US20040147265A1 - System and method for an adaptive user communications device - Google Patents

System and method for an adaptive user communications device Download PDF

Info

Publication number
US20040147265A1
US20040147265A1 US10/624,085 US62408503A US2004147265A1 US 20040147265 A1 US20040147265 A1 US 20040147265A1 US 62408503 A US62408503 A US 62408503A US 2004147265 A1 US2004147265 A1 US 2004147265A1
Authority
US
United States
Prior art keywords
user
targeting system
database
virtual database
accordance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/624,085
Inventor
Mark Kelley
Steven Caliguri
Souheil Gallouzi
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cricket Communications Inc
Original Assignee
Mark Kelley
Caliguri Steven John
Souheil Gallouzi
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mark Kelley, Caliguri Steven John, Souheil Gallouzi filed Critical Mark Kelley
Priority to US10/624,085 priority Critical patent/US20040147265A1/en
Publication of US20040147265A1 publication Critical patent/US20040147265A1/en
Assigned to WELLS FARGO BANK, N.A., AS COLLATERAL AGENT reassignment WELLS FARGO BANK, N.A., AS COLLATERAL AGENT SECURITY AGREEMENT Assignors: LEAP WIRELESS INTERNATIONAL, INC.
Assigned to BANK OF AMERICA N.A. reassignment BANK OF AMERICA N.A. SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BACKWIRE.COM, INC., CHASETEL LICENSEE CORP., CHASETEL REAL ESTATE HOLDING COMPANY, INC., CRICKET ALABAMA PROPERTY COMPANY, CRICKET ARIZONA PROPERTY COMPANY, CRICKET ARKANSAS PROPERTY COMPANY, CRICKET CALIFORNIA PROPERTY COMPANY, CRICKET COLORADO PROPERTY COMPANY, CRICKET COMMUNICATIONS, INC., CRICKET FLORIDA PROPERTY COMPANY, CRICKET GEORGIA PROPERTY COMPANY, INC., CRICKET HOLDINGS DAYTON, INC., CRICKET IDAHO PROPERTY COMPANY, CRICKET ILLINOIS PROPERTY COMPANY, CRICKET INDIANA PROPERTY COMPANY, CRICKET KANSAS PROPERTY COMPANY, CRICKET KENTUCKY PROPERTY COMPANY, CRICKET LICENSEE (ALBANY), INC., CRICKET LICENSEE (COLUMBUS), INC., CRICKET LICENSEE (DENVER), INC., CRICKET LICENSEE (LAKELAND), INC., CRICKET LICENSEE (MACON), INC., CRICKET LICENSEE (NORTH CAROLINA), INC., CRICKET LICENSEE (PITTSBURGH), INC., CRICKET LICENSEE (RECAUCTION), INC., CRICKET LICENSEE I, INC., CRICKET LICENSEE II, INC., CRICKET LICENSEE III, INC., CRICKET LICENSEE IV, INC., CRICKET LICENSEE IX, INC., CRICKET LICENSEE V, INC., CRICKET LICENSEE VI, INC., CRICKET LICENSEE VII, INC., CRICKET LICENSEE VIII, INC., CRICKET LICENSEE X, INC., CRICKET LICENSEE XII, INC., CRICKET LICENSEE XIII, INC., CRICKET LICENSEE XIV, INC., CRICKET LICENSEE XIX, INC., CRICKET LICENSEE XV, INC., CRICKET LICENSEE XVI, INC., CRICKET LICENSEE XVII, INC., CRICKET LICENSEE XVIII, INC., CRICKET LICENSEE XX, INC., CRICKET MICHIGAN PROPERTY COMPANY, CRICKET MINNESOTA PROPERTY COMPANY, CRICKET MISSISSIPPI PROPERTY COMPANY, CRICKET NEBRASKA PROPERTY COMPANY, CRICKET NEVADA PROPERTY COMPANY, CRICKET NEW MEXICO PROPERTY COMPANY, CRICKET NEW YORK PROPERTY COMPANY, INC., CRICKET NORTH CAROLINA PROPERTY COMPANY, CRICKET OHIO PROPERTY COMPANY, CRICKET OKLAHOMA PROPERTY COMPANY, CRICKET OREGON PROPERTY COMPANY, CRICKET PENNSYLVANIA PROPERTY COMPANY, CRICKET TEXAS PROPERTY COMPANY, CRICKET UTAH PROPERTY COMPANY, CRICKET WASHINGTON PROPERTY COMPANY, CRICKET WISCONSIN PROPERTY COMPANY, LEAP PCS MEXICO, INC., LEAP WIRELESS INTERNATIONAL, INC., MCG PCS LICENSEE CORPORATION, INC., TELEPHONE ENTERTAINMENT NETWORK, INC.
