDENTIFIERS SPECIFIC TO MOBILE DEVICES
Methods and systems are disclosed herein for determining real world behavior from proximity-time measurements of a user carrying a personal device and a wireless device identifier. Determining real world behavior and managing usage profiles associated with the real world behavior can be enhanced by the use of GPS location data derived from the personal device, another network enabled device, a wireless device identifier, and the like.
This application is a continuation of U.S. application Ser. No. 12/357,295 filed Jan. 21, 2009, which claims the benefit of the following U.S. Provisional Applications, each of which is hereby incorporated by reference in its entirety: U.S. Prov. App. No. 61/022,483 filed on Jan. 21, 2008 and U.S. Prov. App. No. 61/030,214 filed on Feb. 20, 2008.
Application Ser. No. 12/357,295 is a continuation-in-part of the following U.S. Applications, each of which is hereby incorporated by reference in its entirety: U.S. application Ser. No. 11/855,122 filed Sep. 13, 2007 which claims the benefit of U.S. Prov. App. No. 60/825,708 filed Sep. 14, 2006; U.S. application Ser. No. 11/855,685 filed Sep. 14, 2007; U.S. application Ser. No. 11/855,811 filed Sep. 14, 2007; U.S. application Ser. No. 11/855,820 filed Sep. 14, 2007; and U.S. application Ser. No. 11/925,967 filed Oct. 28, 2007.
Application Ser. No. 12/357,295 claims priority to international patent application Ser. No. PCT/US07/78519 filed Sep. 14, 2007.
BACKGROUND1. Field
This application relates to wireless communication and more specifically to mobile device identification and authentication for access to and presentation of targeted content.
2. Description of the Related Art
Methods and systems exist for targeting content, including advertising content, directed to users of network-connected devices, such as televisions, mobile handsets, computers, radios, advertising screens and the like. Such content-targeting methods face various challenges, depending on the users and devices to which content is targeted. For example, television and radio advertisements are often directed to a mass audience, with little information about specific users. Internet advertisements targeting a user may be based on data stored on a user's network-connected device that corresponds to sets of information that indicate that a user is returning to a particular site, but targeting based on this and similar mechanisms are subject to limitations, among them being that multiple users may access the Internet through the same device. Mobile content may be targeted more easily to a specific user, such as based on information about the user in a database maintained by a wireless carrier or based on the user's interaction with content on the mobile handset, but the more limited range of content that is typically accessed by mobile devices means that profiles based on that usage are often targeting limited and sometimes misleading. Accordingly, a need exists for better methods of gathering user-specific profile information across all types of network-enabled devices and as well as targeting content to users of all types of network-connected devices.
SUMMARYMethods and systems are disclosed herein for delivering content, including advertising content, to various network-connected devices. In various embodiments disclosed herein, methods and systems take advantage of capabilities and information available in various networking domains to deliver more targeted content to each of those domains, including using the collective capabilities and information derived from multiple domains to deliver content to each domain.
One embodiment of the methods and systems disclosed herein relates to television content and advertising. In certain such embodiments a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target television content, including advertisements, to the user. The network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices. In embodiments, a device-specific identifier (DSI) of a mobile device owned by a user, such as a MAC address of the user's mobile phone, may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device. Once the DSI is associated with one or more user names, activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities. Additionally, when a user interacts with network content using various network-connected devices and does not enter a username, activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded. As such activity may be derived from more than one user of the same device, patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device. Furthermore, when a user interacts with network content using a given network-connected device and does not enter a username, but during the same session of activity, on the same given network-connected device, as determined by proximity of access times, interacts with a second set of network content with a supplement of a username, activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity. Thus, a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains. Once a usage profile is generated, targeting techniques, such as behavioral targeting, hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the television of the user. In some embodiments, use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management. In particular, a short-distance wireless connection between a mobile handset and another network-enabled device, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to the other network-enabled device. Thus, a user's proximity to a television screen can be determined by using a short-distance wireless protocol to access the MAC address, or other mobile device-specific identifier (DSI) of the handset. Once proximity is determined or verified, it can be used for various purposes, including tracking what the user (or other nearby users) view on the television screen, such as for ratings purposes, managing (including with digital rights management techniques) the content the user is allowed to view on the screen (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the screen), and targeting the content directed to the user on the screen, including advertising, for which a user-specific profile which includes the activities performed on a multitude of network-connected devices may be referenced. Thus, the methods and systems disclosed herein allow for user-specific control of content delivered to the screen the user is watching, based on proximity of the user's (or set of users') mobile handset(s) to the screen.
Another embodiment of the methods and systems disclosed herein relates to radio advertising. In certain such embodiments a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target audio content, including advertisements, to the user. As in other embodiments, the network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices. In embodiments, a device-specific identifier (DSI) of a mobile device owned by a user, such as a MAC address of the user's mobile phone, may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device. Once the DSI is associated with one or more user names, activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities. Additionally, when a user interacts with network content using various network-connected devices and does not enter a username, activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded. As such activity may be derived from more than one user of the same device, patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device. Furthermore, when a user interacts with network content using a given network-connected device and does not enter a username, but during the same session of activity, on the same given network-connected device, as determined by proximity of access times, interacts with a second set of network content with a supplement of a username, activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity. Thus, a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains. Once a usage profile is generated, targeting techniques, such as behavioral targeting, hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the audio-enabled devices, such as Internet radios, of the user. In embodiments, use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management. In particular, a short-distance wireless connection between a mobile handset and another network-enabled device, such as an Internet-radio, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to the other network-enabled device. Thus, a user's proximity to an Internet radio can be determined by using a short-distance wireless protocol to access the MAC address, or other mobile-specific identifier (DSI) of the handset. Once proximity is determined or verified, it can be used for various purposes, including tracking what the user (or other nearby users) listen to on the audio-enabled device, such as for ratings purposes, managing (including with digital rights management techniques) the content the user is allowed to listen to on the audio-enabled device (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the audio-enabled device), and targeting the content directed to the user on the audio-enabled device, including advertising. Thus, the methods and systems disclosed herein allow for user-specific control of content delivered to the audio-enabled device to which the user is listening, based on proximity of the user's mobile handset to the audio-enabled device.
Another embodiment of the methods and systems disclosed herein relates to point-of-presence content delivery, such as live event content delivery and point-of-sale advertising, and outdoor advertising facilitating the use of a network-connected screen. In certain such embodiments a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target point-of-presence content, including advertisements, to the user. As in other embodiments, the network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices. In embodiments, a device-specific identifier (DSI) of a mobile device owned by a user, such as a MAC address of the user's mobile phone, may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device. Once the DSI is associated with one or more user names, activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities. Additionally, when a user interacts with network content using various network-connected devices and does not enter a username, activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded. As such activity may be derived from more than one user of the same device, patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device. Furthermore, when a user interacts with network content using a given network-connected device and does not enter a username, however during the same session of activity, on the same given network-connected device, as determined by proximity of access times, interacts with a second set of network content with a supplement of a username, activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity. Thus, a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains. Once a usage profile is generated, targeting techniques, such as behavioral targeting, hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to a point-of-presence device, such as a screen or audio-enabled device, that is in proximity to the user. In embodiments, use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management. In particular, a short-distance wireless connection between a mobile handset and another network-enabled device, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to the other network-enabled device, in this case a point-of-presence device such as a screen at a live event, a point-of-sale screen, or a point-of-presence audio-enabled device. Thus, a user's proximity to such a point-of-presence device can be determined by using a short-distance wireless protocol to access the MAC address, or other mobile-specific identifier (DSI) of the handset. Once proximity is determined or verified, it can be used for various purposes, including tracking what the user (or other nearby users) view on a screen or hear on an audio-enabled device, such as for ratings purposes, tracking the effectiveness of advertising, managing (including with digital rights management techniques) the content the user is allowed to view on the screen (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the screen), and targeting the content directed to the user on the screen, including advertising. Thus, the methods and systems disclosed herein allow for user-specific control of content delivered to the screen or audio-enabled device the user is watching, based on proximity of the user's mobile handset to the screen or audio-enabled device.