Assigned to WILMINGTON TRUST FSB reassignment WILMINGTON TRUST FSB SECURITY AGREEMENT Assignors: CRICKET COMMUNICATIONS, INC., CRICKET LICENSEE (REAUCTION), LLC, CRICKET LICENSEE 2007, LLC, CRICKET LICENSEE I, LLC, LEAP WIRELESS INTERNATIONAL, INC.
Assigned to CRICKET MICHIGAN PROPERTY COMPANY, CRICKET LICENSEE VI, INC., CRICKET LICENSEE XVII, INC., MCG PCS LICENSEE CORPORATION, INC., CRICKET OHIO PROPERTY COMPANY, CRICKET WISCONSIN PROPERTY COMPANY, CRICKET LICENSEE XVI, INC., CRICKET LICENSEE (DENVER) INC., CRICKET LICESNSEE (ALBANY), INC., CRICKET LICENSEE XX, INC., BACKWIRE.COM, INC., CRICKET ARIZONA PROPERTY COMPANY, CRICKET NEVADA PROPERTY COMPANY, CRICKET NORTH CAROLINA PROPERTY COMPANY, CRICKET KANSAS PROPERTY COMPANY, CRICKET LICENSEE VIII, INC., CRICKET OREGON PROPERTY COMPANY, CRICKET OKLAHOMA PROPERTY COMPANY, LEAP WIRELESS INTERNATIONAL, INC., CRICKET LICENSEE XV, INC., CRICKET FLORIDA PROPERTY COMPANY, CRICKET LICENSEE III, INC., CHASETEL LICENSEE CORP., CRICKET UTAH PROPERTY COMPANY, CRICKET LICENSEE X, INC., CRICKET LICENSEE XIV, INC., CRICKET GEORGIA PROPERTY COMPANY, INC., CRICKET PENNSYLVANIA PROPERTY COMPANY, CRICKET NEW YORK PROPERTY COMPANY, INC., CRICKET LICENSEE (MACON), INC., CRICKET TEXAS PROPERTY COMPANY, CRICKET MISSISSIPPI PROPERTY COMPANY, CRICKET INDIANA PROPERTY COMPANY, TELEPHONE ENTERTAINMENT NETWORK, INC., CRICKET HOLDINGS DAYTON, INC., CRICKET KENTUCKY PROPERTY COMPANY, CRICKET LICENSEE XI, INC., CRICKET ALABAMA PROPERTY COMPANY, CRICKET MINNESOTA PROPERTY COMPANY, CHASETEL REAL ESTATE HOLDING COMPANY, INC., CRICKET NEW MEXICO PROPERTY COMPANY, CRICKET LICENSEE XVIII, INC., CRICKET LICENSEE (PITTSBURGH) INC., CRICKET LICENSEE (COLUMBUS), INC., CRICKET LICENSEE (NORTH CAROLINA) INC., CRICKET COMMUNICATIONS, INC., CRICKET NEBRASKA PROPERTY COMPANY, CRICKET WASHINGTON PROPERTY COMPANY, LEAP PCS MEXICO, INC., CRICKET ARKANSAS PROPERTY COMPANY, CRICKET LICENSEE V, INC., CRICKET LICENSEE IX, INC., CRICKET LICENSEE (REAUCTION), INC., CRICKET LICENSEE XIII, INC., CRICKET LICENSEE I, INC., CRICKET LICENSSE (LAKELAND) INC., CRICKET LICENSEE IV, INC., CRICKET CALIFORNIA PROPERTY COMPANY, CRICKET LICENSEE XII, INC., CRICKET LICENSEE VII, INC., CRICKET ILLINOIS PROPERTY COMPANY, CRICKET LICENSEE XIX, INC., CRICKET COLORADO PROPERTY COMPANY, CRICKET LICENSEE II, INC., CRICKET IDAHO PROPERTY COMPANY reassignment CRICKET MICHIGAN PROPERTY COMPANY RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: BANK OF AMERICA, N.A.
Assigned to CRICKET COMMUNICATIONS, INC. reassignment CRICKET COMMUNICATIONS, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: GALLOUZI, SOUHEIL, CALIGURI, STEVEN JOHN, KELLEY, MARK
Priority to US13/166,708 priority patent/US8965871B2/en
Assigned to LEAP WIRELESS INTERNATIONAL, INC., CRICKET COMMUNICATIONS, INC., CRICKET LICENSE COMPANY, LLC (FORMERLY KNOWN AS CRICKET LICENSEE (REAUCTION), LLC AND SUCCESSOR BY MERGER TO CRICKET LICENSEE I, LLC AND CRICKET LICENSEE 2007, LLC) reassignment LEAP WIRELESS INTERNATIONAL, INC. RELEASE OF SECURITY INTEREST IN INTELLECTUAL PROPERTY COLLATERAL AT REEL/FRAME NO. 22793/0850 Assignors: WILMINGTON TRUST, NATIONAL ASSOCIATION, SUCCESSOR BY MERGER TO WILMINGTON TRUST FSB
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/53Network services using third party service providers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/18Information format or content conversion, e.g. adaptation by the network of the transmitted or received information for the purpose of wireless delivery to users or terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information

Definitions

  • the invention relates to the adaptive behavior in a communications device, and, more specifically, to the personalization of, and targeting of content, such as advertisements, to, a mobile communication device.
  • a targeting system for adapting a device to a user includes at least one communications device in communication with at least one network, a virtual database accessible to at least one of the at least one communications device over the at least one network, and a searcher that provides content to the communications device over the at least one network, in accordance with the virtual database.
  • the at least one communications device may include a wireless communications device.
  • a communication network for providing a personalized targeted message to a user includes a communications device operated by the user, a virtual database including at least one characteristic about the user, a searcher having access to a plurality of targeted messages and to the virtual database, wherein the searcher filters at least one of the targeted messages that is of interest to the user according to at least one of the at least one characteristics, and wherein the searcher communicates the at least one targeted message of interest to the communications device for provision to the user.
  • a method of targeting content to a user of a communications devices includes building a virtual database of information regarding the user, modeling at least one probabilistic behavior of the user, in accordance with the virtual database, searching for content targeted to the at least one modeled probabilistic behavior, and providing the content to the communications device.
  • the present invention provides improved knowledge of a customer's buying habits, interests, background, advertising responsiveness, location, schedule, and propensities in order to more effectively target messages, content, and/or advertisements to the customer operating a communications device.
  • FIG. 1 is a block diagram of the present invention
  • FIG. 2 is a block diagram of the present invention
  • FIG. 3 is a block diagram of the present invention.
  • FIG. 4 is a flow diagram of the present invention.
  • FIG. 1 is a block diagram illustrating a targeting system for adapting a device to a user.
  • the targeting system may include a communications device in communication with a network, such as an internet, an intranet, a direct dial-in network, a wireless network, or the like, a virtual database, which may include a heuristic modeler, a virtual searcher, and a content filter.
  • a network such as an internet, an intranet, a direct dial-in network, a wireless network, or the like
  • a virtual database which may include a heuristic modeler, a virtual searcher, and a content filter.
  • the communication device 102 , 108 , 124 displays personalized messages, content, and/or advertisements to the user of the device.
  • the communication device may be a computer, television, wireless device, or the like, for example.
  • the wireless device 108 may be, for example, a cellular telephone, a programmable digital assistant, a short range wireless device, or other wireless device, such as a web-enabled wireless device.
  • the wireless device 108 may preferably be a mobile, hand-held device, although it may be a laptop computer having a wireless modem, for example.
  • the communications device may be a terminal-only device, such as a television set or network terminal.
  • Use of the communication device 102 , 108 , 124 may populate the virtual database 104 , which may include a heuristic modeler.
  • a virtual database as used herein, may include, for example, a database, a relational database, a database server, a server farm, or the like.
  • Searcher 126 produces information relevant to the user in accordance with information in database 104 .
  • Information may be entered into the virtual database 104 over network 106 , such as by the user, such as via a personal computer, or other type of computer terminal, connecting to a network access point, such as access point 103 , 125 , such as an internet connection, and thereby connecting to network 106 .
  • a virtual database interface 105 may communicatively connect the virtual database to the network 106 , via, for example, a one or a two way communicative connection.
  • the network 106 is shown as a single line with a distinct number of nodes, it will be apparent to one skilled in the art that a network, such as the internet, may have a great number of available nodes, ports and/or lines.
  • the user may, via the network 106 , log onto a site that is associated with and/or communicatively connected to the virtual database 104 via any available methodology, and may subsequently be allowed to generate a personal profile for storage into the virtual database 104 .
  • the user may communicate with the virtual database 104 via the air interface link 114 via the wireless base station 110 via the network 106 .