One embodiment of the methods and systems disclosed herein relates to Internet web-page-based, or Internet portal-based content. In certain such embodiments a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target Internet web-page-based or Internet portal-based content, including advertisements, to the user. The network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices. In embodiments, a device-specific identifier (DSI) of a mobile device owned by a user, such as a MAC address of the user's mobile phone, may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device. Once the DSI is associated with one or more user names, activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities. Additionally, when a user interacts with network content using various network-connected devices and does not enter a username, activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded. As such activity may be derived from more than one user of the same device, patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device. Furthermore, when a user interacts with network content using a given network-connected device and does not enter a username, however during the same session of activity, on the same given network-connected device, as determined by proximity of access times, interacts with a second set of network content with a supplement of a username, activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity. Thus, a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains. Once a usage profile is generated, targeting techniques, such as hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the Internet-connected device of the user. In some embodiments, use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management. In particular, a short-distance wireless connection between a mobile handset and another network-enabled device, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to the other network-enabled device. Thus, a user's proximity to an Internet-connected device can be determined by using a short-distance wireless protocol to access the MAC address or other DSI of the handset. Once proximity is determined or verified, it can be used for various purposes, including tracking what the user (or other nearby users) view on the Internet-connected device, such as for ratings purposes, managing (including with digital rights management techniques) the content the user is allowed to view or listen on the device (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the device), and targeting the content directed to the user on the device, including advertising. Thus, the methods and systems disclosed herein allow for user-specific control of content delivered to the screen the user is watching or the audio-device to which the user is listening, based on proximity of the user's mobile handset to the Internet-connected device.
One embodiment of the methods and systems disclosed herein relates to mobile, including, without limitation, mobile handset screen advertising. In certain such embodiments a user profile may be derived from an individual's usage of a range of different types of network-connected devices, and the profile may be used to target television content, including advertisements, to the user. The network-connected devices from which usage profiles are derived may include mobile phones, computers, Internet-connected entertainment devices (such as Internet-connected televisions and radios) and other devices. Capabilities of mobile handset technologies may be used to unify a profile of a user across various network-connected devices. In embodiments, a device-specific identifier (DSI) of a mobile device owned by a user, such as a MAC address of the user's mobile phone, may be associated with user names that the user enters when interacting with network content, such as web sites, using that mobile device. Once the DSI is associated with one or more user names, activities associated with those user names can be tracked and used to generate a profile for that user, regardless of what network-connected device is used to undertake the activities. Additionally, when a user interacts with network content using various network-connected devices and does not enter a username, activity performed during those sessions may still be categorized into profiles as the device-specific identifier of the device through which the interactivity was performed is still recorded. As such activity may be derived from more than one user of the same device, patterns in activity performed on such devices without the accompaniment of a username may be conducted to find similarities among the network activity recorded containing both a DSI and username or to find similarities particularly to the network activity conducted on the user's mobile device as it is the most individual-specific network-connected device. Furthermore, when a user interacts with network content using a given network-connected device and does not enter a username, however during the same session of activity, on the same given network-connected device, as determined by proximity of access times, interacts with a second set of network content with a supplement of a username, activity performed with the first instance of network content, which was not supplemented with a username may be associated with activity performed with the second set of network content which was supplemented with a username, thus allowing activity performed with two unique sets of network content, one with a username, one without a username, to be categorized under the same profile of user activity. Thus, a multi-device profile may be created for that user, such that activity on a network performed on a network-connected device whether accompanied by a username or not, can still be categorized into a single profile for a user which represents a wide range of activities across multiple devices and domains. Once a usage profile is generated, targeting techniques, such as hand targeting, demographic targeting, geographic targeting, psychographic targeting, collaborative filtering, neural network-based targeting, hierarchical targeting, and the like may be used to target content, including advertisements, to be directed to the mobile device of the user. In embodiments, use of short-distance wireless technologies supports more specific targeting of content to a user or a group of users and enables digital rights management, security and content management. In particular, a short-distance wireless connection between a mobile handset and another network-enabled device, such as using a Bluetooth, WiFi, WUSB, UWB or other wireless protocol, allows the methods and systems disclosed herein, in certain embodiments, to determine or verify the proximity of the user's handset, and by inference the user, to another mobile device. Thus, a user's proximity to a mobile device can be determined by using a short-distance wireless protocol to access the MAC address or other DSI of the handset. Once proximity is determined or verified, it can be used for various purposes, including managing (including with digital rights management techniques) the content another user is allowed to access on another mobile device (including allowing the user to share content from a user's library as long as the user's mobile handset is in proximity to the other user's device), and targeting the content directed to the user on the other device, including advertising.
One advantage of the methods and systems herein is they enable a drastic improvement in the television advertising industry. There are certain technology and business drivers for a higher penetration of more advanced set-top boxes, or televisions integrated with Internet-connection capability that may be associated with improvements in television advertising.
DVDs may become a technological non-necessity in a few years. Users may consume video via a direct feed/download via an Internet-protocol based connection to a content serving database. This video data will need to go through a data network utility in the home that may route not only video, but other data streams such as voice and Internet data inside the home. As a result, even viewers that will not subscribe to premium television channels will likely have an advanced set-top box or television with Internet-connection capabilities for the consumption of non-premium television channels and for watching movies.
Fixed-Mobile-Convergence (FMC) indicates that landlines may soon become a technological non-necessity. A device that switches a cell phone's connection from a cell-tower to the broadband connection inside the home (in the form of cable, satellite, Fixed WiMax, or other broadband connection) may become necessary. It is very reasonable to assume, especially with the triple and quadruple play packages being presented to consumers that the features of such a device will eventually be embedded into the same unit that controls video downloads including television and movies.
Using the mobile device is potentially the only way to attain a real-time, live assessment of who is watching the television and tailor the advertisements delivered to the unique combinations of viewers. A father and son watching television content together represent two very unique advertising markets. To best take advantage of this blend of viewers simultaneously viewing television, for the purposes of accurate and proportional advertising, a device that is overwhelmingly individual specific such as the mobile handset may provide tremendous value.
Additionally, activity performed on a mobile handset as a portion of overall activity performed on a network-connected device, is increasing rapidly and will continue to do so in the foreseeable future.
For Internet publishers of websites, blogs, or for Internet retailers, the server-side software which facilitates the creation of user-specific profiles rooted in the mobile DSI but which also take into consideration all network-connected devices, is a technology that may but will not necessarily, provide the same value as a real-time user-specific advertising network for Internet websites, blog publishers, or Internet retailers allowing them access to the best available user-specific Internet usage metrics so they can serve the best possible ads on available ad inventory or in the case of an Internet retailer, promote the best products suited for visitors to the given Internet retailer's website. Based on the content, fees may be collected by a provider of a mobile DSI identification/authentication service, such as for video, unlimited viewing, extending the content on a given Internet platform to another platform such as television content, portable/flexible electronic screens used to make digital text portable, radio, and the like.
As a result of mobile carriers dealing with rapidly decaying voice revenue and as even the margins on Internet data connection rates are becoming hyper-competitive, mobile carriers are rapidly seeking ways to monazite their high subscriber penetrations through advertising. From business processes which rely upon the methods and systems disclosed herein, mobile carriers may receive a portion of advertising revenue from various sources of advertising, including television which accounts for 34% of all advertising dollars in the US or $72 billion in 2006. As video on the internet becomes more prevalent, advertising related revenue may grow and through technological advances, television and internet advertising and content delivery will benefit.
Digital Rights Management synergies with content producers are enabled by the methods and systems herein. Content production companies such as News Corporation may enjoy digital rights management services to protect their premium for-pay content while using the methods and systems herein to aid in the serving of highly-precise, targeted ads, such as by using DSI based identification/authentication profiles.
Placing an emphasis on a mobile handset's device-specific identification (DSI) as a base for a user-specific profile generated from activity performed on various network-connected devices may be based on an understanding that it is essentially carried on a given user's person and thus is very individual-specific. Additionally, since it is carried on a given user's person, it follows the user in many places where other devices such as a PC/laptop might not, thus allowing user-specific profiles created with specific dependencies and ties to the mobile handset, to be portable by virtue of the inherent portability of mobile handset. Additionally, when attempting to aggregate all the Internet usage habits of a user across various devices, beginning with the mobile DSI may facilitate the aggregation by enabling the use of clues or information associated with the mobile handset DSI and the associated user to determine what other information, found as a result of Internet usage on other network-connected devices associated with the same user, to aggregate with it. Starting with a fixed position, or multi-user device, such as a PC, a television, or other stationary Internet-enabled device presents user identification challenges that the mobile handset does not. These challenges are mainly rooted on the basis that such devices may, and often, have multiple regular users. Therefore the mobile handset may serve as a primary identification device for a scenario in which the methods and systems herein (e.g. identification or authentication) could be applied for advertising, content/software as a service-authentication, and the like. The mobile handset is widely regarded as becoming the most frequently used computing interface, making it ideal for user authentication purposes. However, the methods and systems described herein do not all require a mobile component, and therefore, for the purposes of the unique methods and systems described herein, they can be associated with mechanisms that do include a mobile component.