  • the air interface link may be, for example, an RF, optical, or other format or protocol known to those of skill in the art.
  • Information about a device may be exchanged between an intermediary, such as the wireless base station 110 , and a time and location monitor 116 , via a link 118 .
  • link 118 may be a wired link, wherein the time and location monitor is co-located located with, for example, the base station 110 , or may be a networked or wireless link.
  • the time and location monitor 116 may provide time and/or location information to the virtual database 104 over a link, such as link 120 , as will be apparent to those skilled in the art.
  • This time and/or location information may relate to the then-current time and location of a device, such as wireless device, as assessed at the wireless device 108 , or at the at least one base station 110 , or may relate to a batched history of time and/or location information for at least one device, such as wireless device 108 .
  • Time and/or location information may include times of telephone operation, time of calls, time of calls to particular numbers, and/or time of calls for particularly assessed purposes, or time of internet use, or time of internet sites visited, or times of television watching, or particular television programs watched at particular times, or particular channels watched at particular times, and/or location at which, or to which, activities occur, thereby allowing for the virtual database 104 to include time and position sensitive information, such as patterns of travel over time, or approximate hours of awakening, sleeping, working, playing, and the like, or when, to where, how often, and to whom cellular calls are made, or emails are sent, for example.
  • Time and location monitor 116 is an exemplary embodiment of a monitoring device 122 .
  • a monitoring device 122 may include, for example, a web-enabled device, or a wireless device, or a T 1 or other hard-wired connection device, such as a television channel monitoring device, to record the activity on a television 124 in order to provide information on viewing habits, for example, or a telephone monitor to record telephonic activity, such as over a landline telephone 124 , or an internet monitor to record internet viewing habits over a computer 124 , or a purchasing monitor, such as a credit card machine 124 , to track purchases at a particular store or stores by a particular user or users, or a monitor to track inter-relations between users, such as by telephone or over the internet.
  • Communications device such as device 124 may provide data to the monitoring device 122 via a link, such as link 123 , via, for example, a wireless or a hard-wired connection.
  • Monitoring device 122 may provide data to the virtual database 104 via link 125 , such as an internet link 125 through the network 106 .
  • a networked link, or a non-wired link, or a non-networked link, including an RF or optical link, may couple the monitor 122 to the virtual database 104 .
  • the data provided may include, for example, portions of television programs, or television advertisements or internet advertisements, viewed, skipped over, or fast-forwarded through, such as via the use of tracking technologies, such as TiVo®, for example.
  • Device monitors will be apparent to those of ordinary skill in the art, and each device monitor may include therein, for example, at least one database, such as a relational database, and/or at least one storage memory, and/or at least one batching memory.
  • Virtual database 104 may include therein a plurality of memories, processors, databases, comparators, or models, such as at least one overall model of at least one user, for example.
  • Virtual database 104 may house data collected from user input on communications devices 108 , 102 , 124 , and/or data on actual transactions of the user using the devices, as assessed via monitors 116 , 122 .
  • the virtual database 104 may additionally include user profile information, wherein the user is uniquely known based on the user profile information, and wherein the profile information is entered by the user, such as in response to a series of registration questions to register for wireless service, or internet service, or internet site and/or over a wireless device, or wherein the profile information is entered, for example, by a registration agent receiving information from a registering user.
  • User information may include the name, address, date of birth, marital status, economic, social, education, and/or responses to additional questions that will be apparent to those skilled in the art.
  • the use of user profile questions may be minimized in an embodiment wherein certain user information may be hueristically estimated, as set forth further hereinbelow, or wherein the maintenance of detailed personal information is not desired.
  • Data forwarded to the database 104 may be permanently stored, or may be real time cached, such that actual incoming data is stored only for a time period necessary to update an overall model within the virtual database, as set forth more fully hereinbelow.
  • Questions may be posed from and/or by the virtual database 104 to discover information and trends about buying habits or interests, such as questions inquiring about the typical mode of dress, or hobbies, for a user. Questions may additionally include the time, content and location of meals normally eaten by the user, or the time and location of hobbies that the user enjoys, for example. Questions may additionally include the timing, location, and frequency of services that the user usually employs, such as hair care, automobile maintenance, home improvement or maintenance, dry cleaning, food service, pet grooming, home or office cleaning, and/or banking services, for example. Additional questions may include the geography and timing of daily travels, such as a work and home location, or repetitious visitations to friends, family, business associates, and the like.
  • Questions may, for example, assess specific tastes in certain products, such as shoes, clothing, meals, housing, types of flowers or other gifts for family, friends, or business associates, or the special dates that the user may deem important such as birthdates, anniversaries, graduation dates, vacations and holidays.
  • Other question types will be apparent to those skilled in the art.
  • Responses to questions may be permanently stored, such that questions need not be responded to repeatedly, and questions may be updated, or new questions may be added, periodically.
  • question responses may be used only to build an overall model, as discussed hereinbelow, and those responses that change or contribute to the overall model may not be stored apart from the changes to the overall model.
  • certain questions may be eliminated in an embodiment wherein responses to certain questions may be heuristically estimated, or questions may be minimized or eliminated in an embodiment wherein minimal information is necessary, or wherein a majority of information is automatically or heuristically provided, in order to provide the overall model for selection of a particular search.
  • a user may be located as to time and geography, as set forth hereinabove, and may be asked only whether the user is hungry. If the user replies with a restaurant suggestion request, or if the user automatically receives a restaurant suggestion message in response to a “Yes, I am hungry” response, and/or positively responds by engaging in eating at the suggested restaurant, as assessed by a device monitor, the overall model of that person as a late night eater may be updated, and the actual time, location, and positive restaurant response may, or may not, be permanently stored, or real-time cached for a period sufficient to allow for an updating of the overall model to include “late-night eater”.
  • the information provided to the virtual database is preferably not directly accessible outside of services provided by the present invention, or outside of those providing the services and/or apparatus of the present invention, to thereby ensure privacy of information, and may, in certain embodiments, not be forwarded to third parties for purposes not approved by a user.
  • Information may additionally be protected, for example, through the use of data encrypting or proxy servers, such as over links, including those links between network 106 and virtual database 104 .
  • the virtual database 104 thus may include personal habit, travel, buying, and other highly tailored information criteria for each user within the database 104 , to thereby allow for targeting by searcher 126 , or may include minimal information necessary to identify at least one user for message targeting by searcher 126 . If the user does not provide all necessary and/or desired information to the database 104 , such as wherein the user is reluctant to provide such information, a heuristic model within and/or in communication with the database 104 may collect behavioral data of the user via the communicative transactions with the communication monitors 116 , 122 , for example, or may access generally available data, and may use this information to estimate user responses to unanswered and/or unasked questions.
  • the heuristic model adaptively modifies the virtual database 104 , in accordance with user behavior, such as in accordance with known similar behavior patterns.
  • the heuristic model adapts the virtual database 104 to the actual transactional behavior of the user, or to an estimated transactional behavior based upon the actual transactional behavior. For example, by knowing the location of the home and office of a user, the heuristic model may estimate a route that the user may travel from office to home, and thereby may prompt generation of a traffic alert message to that user in accordance with traffic information assessed, for example, via the searcher 126 , in accordance with the heuristically generated data, as set forth more fully hereinbelow.
  • the heuristic model may include, for example, a plurality of databases including heuristic data, accessible to at least one database including user specific data, which access may be provided relationally, such as through a comparator, for example.
  • FIG. 2 a block diagram is shown illustrating, with more particularity, a virtual database 104 for use in the system of FIG. 1.
  • the database of FIG. 2 includes a plurality of network and/or device interfaces 204 , 206 , 212 , a searcher interface 208 , a storage database 210 , and a controller 202 .
  • the controller 202 may control operation of the virtual database 104 , and entry of information passing to the virtual database into storage database 210 .
  • the controller may be a controller known to those skilled in the art, such as a DSP, comparator, bus controller, or the like, for example.
  • the controller may be resident as hardware or software, as will be apparent to those skilled in the art, and may be programmable.
  • the controller 202 accesses data from at least one data source within, and/or associated with, the virtual database 104 .
  • the storage database 210 is controlled by controller 202 , and may include data entered by a user, and/or data obtained via the transaction monitors 122 , 116 , and/or may include an overall model of the user, and/or may include a cache for the temporary storage of incoming information.
  • the cache may retain the data within the storage database at least until the updating of the overall model.
  • the user may enter data via the controller 202 by, for example, entry over a network interface 204 , such as by typing or voice over-IP, or entry over a wireless interface 206 , such as by voice recognition or keypad entry on a cellular telephone 108 .
  • Data entry may be performed by the user in response to a data entry menu, or similar data entry request.
  • a data entry request may be presented to the user upon a first use of a device, such as in response to entry of a username and/or password, or upon each use of the device.