In one aspect of the invention, methods and systems may include using a personal device to detect a proximity of a wireless device identifier; determining a duration of the detected proximity; generating a measure of real-world behavior by associating the detected wireless device identifier with at least one of a real world product, service, product category, retail store aisle, and retail store; and updating a usage profile that is associated with a user of the personal device with the real world behavior.
In one aspect, the wireless device identifier may include at least one of an RFID device and a WiFi device.
In one aspect, updating a usage profile may include using a device specific identifier associated with the personal device to determine the usage profile to update.
In one aspect, the measure of real world behavior may include GPS location data received from the personal device.
In another aspect of the invention, methods and systems may include detecting a proximity of a personal device to a plurality of wireless device identifiers; determining a duration of proximity for each of wireless device identifiers, providing a dwell event for each of the plurality of wireless device identifiers; and analyzing the plurality of dwell events and a usage profile associated with a user of the personal device to determine a measure of user interest in an item associated with at least one of the plurality of wireless device identifiers.
Another aspect further may include facilitating delivering to the personal device an offer based on the measure of user interest. The measure of user interest may indicate that the user has acquired the item
In one aspect, a device specific identifier of the personal device may be used to identify the usage profile for analysis. The usage profile may include usage data associated with a plurality of network-enabled devices.
In one aspect, the dwell event may include GPS location data received from the personal device. The GPS location data may be used to determine a retailer associated with the wireless device identifiers.
In another aspect of the invention, methods and systems may include receiving dwell event data representing a real-world proximity of a plurality of personal devices to a wireless device identifier; using a device specific identifier associated with each of the plurality of personal devices to identify a usage profile of a user of each of the personal devices; comparing the dwell event data with each usage profile to determine a measure of user interest in an item associated with the wireless device identifier; and updating each usage profile based on the measure of user interest.
In one aspect, substantially identical dwell event data for a first personal device and a second personal device may result in a measure of user interest for a user associated with the first device that is different from a measure of user interest for a user associated with the second device, wherein the difference in user interest is provided by comparing the dwell event data with each of the usage profile of the first device and the usage profile of the second device.
In another aspect of the invention, methods and systems may include receiving a GPS location of a first network-enabled device; receiving a device specific identifier of the first network-enabled device; and authorizing the delivery of content to a second network-enabled device based on the GPS location of the first network-enabled device.
In one aspect, the content may be an advertisement that is targeted to a user of the second network-enabled device. The advertisement may be based on a usage profile associated with at least one of the first network-enabled device and the second network-enabled device.
In one aspect, authorizing the delivery may be further based on a GPS location of the second network-enabled device.
In one aspect, the first network-enabled device may be on a different network from the second network-enabled device. The first network-enabled device may be connected to a cellular network and the second network-enabled device is connected to the Internet.
In another aspect of the invention, methods and systems may include detecting a latency of communication between a first network-enabled device and a second network-enabled device; calculating a distance between the first and second network-enabled devices based at least in part on the detected latency; and updating a usage profile based on network activity data collected from the second network-enabled device, wherein the usage profile is identified by a device specific identifier of the first network-enabled device, and wherein the updating is based on the calculated distance.
In another aspect of the invention, methods and systems may include receiving a measure of latency of communication between a first network-enabled device and a second network-enabled device; receiving network activity associated with at least the second network-enabled device; receiving a device specific identifier of the first network-enabled device; identifying a usage profile based on the device specific identifier; calculating a distance between the first and second network-enabled devices based at least in part on the measure of latency; and updating the usage profile based on the received network activity data, wherein the updating is based on the calculated distance.
In another aspect of the invention, methods and systems may include receiving a GPS location data of a first network-enabled device and a second network-enabled device; receiving a device specific identifier of the first network-enabled device; and authorizing the delivery of content to the second network-enabled device based on the device specific identifier and the GPS location data.
In one aspect, the first and second network-enabled devices may be located remotely to each other. The first and second network-enabled devices are not communicating by short haul wireless communications.
In one aspect, the GPS location data may be one of a specific location, a proximity to a location, one of a plurality of locations, and not within range of certain locations. The GPS location of the first network-enabled device is the same as the GPS location of the second network-enabled device. The GPS location of the first network-enabled device may be nearby to the GPS location of the second network-enabled device.
In one aspect, the GPS location of the first network-enabled device may be compared to the GPS location of the second network-enabled device to determine a proximity of a user of the first network-enabled device to the second network-enabled device. The device specific identifier of a first network-enabled device may be retrieved from a GPS locating system.
In one aspect, street address referenced GPS data may be combined with the GPS location data to facilitate selecting a usage profile. The street address referenced GPS data may be combined with the GPS location data to facilitate at least one of digital rights management, access to content, sharing of content, storing of content, targeting of content, developing a user-specific authentication/identification profile, associating devices to a user-specific authentication/identification profile, associating web surfing with a user history, and associating an electronic communication activity with a user history.
In one aspect, GPS location of the first network-enabled device may be combined with a determination of network communication latency between the second network-enabled device and the first network-enabled device to calculate a proximity of the first and second network-enabled devices.
In one aspect, authorizing the delivery may be based on the calculated proximity.
In one aspect of the invention, methods and systems may include providing geo-location data from a GPS enabled personal device to a media capture device; marking media created by the media capture device with the geo-location data; and transferring the marked media to a server.
In another aspect of the invention, methods and systems may include receiving media from a media capture device over a short haul wireless network; marking the media with a geo-location; and transferring the geo-location marked media over a network.
In another aspect of the invention, methods and systems may include forwarding media received by a personal device over a short haul wireless network from a media capture device and a geo-location of the personal device over a long haul wireless network, wherein the forwarded media is associated with the geo-location.
These and other systems, methods, objects, features, and advantages of the present invention will be apparent to those skilled in the art from the following detailed description of the preferred embodiment and the drawings. All documents mentioned herein are hereby incorporated in their entirety by reference.
The invention and the following detailed description of certain embodiments thereof may be understood by reference to the following figures:
The following disclosure relates generally to mobile device identification and authentication for access to and presentation of targeted content.
As used herein, the terms “comprises,” “comprising,” “includes,” “including,” “has,” “having” or any other variation thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, article, or apparatus that comprises a list of elements is not necessarily limited to only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Further, unless expressly stated to the contrary, “or” is intended to mean “and/or” unless otherwise stated to the contrary. Also, use of the “a” or “an” are employed to describe elements and components of the invention. Thus in the foregoing description references to the singular (“a”, “an”, “the”, “one”, etc.) are also intended to refer to the plural unless otherwise stated or clear from the context.
The Figures and the following description relate to preferred embodiments of the present invention by way of illustration only. It should be noted that from the following discussion, alternative embodiments of the structures and methods disclosed herein will be readily recognized as viable alternatives that may be employed without departing from the principles of the claimed invention. Reference will now be made in detail to several embodiments, examples of which are illustrated in the accompanying figures. It is noted that wherever practicable similar or like reference numbers may be used in the figures and may indicate similar or like functionality. The figures depict embodiments of the present invention for purposes of illustration only, and are not intended to limit the scope of this disclosure in any manner. One skilled in the art will readily recognize that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles described herein.
Referring to
In the embodiment of
To deliver targeted advertising 218 to a user of the mobile handset 202 who may be viewing the television 208, the set-top box 204 may extract the mobile handset DSI 212 by employing a short-distance wireless technology (WiFi, Bluetooth, WUSB, UWB, and the like) to locate mobile handsets within viewing proximity of the television 208. The mobile handset DSI 212 (also known as mobile DSI or just DSI) may then be uploaded from the set-top box 204 over the internet to the host 210 for matching to a user-specific authentication/identification profile (a user profile) that corresponds to the uploaded DSI 212. The servers 210 may be servers associated with the DSI platform 100, or may be associated with partners or affiliates of the platform 100. The server 210 may mine data across an uploaded user authentication/identification profile that corresponds to the extracted mobile DSI 212 and use the information for precision advertisement targeting. By using location based technology such as GPS/cellular/radio wave triangulation, a more precise location for the user may be determined so that advertising for a user viewing the television may be presented on the television 208. The location based technology information may be retrieved from the mobile handset 202, such as by querying the mobile handset 202 or the location information may be included in the initial extraction of the DSI 212 by the set-top box 204. The host server(s) 210 may then find the most appropriate advertisement 218 and distribute the advertisement back to the set-top box 204 for display on the television 208. In an example, advertisements 218 may come in the form of dynamic, embedded content advertisements 218. Interactivity during the period of display of the advertisement can be monitored and recorded by the servers 210 for the purposes of adding more data to the corresponding user authentication/identification profile.