  • the data entry menu may provide for multiple choice answers, or multiple choice selections, for at least one polling questions, such as “are you hungry: Y or N?”, and answers may be selected by click and select, by key press, by a drop down menu, and/or by voice recognition.
  • the data entry menu may allow for entry of any data, such as by text response, numeric response, or speaking response.
  • Data entry may include, for example, a direct data entry, a user request for search entry, or modification of current data by the user.
  • Network interface 204 may be in communication with controller 202 , and may be connected via link 105 to provide access to information entered, for example, by the user, such as from a personal computer or a device monitor.
  • Controller 202 may accept information from a wireless communication device via, for example, link 112 and the wireless data interface 206 , as interactive input, as entered data, or as data batched data at, or directly from, a device monitor, such as a base station 110 or a time and location monitor 116 .
  • Controller 202 may additionally accept information from the time and location monitor 116 via a dedicated time and location interface 212 , such as time and location of at least one transaction. This time and location may be assessed directly, or over the network, by the monitor 116 .
  • the user may utilize the wireless device to access profile information and enter a preference for black shoes to be purchased every 2 months. If the user is to receive a targeted message about a particular item, such as, for example, the shoes, the user may enter the word “shoes” into the wireless device, and interface 206 may accept that information as a search request data entry, pass the information to the search interface 208 , and may accept a returned messages from the searcher 126 , wherein a tailored message or advertisement is returned to the user in accordance with black shoes, and may additionally be targeted at a shoe purchase within two months of a previous shoe purchase.
  • a targeted message about a particular item such as, for example, the shoes
  • the user may enter the word “shoes” into the wireless device, and interface 206 may accept that information as a search request data entry, pass the information to the search interface 208 , and may accept a returned messages from the searcher 126 , wherein a tailored message or advertisement is returned to the user in accordance with black shoes, and may additionally be targeted at
  • This information may additionally be generated heuristically, such as wherein the heuristic model within the virtual database 104 assesses that the user makes a call from a location proximate to a given shoe store approximately every two months, and, according to the transaction monitor 122 , purchases black shoes every two months, and therefore the user is estimated to purchase black shoes from that given shoe store every two months, thus necessitating a targeted message from searcher 126 regarding those shoes in that time frame at that location.
  • a search for targeted messages may be performed by searcher 126 , in accordance with the information, in order to locate black shoes on sale at that store in the two month interval, and in order to convey the results of that search to the user.
  • the targeted message sent to the user was confirmed as received by the user, and was recorded as acted upon by the user, such as by the monitoring of a purchase transaction, that selection may be entered as a preference in the storage database 210 , such as by entry into the overall model for that user.
  • the controller 202 and/or the storage database 210 may include therewithin a simulator of human responses, such as a heuristic modeler 226 .
  • This heuristic modeler 226 may be programmed as software, and may have associated therewith a plurality of comparison information, or may include hardware, such as a comparator, in conjunction with the programming, or may reside in hardware only.
  • the controller may cause a simulation of selection of data, which selection may be based on known user preferences, and may interpret that simulated selection data in order to predict the actions of a person associated with those known preferences in the storage database 210 .
  • Heuristic predictions may thus be based on the data gathered by the user input, and/or user transaction monitoring, entered by controller 202 to storage database 210 .
  • the controller 202 may cause the storage database to assess that the user is a fan of Padres baseball, by comparison to data of other parties that engage in similar transactions, and may consequently cause, via searcher interface 208 , a search to be performed by searcher 126 as to whether the Padres are playing a game, that day, in San Diego. If that search results in an affirmative response, a targeted message may be sent to that user suggesting a trip to a Padres game that evening.
  • the heuristic model may be co-located in the controller 202 and the storage database 210 , and may include a plurality of predictive rules as to human behavior.
  • the heuristic model may accept direct data, as well as monitored data obtained by monitoring the transactions, locations, such as times of transmissions and/or transactions from and by the user, such as from the wireless device 108 .
  • a weighting may be assigned to actual direct data and transaction monitoring data, such as approximately 80% for a particular user, in the overall model. This percentage may be dependent, for example, on the amount of information about that user currently available within the storage database 210 .
  • the 80% weighting may be adjusted to reflect that only 20% of the direct data desired is available. In such an embodiment, the 80% weighting might be adjusted to a 16% weight (80% ⁇ 20%).
  • the remaining percentage of the overall model may be heuristically defined, such as by the application of the plurality of predictive rules within the storage database 210 and/or the controller 202 , by the controller 202 , to the direct and monitored data.