An alternative embodiment for delivering targeted advertising 218 to a television that may be viewed by a user of a mobile handset is depicted in
In addition to, or in place of sending the DSI 212 to the server 210, the set-top box 204 may extract information, in its entirety or derived from the mobile handset's Internet browser cache and forward it to the servers 210. The extracted internet recent historical information 302, such as represented by a internet browser cache, may be combined with a user profile or usage profile corresponding to the DSI 212 to determine relevant analysis about the historical information 302. Alternatively, the recent historical information 302 may be analyzed alone. The information may be analyzed for demographic, interests, trends, and the like that may facilitate the servers 210 determining an appropriate offer or advertisement 218 to present on the television 208 that the user of the mobile handset 202 may be viewing.
In an embodiment, presence of a mobile phone may be used to identify the users who are present/within viewable proximity in front of a television or other electronic display by virtue of the distance of their mobile handsets from the television or other electronic display. Communication with a mobile phone or mobile handset 202 may include using short-distance wireless technologies, such as WiFi, Bluetooth, WUSB, and UWB to identify nearby mobile handsets 202. Precise user location may further be determined via device-specific GPS/cellular/radio wave triangulation alignment. Such detection may be used to derive real-time and accurate content audience ratings.
The methods and systems herein may facilitate real-time television or other electronic display audience rating/headcount via use of mobile DSI and/or mobile handset internet browser cache. Once it has been established that individuals, by virtue of the presence of their mobile handsets, are viewers in front of a given television or other electronic display, the methods and systems herein may include using the mobile DSIs of the given mobile handsets (and profiles of usage associated therewith, including usage of non-mobile devices) for the purposes of retrieving a real-time, audience ratings/headcount, which pertains to various demographic categories/metrics. This may involve the use of Internet usage profiles associated with the mobile DSI but also may take into consideration usage activity from non-mobile devices. Usage profiles provide a way of tracking of Internet activity which can result in strong assumptions of real-time, viewer-specific demographic data.
Alternatively real-time viewer attendance may be determined through the extraction of each proximate mobile handset's Internet browser cache, in place of extraction of the mobile DSI, which can also effectively report real-time viewer demographical data as determined by the Internet usage patterns which can be recognized by analyzing the mobile handset's Internet browser cache contents.
Referring to
Alternative to using the mobile device DSI and cross referencing it to a data store of user identities, demographics and audience classification may be determined by analyzing an internet browser cache 302 associated with the proximate mobile handsets. Information such as historical browsing data, queries, locations, communication such as texting, email, and the like may be analyzed by the servers 210 to determine real-time viewing audience aspects.
Through this method, a mobile handset may effectively allow for the creation of real-time audience ratings which include various demographics determined by identifying the participants in a viewing audience as well as relative Internet usage metrics. The derived or measured real-time viewing information may be provided in a report to broadcasters, advertisers, and the like to become part of a broadcast or programming business process.
User-specific authentication/identification profiles may be based on mobile device or personal device device-specific identifications (DSIs), such as for the purposes of user-specific multi-device internet usage tracking and profiling. User-specific authentication/identification profiles may include a user identity, usage tracking, and the like. Establishing user-specific profiles may involve tracking of activities associated with user names that are linked or tied to the mobile DSI; and linking those usernames to other (non-mobile) DSIs to aggregate user-specific activities regardless of which device(s) the activities take place. One useful purpose for this aggregation of mobile and non-mobile activity tracking is targeted advertising.
Defining, extracting, and using mobile device specific identifiers (DSIs) may make use of server-side and/or client-side software. Server-side software may reside on the servers 210 or may reside elsewhere and be executed on the servers 210. Client-side software may be downloaded onto or otherwise configured into mobile and/or stationary devices used by end users. The client-side and server-side software may be used when a mobile device user visits a website in order to gain access to content residing on servers that require authentication and/or user identification. One or more of the client-side and the server-side software may include creating and updating logs associated with a mobile device DSI once a known visitor has gained access to servers providing access to the requested authentication protected content. DSI based logs may differ from other logging methodologies in that DSI logs may have the ability to completely mask the real world identities of users as their user-specific authentication/identification profiles can be created with a process that results in the complete morphing or excluding of anything that renders the user identifiable in the real world. Additionally, the DSI specific logs are initiated, conducted, and managed on the server side rather than on the device with which the user is in direct contact with and/or uses to input/request network content. Also, client-side software may provide capabilities that pertain to uploading device-specific information and existing information already contained in the mobile device prior to engagement with the server 210 or with the website a given user is attempting to access. This results in an important difference from information/behavioral software existing today that log behavioral activity on the client device.
For pedagogical purposes,
Referring to
Referring to
Referring to
Referring further to
In addition to checking usernames in usage logs against other usage logs, DSIs in usage logs may also be checked in a similar way. A usage log that contains a DSI but does not contain a username may be aggregated with a user profile by associating the DSI in the usage log with the information in the data store 1402 to determine an appropriate user profile for aggregating the usage log data.
Even when there is no direct correlation among usernames and DSIs, such as when a DSI does not have any username associated with it, a user profile may be created for the DSI so that all usage associated with that DSI may be aggregated under the DSI specific user profile. In this way, user authentication/identification profiles may be established and used even without a username or other personal identifying information associated with the profile.
Because users often perform a variety of activities during an on-line session or connection, time analysis of logs may facilitate determining user names for DSI log entries for which a user name is not required by the server generating the DSI log. If activity associated with a DSI is logged by a website that requires a username login, and another site that doesn't require a username logs activity from the same DSI at nearly the same time, such as shortly before or after the website requiring login, it can be determined that for those particular sessions of activity, the visitor is likely to be the same.
When a plurality usage profiles with different DSIs and without usernames, are collected by the host server 210, the host server may analyze the usage related data to determine associations that may allow the formation of a user profile associated with the different DSIs.
In
The methods and systems may enable ensuring privacy of select user-specific profile/profile activity data via server-to-server data morphing and data exclusion. The methods and systems herein may include the ability to morph or exclude specific parts of the user-specific authentication/identification profile or specific activity associated with a given profile for the purpose of making certain the real world identity associated with the given user-specific identification profile remains private. The result is a highly individualized profiling system that successfully leaves private, the real world identity of those being profiled.
By supporting real world identification to provide digital rights management for authentication protected content and then using morphed information related to the usage by the DSI accessing the protected content, such as for targeted advertising, both the protected individual and the public advertiser may benefit without creating a conflict between the private user and the targeted advertising provider.
Referring to
Using short-distance wireless communication to pass a mobile device-specific identification, such as a DSI, to another nearby device, such as another mobile device or an internet connected device, may allow the mobile device-specific identification to be used to secure content that is presented (e.g. displayed, stored, played, and the like) on the other device. Examples wherein the mobile DSI may be used to secure content presented on another device include authentication for digital rights management and content sharing. An example of content sharing may include playing music, movies, shows, and the like authenticated by a mobile device DSI, such as a mobile phone, while the phone is in proximity to the sharing device—but only while the phone is in proximity. When the phone is no longer in proximity, the content sharing device may be denied access to present the authenticated content. Digital rights/authentication could be associated with the authentication/identification profile corresponding to the mobile phone DSI. This authentication/identification profile may also be used for targeted advertising. However digital rights management data that is transferred to third parties may include an interface that is more transparent of the specific individual, such as by keeping other data (e.g. surfing habits) out of view or filtered from the third party.
In an embodiment of the digital rights authentication process herein described, content authentication may include tagging a representation of the authenticated mobile DSI onto the protected content/service prior to distributing the protected content/service to a device which is providing the sharing or presentation capability. In this way, client-side software associated with the sharing or presenting device may ensure that the authenticated DSI mobile device remains in proximity to the sharing device. When such proximity is no longer detected, the tagged content may be invalidated, deleted, or otherwise blocked from access by the sharing/presenting device.
In reference to
In embodiments, once on the mobile handset, protected content may be streamed to another device via short distance wireless communication (e.g., WiFi, Bluetooth, WUSB, or UWB) during which time playback software on the receiving device may temporarily play content as it is transmitted from the mobile handset to the receiving device. The receiving device may then, such as using client-side software installed on the receiving device, upload a tag for the protected content (such as a tag that is or is associated with the DSI of the sending handset) for authentication on a host server. In embodiments both a DSI of the receiving handset and a DSI of the sending handset may be used to manage rights of the users to play the content.