  • the predictive rules may include, for example, data on known general behavioral patterns of other persons, which general behavioral data may be gained by data entry to the controller, such as by a system controller, by monitoring, such as over the internet, by financial monitoring, such as monitoring of all purchases by a category of persons, or by monitoring of multiple users of the system of the present invention, for example.
  • the overall model may thus be used to generate a probabilistically desirable search for the searcher 126 on behalf of the user.
  • Probabilistic entries may, for example, be generated by subjecting to a statistical probability analysis, as will be known to those skilled in the art, data resident in the storage database 210 , as compared to, for example, the predictive rules on general behavior.
  • a plurality of statistical databases may be included in the storage database 210 , and such databases may be relational in form. For example, an entry may be made that includes information that 80% of all persons interested in art are also interested in theater.
  • This probabilistic data may be entered, via the controller 202 , to the storage database 210 by, for example, a controller interface, wherein the relations and the data entered are of interest to the targeted message generators, such as vendors. These relations of interest may be directly entered by a targeted message generator programmer, or by at least one vendor via a vendor access 129 , for example, or may be assessed via, for example, an automated internet data search, such as a spidering search.
  • the monitor 116 may repeatedly locate a user as being within a local art museum, such as by monitoring cell phone call origination location, or by monitoring purchase of museum tickets, for example. This repeated locating may implicate a rule that, if a user is assessed as being at an art museum more than twice in a two week time period, that user is interested in art.
  • the controller may then apply the heuristic rule stated hereinabove to assess that there is an 80% chance that the particular user repeatedly located in the art museum is also interested in theater, and, in response to this high probability, the controller may generate a command to the searcher to search for theater performances at a given time, such as 30 minutes after the museum closes, in a given area, such as within 2 miles of the art museum.
  • the predictive rule may not only be implicated, but additionally may be “intelligently” applied in a manner to allow for sufficient time for a then-current activity to end, or sufficient time for user convenience, such as by assessing the proximity of the two perceived locations of interest.
  • the heuristic rule may state that 80% of all persons eat dinner between 6 pm and 8 pm, and that 90% of all art museum patrons have an annual salary in excess of $60,000, and that 70% of all patrons of 4 star and 5 star restaurants also have an annual salary in excess of $60,000, and that 90% of all art museums close between 5 pm and 6 pm, and, consequently, that there is a 45% probability (80% ⁇ 90% ⁇ 70% ⁇ 90%) that a search should be generated for a targeted message to the current user at the museum for a 4 or 5 star restaurant, within 5 miles of the art museum, between 6 pm and 7 pm.
  • This heuristic model that contributes to the overall model may additionally include limitations as to minimum probabilities, such as 50% or greater, before a search is allowed to be generated.
  • the heuristic modeler may include a series of inter-related relational databases.
  • An actual user characteristic obtained from the user, and/or via device monitor may be used to locate a high probability event in a first database.
  • Location of a high probability event in the first database may cause the location, within the storage database, of relationally high probability events in that first database, or other of the inter-related databases.
  • data may be taken as to the location of a user at certain times of the day, week or month. If the time and location of the user is assessed as periodic, statistical analysis may draw a conclusion from the data, and may enter the conclusion as new data into the storage database 210 . That is, if the data indicates that it is statistically significant that a user will be in a certain location at a specific day and time, that conclusion may be entered into the storage database 210 as data associated with an appropriate probability. That data and the resulting probability of that event may then be accessed as included in an overall model by the search engine 126 .
  • the highest probability of success for a targeted message occurs if the location or interests or needs or desires of the user can be predicted at a specific time, and if only the most relevant messages are transmitted to the user at, or slightly prior to, that predicted time.
  • heuristic model statistical analysis within the overall model in the storage database 210 may be used to predict the locations, interests, needs, and/or desires of the user to within a specific probability, and to target messages accordingly. Should the user engage in behavior not predicted by the heuristic model of the overall model, the probability of the predicted event may be adjusted appropriately based upon the actual user behavior recorded in the direct and monitored data of the overall model within the storage database 210 .
  • a Kalman filter predictor predicts the error of a prediction as compared to data actually encountered.
  • the error of a prediction is in the occurrence or non-occurrence of a user engaging in a predicted transaction, or the user being at a predicted location. If the user changes patterns significantly, the heuristic estimations and the probability of the estimated occurrence may be corrected to bring the prediction within acceptable error, such as in accordance with known Kalman filters. Also in accordance with known error prediction filters, the predictive error decreases as more actual observation data is gained in the present invention.
  • select types of user periodic behavior may be predicted with very high accuracy through the use of the present invention, and such high accuracy periodic behaviors may improve the predictive error of other behaviors.