Depending on terms that may be set between the authentication entity (such as the DSI platform 100) and the rightful distributor of the protection enabled content, only information that is necessary for authentication may be submitted to the authentication entity. Limiting the information sent to the authentication entity may restrict what the authentication entity knows about the user's digital rights. In an example, authentication deal terms are solely on a transaction percentage/fixed fee basis. Therefore, information transferred to an authentication entity may only include financial transaction information related to the authentication entities fee structure. As such, each time a transaction takes place in which the authentication entity is entitled to a fee, the authentication entity would be notified only of that specific information which allows the authentication entity to determine and verify the revenue owed to the authentication entity. In another example, the authentication entity has a financial institution as a partner website. The authentication company and the financial institution will work out a deal such that for each user that the financial institution wishes to authenticate to access their account information, the authentication company will charge 10 cents annually. In this example, the authentication company would receive data pertaining to each time a user account is created and each time one is deleted. No other information would flow from the financial institution to the authentication entity. In another example, the authentication entity has a completely non-financial deal with an online site that provides content to registered users (e.g. a social networking site, an online version of a newspaper that charges for subscription, a pure-online newspaper, a content provider to registered users, and the like). In this example, the authentication entity may receive user information, such as the user's real name and identity or a user identity determined from a mobile DSI associated with the authentication request. The information might include entertainment interests, demographic information, and the like. The selected user information can be used in a multitude of ways and can be a set of market data, the value of which could be further enhanced through operational combinations using processes described herein.
Mobile DSI-enabled personal online account digital rights management may be associated with the methods and systems herein described. Users may be allowed, on their own discretion, to limit access to an online facility, such as certain personal online accounts (e.g. email, social network, bank, brokerage, etc.) so that those accounts may only be accessed if a mobile handset, which users assign at their own discretion, is nearby the device through which access is attempted to one of the personal accounts. Users may identify specific DSIs or specific users that may be associated with a mobile handset DSI. The specified users or DSIs may be maintained by an authentication entity so that requests to access to a DSI protected account may be authenticated based on proximity of one or more user specified mobile handsets to the device through which the request to access the online facility is made. An authentication response may be provided from authentication functionality embodied in the authentication entity, or in an entity associated with the DSI protected account. Based on the response, access to the online facility may be allowed or denied. In addition, the user may specify DSIs that must not be in proximity to the requesting device to enable authenticated access to the account.
The methods and systems herein may allow users, on their own discretion, to limit access to certain personal content (e.g. documents, pictures, video, and the like) accessible through an online facility so that the protected personal content, wherever it resides (e.g. an online social network, online photo album, online video server) may only be accessed by a user as assigned by the personal content publisher/owner. In an example, Mary allows her mom and her brother to view online photo album X while allowing her brother to access online photo album X and online video Y. When Mary's mother and brother seek access to online photo album X, they are granted access when one or more of the mobile DSIs associated with Mary's mother or brother are in proximity to the device requesting access. However, only when Mary's brother's mobile device DSI is within proximity to the requesting device, will access to video Y be granted. Access is granted using similar DSI authentication methods described herein that may include an authentication server, an authentication, tagging of protected content, and the like. Authentication may include matching the DSIs of devices in proximity to a list of authorized users by determining a user associated with each DSI to be matched. The matching may be performed by an authentication entity. Alternatively, the server-side software may receive a list of authorized DSIs (such as from an authentication entity) and may perform the matching. Personal authentication services may be offered to individuals for a fee, may be provided as part of a DSI based digital rights management protection package, or may be provided free of charge to individuals. Alternatively, content providers or servers may pay a fee to use DSI-based authentication services.
DSI-based user identification and profiling may allow layered viewer-specific advertising. Layered user-specific television, radio, and/or internet advertising support another layer of advertising within an existing advertising space. This may be embodied as multiple configurable or selectable images essentially in a stack that is selectable by the user or by display device software based DSIs of devices that are in proximity to the display device. Layered user-specific advertising may include the ability to split up each advertisement frame among multiple ads or among various categories of ads so that a reconstituted advertisement based on the user-specific identification/authentication profiles of the viewers who are in front of the display device (or audio device) can be presented to the user(s). Layering may enable various portions of an advertisement to be customized and targeted to the viewers local to a presentation device.
Layered user-specific advertisements may also include a concept of a blanket advertisement that is targeted using general demographics based on the user profiles determined from the DSIs in viewing proximity. The blanket advertisement may be replaceable by the presentation device by an advertisement that is targeted to specific viewers. In an example, two families viewing the same television program through two different set-top boxes may see different advertisements. One family may have viewers with no mobile devices in proximity to the set-top box (or with devices providing DSIs that have no determinable association to targeted advertising) so that family may view the blanket advertisement. The other family may include viewers who are carrying mobile devices that present DSIs that can be determined to satisfy a requirement for a targeted advertisement. This family may not be presented the blanket commercial. Instead the set-top box (or server connected to the set-top box) may present a targeted advertisement in place of the blanket advertisement. While this concept supports layering of entire advertisements, it also extends to layering portions of an advertisement.
An advertisement may be composed of layers, frames, regions, elements, primitives, and the like that may be customizable through a targeting process. One or more of these layered portions of an advertisement may be customized with targeted content based on the determined viewers of the advertisement. In an example a sporting goods store advertisement may allow targeting various individuals by allowing products included in the advertisement to be user specific. While a base of the advertisement may be common to all presentations of the advertisement, a viewer with a usage profile that indicates the user has an interest in golf may be presented with golf product promotions, whereas a viewer determined to have an interest or have expressed an interest in basketball may be presented with basketball related product promotions within the advertisement, such as during the same advertisement on the same internet-enabled device such as a television connected to an internet-enabled set-top box.
When more than one viewer with differing targeting criteria is viewing output from the same set-top box (or internet connected device), the layering may allow more complex targeting. In an example, an advertisement for a sports drink may include images of a person active in a sport who needs a sport drink to be refreshed. The sport images may be targeted to one of the viewers, and the sport drink may be targeted to another of the viewers, thereby presenting an advertisement with relevance to both viewers.
In
The mobile device providing the DSI may be used as an interactive controller, such as a remote control or user input device to interact with the user-specific targeted advertisements. Data inputted by the viewers may be anticipated using predictive algorithms that may take into consideration the user-specific authentication/identification profile that may be retrieved once the mobile DSI is extracted. The range of interactivity may be based on aspects of the user-specific authentication/identification profile corresponding to the extracted mobile DSI. Advertising interactivity may allow a viewer to respond to a television, electronic multimedia display, radio advertisement, and the like via inputting information into the mobile handset which is then wirelessly transmitted to the device controlling the presentation of the advertisement. Another way of connecting the user inputted responses to the interactive advertisement is by interfacing the mobile handset to the device controlling the interactive advertisement through a network such as a cellular network and the Internet. Example use of a mobile handset interacting with an interactive targeted advertisement may include book marking advertisements, referring advertisements to friends, responding to interactive games, polls, chat services, and the like. However, when viewers watch this content, the storefront of the restaurant may change to reflect an actual local restaurant nearby the physical location of the viewers. This may further allow for interactivity which allows the viewer(s) to reference this actual local restaurant's current menus to proceed towards a transaction for a delivery of food, a reservation for a meal, etc
User actions may be predicted based on a combination of the presented targeted content, such as an advertisement and aspects of the user-specific authentication/identification profile. In an example, usage data associated with a viewer may indicate that the viewer may be likely to forward relevant content to one or more members of his social network. Based on this usage data and based on the content of the targeted advertisement, a list of likely recipients of the content may be prepared so that the viewer may easily interact through the mobile handset to forward the content to the likely recipients. The list of likely recipients may be based on usage data—such as based on frequency of including one or more recipients in prior forwarded advertisements. The list may be based on an association of aspects of the targeted content to user-specific profiles of users in the viewer's online social network. Many other associations are possible in determining what type of interaction may be predicted for the viewer of targeted advertising.
The presentation devices depicted in
In
In the timeline depicted in
Referring to
Automatic exchange of contact information in the physical person, as described above and in
Enabling Sarah to view only the portions of John's social networking information viewable to his coworkers takes only two steps. A first step may include one of John requesting Sarah for her contact information, John accepting Sarah's request to receiver her contact information, or John and Sarah both accepting a mutual swap of contact information. A second step involves John categorizing Sarah under a pre-made group of coworkers thereby assigning her accessibility rights to his social networking profile.
Referring to
Alerting a user to the presence of a mobile handset user meeting one or more classifications, categorizations, or interest pools may be determined through a DSI based authentication process. In an embodiment, at a step 2802 software executing on a recipient mobile handset that receives a DSI from another mobile handset seeking to be alerted may run a check to see if the user of the seeking mobile handset is of any interest to the recipient. If so, the recipient may acknowledge the DSI by exchanging information such as messages, pictures, current GPS/cellular/radio wave triangulated location, and the like.
Referring to
Referring to
Physical person social networking may be facilitated by software executing on a mobile handset that transmits a limited social networking profile associated with the user of the mobile handset so that it can be received by surrounding mobile handsets. Software running on the surrounding mobile handsets may perform checks against categories, and the like as described above to determine if contact information exchange may be beneficial. If so, requests for contact exchange may be performed between proximate DSI-based mobile handsets as described in reference to
Referring to
Referring to
GPS location, cellular, radio wave triangulation, and other earth surface and near earth location detection techniques may facilitate managing, securing, and targeting content as herein described, and the like. These device location techniques may allow, for example, presentation of targeted advertising on a first device based on a GPS location of a second device, even if the two devices are remote from one another. Therefore, device related information such as a DSI may be collected from a device that is not in range for short haul wireless communication with another device and still allow the DSI and associated user profile information to determine access to and/or targeting for content on the other device. The detection of a user device at a specific GPS location, within a proximity to a GPS location, at one of a range of GPS locations, or when a user is not within a range of GPS locations (for example) may indicate that content may be presented on, delivered to, made accessible to, be stored on, and the like a different networked device. In an example, if a user has entered a room and the user is carrying a GPS enabled mobile device that is in proximity of a short haul wireless communication (ex: Bluetooth) with a display device, however the user has turned off Bluetooth communication in the device, the GPS location of the device could indicate that the user is in proximity to the display and targeted advertising may be presented on the display. In this example, the GPS location is used as an alternate locating method.
Using GPS or other device locating methods facilitates devices on separate networks sharing information associated with or contributing to a user-specific authentication/identification profile. In an example, a user may be carrying a GPS enabled mobile phone that is connected only to a cellular communication network. An outdoor display may be connected to a proprietary advertising communication network. The user device GPS information may be transmitted through the cellular network to a server or other network interconnecting facility to eventually reach a computing facility on the proprietary advertising communication network. By associating the user device GPS location with the outdoor display GPS location, targeted advertising (for example) may be presented on the outdoor display. In another example, a user GPS device enabled to provide DSI related information may only be connected to a GPS network. The GPS location of the user device may be communicated from the GPS network as described above so that advertising or other content can be presented to the user. Further in the example, a hiker may carry a GPS locating device that detects and transmits its GPS location over a GPS network. As the hiker approaches a hiking trailhead with an electronic kiosk, the GPS location of the hiker being related to the GPS location of the kiosk may result in a map of the area with trails marked that the hiker has already hiked being displayed. In this way the user-specific authentication/identification profile associated with the GPS device is accessed and associated with a hiking history collected, perhaps automatically, from a GPS device associated with the user profile. Such techniques may also be used for field sales so that sales people can gain access to information related to the location of their mobile device through its GPS location. A sales visitation log may be accessed based on the user-specific authentication/identification profile that is associated with the GPS located device and indicate, perhaps by GPS location, key clients that have not been visited in the current quarter.
Device locating techniques such as GPS, cellular/radio signal triangulation, and the like, may be combined with other location information, such as street address to facilitate an association between a user-specific authentication/identification profile and one or more devices.
Therefore GPS and other device physical location information, and other geospatial location information may be associated with, for example, DSI information to facilitate digital rights management, access to content, sharing of content, storing of content, targeting of content, developing a user-specific authentication/identification profile, associating devices to a user-specific authentication/identification profile, associating web surfing and other communication activity (e.g. email, texting, SMS, messaging) with a user history, and the like.
Based on recently executed research on the accuracy of GPS, a margin of error associated with a GPS position derived from GPS satellites is typically +/−50 feet. Finer grained proximity data may be derived by examining network latency from one IP enabled device (e.g., mobile handset, laptop, and the like.) to another IP enabled media device (e.g., set-top box/IP capable television, and the like). This data may be used to identify user behavior and proximity to IP enabled media devices. A virtual map of a location can be assembled by examining the various latencies in a specific location. For example, network latency analysis may facilitate identifying loose physical boundaries of a location by collecting and analyzing the network latencies around a building or home. This data may be used to facilitate associating detected activity that is associated with network devices (e.g. network activity, movement of a mobile device, dwell time at a fine grained position, and the like) with a user profile. This may further facilitate identifying behavioral traits of the user. In an example, if a device is determined to be within 30 feet of a television, yet not in the detected “docking position for the device”, the television is turned on, and the content being viewed is consistent with the user's profile based behavior or preferences, it may be reasonable to determine that the user is watching television.
Network latency within a specific location can be determined to at least a few tenths of milliseconds. In example, the latency from a wireless laptop to a wireless router within a room is approximately 1.7 milliseconds (based on 64 byte packets). The latency from the same laptop to the same wireless router in an adjoining room may be 1.9 milliseconds. Network changes may be detected by examining historical latency data. Additionally, devices must be considered individually as network latencies can be characteristic of processing speeds of the device. The DSI may facilitate device identification and therefore may further facilitate determining network latency associated with the device. In an example, the CPU of a mobile handheld will typically process network traffic slower than a laptop CPU.
In the alternative configurations that involve the media creation device transmitting non-geocoded media to a location aware device where geocoding is executed, software to associate the newly created content with the geo-location would potentially reside on the location aware device rather than on the media creation device. This facilitates current technology media creation devices, such as digital cameras, and the like to participate in creating geocoded media without adaptation.
In yet another alternative embodiment, the newly created content may be transferred without a geocode over the PAN to a mobile device that supports GPS or other location determination methods. Both the location information and the transferred created media may be individually sent to a common remote server by the mobile device via the mobile device's internet connection. Merging of the location information with the created media (to produce geocoded media) may be performed by the server or other networked processor.
Geocoded content that is produced using the methods described herein and other equivalent PAN-based approaches may be identified so that the initial geocoding and/or subsequent use or access to this geocoded content may facilitate collection of a royalty for the use of thereof. In an example, when a search engine delivers content geocoded as herein described, a royalty may be payable for presentation of the geocoded content to a user. This and other royalty collection techniques associated with presentation of geocoded media (or variations thereof (e.g. thumbnail image) are hereby included in the scope of the methods and systems of this specification. In another example, a content provider may provide content that has been created using the geocoding methods and systems herein described. The content may be owned by a third party. The content provider may be required to pay a royalty to both the content owner and to the geocoding facilitator for the use of the content.
The raw data, and/or data derived from an analysis of the data may be associated with a user-specific authentication/identification profile that may be associated with the mobile handset, such as through the DSI of the mobile handset. Further, the user-specific authentication/identification profile may be associated with several other mobile and non-mobile devices and those devices' associated DSIs.
When combined with location specific information, such as GPS coordinates of the mobile handset during the measured dwell time, it may be possible to associate a dwell event with a retailer or other provider of the product or feature that characterizes the dwell event. By associating this information together, it is possible to determine which physical retail store, physical product, services offered or marketed, product category or aisle in a retail store, and the like the user may be interested in. In an example, a user may access the internet through a networked device, such as a set-top box, and may search for retailers in their area for a product. This information may be recorded or analyzed and data derived from the analysis of this internet access event may be associated with the user's authentication/identification profile. The user may, before or after the internet access event, visit the retailer and shop for the product (a dwell event) associated with the internet access event. Such actions may be determined by comparing the data aggregated from the RFID/WiFi or other potential wireless identification/categorization-enabling signal collected by the embedded wireless components of the mobile handset of the user with the given user's historical internet behavior which together, in turn, may be associated with the given user's user-specific authentication/identification profile.
Based on an analysis of the data from the dwell event, it may be possible to conclude that the user did not acquire the item at the retailer (e.g. the dwell event occurred within the location of the store), or that the user did acquire the item (e.g. the dwell event started within the location of the store and continued outside the store, such as to the user's home or the dwell event was initiated within an aisle of the store and the given item's RFID/WiFi or other potential wireless identification/categorization-enabling signal was utilized to deem the given item as purchased within the store's POS [point-of-sales] area. Based on this analysis, it may be possible to target content, such as advertisements. This targeting of content may be used when the user is consuming networked content such as video, audio, digital print, potentially through an Internet Protocol network. If it is determined that the user did not purchase the item at the retailer, information about the availability and price of the item at other local retailers or electronic, or online retailers may be delivered to the user's mobile handset. Alternatively, the user may receive an email, text message, or other electronic offer and the like with an invitation to purchase the item through the internet or alternative physical retail location (presumably at a cost lower than the most recent physical retailer from which the given item's RFID/WiFi or other potential wireless identification/categorization-enabling signal and associated item detail/pricing information was first received by the user's mobile handset's embedded wireless components and associated capabilities).
Users often shop together; therefore it is possible to associate two user-specific authentication/identification profiles with RFID/WiFi or other potential wireless identification/categorization-enabling signals associated with physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store and the like. By analyzing other behaviors and actions associated with the two users (e.g. by analyzing data associated with each user's user-specific authentication/identification profile), it may be further possible to determine users with a genuine interest in purchasing products or services.
In an example of this real-world dwell event, short distance wireless communication between a mobile handset and a wireless identifier representing physical goods, services, retail environments, etc., such as a RFID/WiFi or other potential wireless identification/categorization-enabling signals associated with physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store and the like (e.g. a UPC or other serialized identifier, and the like) may take place. The mobile handset may upload the data specific to a RFID/WiFi or other potential wireless identification/categorization-enabling signals associated with physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store to a data store. Through an associative process, the signal-specific data may be matched to physical retail stores, physical products, services offered or marketed, product categories or aisles in a retail store, and the like and thus be used to facilitate the determining of ‘real world’ behavioral data of the mobile handset user. This behavioral data can then be aggregated and further refined to be incorporated into a user-specific authentication/identification profile which may be associated with at least the DSI of the mobile handset which may further be tied to the DSI of several networked devices such as personal computers, televisions, audio devices, digital print devices, which in turn, may be connected to an electronic network such as an Internet Protocol network.
The methods and systems described in this document and the referenced documents include many possible alternate combinations for the described methods and systems, such as wireless protocols and/or device-specific identifications. In an example, utilizing a device's MAC address, which is a standard unique identification assigned to every WiFi/WiMax adapter and Ethernet card (fixed—for facilitating a wired broadband internet connection) as a basis for a device-specific identification (DSI) in a wireless protocol is one alternative combination. In this example, another alternative may include the wireless protocol being based on Bluetooth, WUSB, UWB, and the like, instead of being based on WiFi/WiMax/Ethernet connection which may or may not require a different DSI.
In the various embodiments of the methods and systems disclosed herein, various technologies may be employed. In certain preferred embodiments, the methods and systems disclosed herein identify and/or authenticate use of Internet-connected devices (mobile handsets—including cellular phones), PCs/laptops, television set-top boxes, Internet-connection capable televisions, and the like) using, primarily but not limited to, a variety of device-specific identification (DSI) types and techniques associated with various wireless protocols. This objective may be associated with WiFi and WiMax (both of which may utilize MAC addresses), WUSB (Wireless USB), UWB (Ultra-wide Band), Bluetooth (e.g. Bluetooth 3.0), and other forms of device-specific identifiers. Other forms of DSI may be derived from an identification not necessarily associated with a wireless protocol.
The methods and systems herein may facilitate building privacy-sensitive and device-specific user identification and/or authentication profiles. The methods and systems may allow aggregation of various DSIs that belong to a number of different devices that may include any combination of devices (i.e. 1 mobile handset, 1 PC, 1 set-top box and 2 laptops OR 2 mobile handsets, 3 PCs, 1 laptop, 1 internet-connection capable television etc.) and may tie it to specific users WITHOUT necessarily revealing a given user's “real world” identity (e.g. to non-affiliated third parties). A mobile handset's DSI is an example of a source of DSI used in the creation of identification/authentication profiles. The mobile handset's DSI may be the primary or base DSI associated with the identification/authentication profile. Other device DSIs may become associated with a profile based on usage from those devices being associated with the usernames/surfing habits associated with the mobile handset's DSI.
The methods and systems herein provide mechanisms that may transparently monitor the flow of device-specific or profile-specific information, such as a user-profile, while enabling a user's “real world” identity to be scrambled or encrypted (herein referred to as morphed) such that providers or facilitators who have access to the communications within the process would be not be capable of deriving the user's real world identity. Such morphing of real world identities may occur by creating unique algorithms that scramble a DSI or username-specific profile as the information associated with that profile is transferred from a partner's server (a partner may include but is not limited to internet search and content companies such as Google, MySpace, internet email sites such gmail.com or mail.yahoo.com, retail websites such as Amazon.com, and the like.)
User-specific identification and/or authentication profiles may be utilized for, but not limited to targeted advertising. Targeted advertising may include delivering targeted advertising across various media forms including but not limited to internet websites, television, internet television, outdoor advertising, mobile handset advertising, portable LCD-advertising, Internet radio, and the like. Mechanisms for delivering targeted advertisements across each media form may vary but may benefit from the core concepts of the methods and systems herein.
The methods and systems herein may facilitate creating content authentication and management systems or digital rights management systems using a mobile DSI, such as authenticating and managing access rights to and management of content (e.g. free content or content provided for a fee) and Internet software-as-a-service information content such as Lexis Nexus, Gartner, IDC, digital textbooks, and other digital media/digital information providers that grant conditional access (for payment, or otherwise).
In regards to digital rights management/content authentication, due to a mobile device's individual specific nature and its portability, a mobile DSI may provide a higher level of accuracy and flexibility than using a system in which access to content is tied to a particular PC/laptop, set-top box, and the like. The latter is a system that is commonly used in many current digital rights management schemes. Through the methods and systems herein described, a user may essentially carry all of his online digital rights with him as it is rooted in a DSI from his mobile handset. Although content may be exchanged with the user's mobile handset through other devices, (e.g. a set top box, PC/laptop, television, kiosk, external advertising device, and the like), the mobile handset DSI provides the means for authentication—independent of any other device in the content transfer chain. This is beneficial in that the other device(s) in the content transfer chain may have multiple users, may not be secure, may not support digital rights management and most importantly may be stationary in its location and thus not allowing the authenticated user to carry his digital rights with him. Make the comparison to a DVD? You bought it so you can take it with you. Not being able to do that for digital content is a step backwards, not forward. In such a system, if a user attempts to access a Mobile DSI-protected online account through a PC/laptop, or other internet-connected device, short distance communication would take place between the user's mobile handset and the internet-connected device at which point the user's mobile DSI would be passed to internet servers for authentication. The server at which the protected account exists may then attempt to match an entered username/password combination against a pre-registered mobile DSI. The username/password may be collected at the time a user's account is registered or at the time of an update/replacement of a mobile DSI for the user's account). If the username/password combination matches up with the mobile DSI, then the user will be granted access to the mobile DSI-protected account. If the mobile DSI does not match the username/password of the account, the user will not be granted access. Standard mechanisms for lost passwords or for resetting a password may also be applied, such as the use of pre-registered secret password questions.
Mobile handsets provide a variety of device-specific identification types on which a DSI may be based. A mobile handset that is WiFi or WiMax enabled will have a MAC address, this MAC address may serve as a DSI. A mobile handset that is Bluetooth-enabled will have a Bluetooth Device Address. This Bluetooth Device Address may serve as a DSI. A unique identification, potentially a serial code that identifies a mobile handset's central processing unit (CPU) may serve as a DSI. A unique identification, potentially a serial code, that identifies a mobile handset's WUSB (wireless USB) or UWB (Ultra Wide-band) chipset may serve as a DSI. A mobile telephone number that is used to dial a voice connection or send a TXT message to a mobile handset may serve as a DSI. GSM phones use the International Mobile Equipment Identity or IMEI that may serve as a DSI. CDMA phones use Mobile Equipment Identifiers or MEIDs that may serve as a DSI. Other similar device-specific identifications that are unique to a single physical mobile handset may serve as a mobile DSI.
When connected wired or wirelessly, PC/laptops may contribute device-specific information that may be used as a basis for a DSI. A PC/laptop that has a fixed wired connection via an Ethernet card will have a MAC address, this MAC address may serve as a DSI. A PC/laptop that is WiFi or WiMax enabled will have a MAC address, this MAC address may serve as a DSI. A PC/laptop that is Bluetooth-enabled will have a Bluetooth Device Address. This Bluetooth Device Address may serve as a DSI. A unique identification, potentially a serial code, which identifies a PC/laptop's central processing unit (CPU), may serve as a DSI. A unique identification, potentially a serial code, which identifies a PC/laptop's WUSB (wireless USB) or UWB (Ultra Wide-band) connection, may serve as a DSI.
Other consumer electronic devices that can be connected to an electronic network such as the Internet may also have DSI. If the consumer electronic device is capable of accessing an electronic network such as the Internet, it may do so using a wired Ethernet connection using a Ethernet card, or a wireless connection using a WiFi/WiMax connection, in both such scenarios, the device should have a MAC address that will be used as its DSI>. Examples of such consumer electronic devices capable of being connected to an electronic network include Television set-top boxes, Televisions, LCDs fixated outdoors, within retail stores, taxi cabs, other public transportation, Radio devices that are Internet-enabled, car radio devices that are Internet-enabled, and the like. These other consumer electronic devices may use many of the same or similar DSIs as mentioned above for mobile handsets or PCs/laptops including the MAC address as a DSI if it's available.
The role of MAC addresses in Internet protocol v4 and v6 may require unique treatment. In Internet Protocol version 4, or IPv4, the IP Address of a given device is 32 bits long and is assigned without embedding the device's unique, permanent, MAC-address. However, In IPv6, the MAC-address of a device is intended to be embedded into a device's IP Address.
Public sources of information regarding the difference of the IPv6 address and its relevance to MAC-addresses describe IPv6 addresses as typically composed of two logical parts: a 64-bit sub-network prefix, and a 64-bit host part, which is either automatically generated from the interface's MAC address or assigned sequentially. Because the globally unique MAC addresses offer an opportunity to track user equipment, and so users, across time and IPv6 address changes, RFC 3041 (http://tools.ietf.org/html/rfc3041) was developed to reduce the prospect of user identity being permanently tied to an IPv6 address, thus restoring some of the possibilities of anonymity existing at IPv4. RFC 3041 (http://tools.ietforg/html/rfc3041) specifies a mechanism by which time-varying random bit strings can be used as interface circuit identifiers, replacing unchanging and traceable MAC addresses
In IPv6, the possibility arises, that since the IP address includes the MAC address, that the IP address may become an easier and quicker way to derive a device-specific identification. The methods and systems herein support methodologies using IPv6 and IPv4. In particular an IPv6 IP Address or a MAC-address suited for IPv6 may facilitate determining and using a DSI. It is anticipated that while IPv4 is the popular standard today, a transition to IPv6 is imminent.
Targeted television advertising may be associated with personal devices, such as through mobile DSI-enabled identification or with mobile device internet browser cache/history content. Advertisement targeting may be improved through the use of mobile DSI device detection within proximity of a front of a television. Mobile DSI, as herein described, may uniquely identify an individual through an association of a user profile with the Mobile DSI. By detecting a mobile device (through Mobile DSI detection) that is positioned within viewing distance of a television and identifying advertisements targeted to the user of the detected mobile device, the targeted advertisement may be presented to the television, or a set-top box controlling the television, and displayed for the user. The advertisement may be targeted based on a variety of factors associated with the mobile DSI including a user profile associated with the mobile DSI.
Advertisements may be targeted to and presented to a user based on the user's mobile DSI through a process that includes: gathering the device identifier or device-specific identification (DSI) from the user's mobile device, associating the gathered DSI with a user identity to provide a usage profile that may include usage tracking of content interaction through the mobile device and other internet enabled devices, using the usage profile to identify an advertisement or offer, determining which screen provides a good proximity to the user based on the relative distance of the user's mobile DSI device from a screen, and displaying the advertisement or offer on the screen.
Alternatively in the methods and systems, PC and/or laptops can have wired connections, whereas for mobile devices this is typically not the case. As such, referring to a wire connected PC/laptop MAC address is the equivalent of a wireless PC/Laptop/Mobile Handset's WiFi MAC address. As a result of such considerations, in the following described processes and diagrams, device-specific identifications, including those which are associated with wired or wireless technologies, are collectively referred to as DSIs.
The elements depicted in flow charts and block diagrams throughout the figures imply logical boundaries between the elements. However, according to software or hardware engineering practices, the depicted elements and the functions thereof may be implemented as parts of a monolithic software structure, as standalone software modules, or as modules that employ external routines, code, services, and so forth, or any combination of these, and all such implementations are within the scope of the present disclosure. Thus, while the foregoing drawings and description set forth functional aspects of the disclosed systems, no particular arrangement of software for implementing these functional aspects should be inferred from these descriptions unless explicitly stated or otherwise clear from the context.
Similarly, it will be appreciated that the various steps identified and described above may be varied, and that the order of steps may be adapted to particular applications of the techniques disclosed herein. All such variations and modifications are intended to fall within the scope of this disclosure. As such, the depiction and/or description of an order for various steps should not be understood to require a particular order of execution for those steps, unless required by a particular application, or explicitly stated or otherwise clear from the context.
The methods or processes described above, and steps thereof, may be realized in hardware, software, or any combination of these suitable for a particular application. The hardware may include a general-purpose computer and/or dedicated computing device. The processes may be realized in one or more microprocessors, microcontrollers, embedded microcontrollers, programmable digital signal processors or other programmable device, along with internal and/or external memory. The processes may also, or instead, be embodied in an application specific integrated circuit, a programmable gate array, programmable array logic, or any other device or combination of devices that may be configured to process electronic signals. It will further be appreciated that one or more of the processes may be realized as computer executable code created using a structured programming language such as C, an object oriented programming language such as C++, or any other high-level or low-level programming language (including assembly languages, hardware description languages, and database programming languages and technologies) that may be stored, compiled or interpreted to run on one of the above devices, as well as heterogeneous combinations of processors, processor architectures, or combinations of different hardware and software.
Thus, in one aspect, each method described above and combinations thereof may be embodied in computer executable code that, when executing on one or more computing devices, performs the steps thereof. In another aspect, the methods may be embodied in systems that perform the steps thereof, and may be distributed across devices in a number of ways, or all of the functionality may be integrated into a dedicated, standalone device or other hardware. In another aspect, means for performing the steps associated with the processes described above may include any of the hardware and/or software described above. All such permutations and combinations are intended to fall within the scope of the present disclosure.
While the invention has been disclosed in connection with the preferred embodiments shown and described in detail, various modifications and improvements thereon will become readily apparent to those skilled in the art. Accordingly, the spirit and scope of the present invention is not to be limited by the foregoing examples, but is to be understood in the broadest sense allowable by law.
All documents referenced herein are hereby incorporated by reference.
Claims
1. A method comprising:
- using a personal device to detect a proximity of a wireless device identifier;
- determining a duration of the detected proximity;
- generating a measure of real-world behavior by associating the detected wireless device identifier with at least one of a real world product, service, product category, retail store isle, and retail store; and
- updating a usage profile that is associated with a user of the personal device with the real world behavior, wherein the usage profile includes data representing the user's on-line activity using a network-enabled device other than the personal device while the personal device is detected via wireless proximity detection to be in proximity to the network-enabled device.
2. The method of claim 1, wherein the wireless device identifier includes at least one of an RFID device and a WiFi device.
3. The method of claim 1, wherein updating a usage profile includes using a device specific identifier associated with the personal device to determine the usage profile to update.
4. The method of claim 1, wherein the measure of real world behavior includes GPS location data received from the personal device.
5. A method comprising:
- detecting a proximity of a personal device to a plurality of wireless device identifiers;
- determining a duration of proximity for each of wireless device identifiers, providing a dwell event for each of the plurality of wireless device identifiers; and
- analyzing the plurality of dwell events and a usage profile associated with a user of the personal device to determine a measure of user interest in an item associated with at least one of the plurality of wireless device identifiers, wherein the usage profile includes data representing the user's on-line activity using a network-enabled device other than the personal device while the personal device is detected via wireless proximity detection to be in proximity to the network-enabled device.
6. The method of claim 5, further including facilitating delivering to the personal device an offer based on the measure of user interest.
7. The method of claim 5, wherein a device specific identifier of the personal device is used to identify the usage profile for analysis.
8. The method of claim 5, wherein the usage profile includes usage data associated with a plurality of network-enabled devices.
9. The method of claim 5 wherein the dwell event includes GPS location data received from the personal device.
10. The method of claim 9, wherein the GPS location data is used to determine a retailer associated with the wireless device identifiers.
11. The method of claim 5, wherein the measure of user interest indicates the user has acquired the item.
12. A method comprising:
- receiving dwell even data representing a real-world proximity of a plurality of personal devices to a wireless device identifier;
- using a device specific identifier associated with each of the plurality of personal devices to identify a usage profile of a user of each of the personal devices;
- comparing the dwell event data with each usage profile to determine a measure of user interest in an item associated with the wireless device identifier; and
- updating each usage profile based on the measure of user interest, wherein the usage profile includes data representing the user's on-line activity using a network-enabled device other than the personal device while the personal device is detected via wireless proximity detection to be in proximity to the network-enabled device.
13. The method of claim 12, further including facilitating delivering to at least one of the plurality of personal devices an offer based on the measure of user interest.
14. The method of claim 12, wherein the usage profiles include usage data associated with a plurality of network-enabled devices.
15. The method of claim 12, wherein the dwell event data includes GPS location data received from the personal device.
16. The method of claim 15, wherein the GPS location data is used to determine a retailer associated with the wireless device identifiers.
17. The method of claim 12, wherein the measure of user interest indicates the user has acquired the item.
Type: Application
Filed: Aug 24, 2012
Publication Date: Dec 20, 2012
Inventor: Shah Ullah (Brooklyn, NY)
Application Number: 13/594,360
International Classification: G06Q 30/02 (20120101);