  • the occurrence of anniversaries and birthdates for family, friends, and business associates once known to the storage database 210 , can be predicted with high accuracy, and are predictably recurrent. As such, these events may have a probability of nearly 1.0 within the overall model.
  • the recurrent nature of the anniversary allows for a high probability prediction that the anniversary will occur again on the following October 25, and the monitored behavior leads to a prediction that flowers will be desired, and, as such, a direction may be forwarded via the searcher interface 208 to search for messages regarding flowers, such as in a then-current location of the user.
  • the controller 202 may sort, classify, and/or store data entered by the user, and entered by the transaction monitors.
  • the controller 202 may additionally cause the generation of, sort, classify, and/or store, predictive data resulting from the transactions of the user, and the probabilities related thereto.
  • These actions of the controller form the overall model of the particular user in virtual space, which virtual user is stored in the storage database 210 .
  • the stored data of the storage database 210 may be used to generate messages through delegation by the controller 202 to the searcher 126 .
  • the controller 202 utilizes the searcher interface 208 , via link 128 , to access the searcher.
  • the controller may be in communication with the monitor interfaces 204 , 206 , 212 , and the searcher interface 208 , over, for example, a bus architecture including a bus 214 with interfaces 215 a - f , thereby providing direct access by the monitor interfaces and the searcher interface to the overall model in the storage database 210 .
  • the storage database 210 may allow for a plurality of input modes, selectable by the data gatherer, or by the user.
  • a data input mode the user may add, delete, or modify user data in the storage database 210 .
  • a menu for the user may be presented by the controller in accordance with the selected input mode, and may allow the user to select the category of information that the user wishes to change or enter. Once a data category is selected, the user may be provided with any existing data for review.
  • the user may then enter new or modified information, using methodologies apparent to those skilled in the art, such as a mouse, keyboard, keypad, stylus, or voice, for example, on a networked computer, personal digital assistant, or wireless communications device, for example.
  • methodologies apparent to those skilled in the art such as a mouse, keyboard, keypad, stylus, or voice, for example, on a networked computer, personal digital assistant, or wireless communications device, for example.
  • Other data entry formats and methodologies will be apparent to those skilled in the art.
  • a message request mode or search mode
  • the controller may forward the request to the searcher via the searcher interface 208 , similarly to an embodiment wherein a search request is hueristically generated.
  • the transference of the query to the searcher from the controller 202 is preferably transparent to the user.
  • the user may enter a specific, or a general, message request, via interfaces known to those skilled in the art, which request may be forwarded to controller 202 via device interfaces 204 , 206 .
  • the user may enter a request for an advertisement for “pizza”.
  • the nearest pizza parlor to the then-current location of the user that is open at the current time, as assessed, for example, via the time and location monitor 116 over the interface 212 , that can accommodate the user, might then be returned from the searcher 126 , via interfaces 208 and 206 , in response to the query.
  • a targeted message regarding a suit from a local retailer might be provided, wherein the location of the local retailer, the hours of operation of the retailer, and the type of suit available from the retailer might be in accordance with the overall model.
  • the present invention processes a message request via the searcher 126 , which message request may be controlled directly by the user, and/or may be controlled in accordance with the overall model, and via the controller 202 , as set forth hereinabove.
  • Vendor data access 129 is also preferably in communication with, and/or exerts control over, the virtual database 104 .
  • Vendor data access 129 may include information for messages and advertisements, as entered and/or controlled by vendors, and is preferably accessible by searcher 126 via link 127 .
  • Vendor data access 129 may include, for example, databases, such as in relational format, links, such as internet links or hyper-links, or other textual information.
  • Vendor data access 129 may be a compilation of vendor supplied data that is available for searcher 126 use, and the vendor data therein may be prioritized for return in a search by searcher 126 .
  • each participating vendor may pay a fee, and the amount of the fee paid may allow a vendor access to vendor data access 129 , or may cause a particular vendor to be returned in the first position in response to a particular search, a particular vendor to be returned second, and so on.
  • particular vendors may have a “most favored”, or a “more favored” status.
  • Vendors subscribing may provide specific messages, and/or may provide basic data for generation of messages by searcher 126 .
  • a vendor may provide data, for example, via a network connection to a network site 132 , or via an alternative link 134 , such as a wireless link, such that a vendor may push data into the vendor data access.
  • the vendor data access 129 may query the vendor via connections 132 , 134 for updated messages.
  • Links 132 , 134 may tie one or more vendors to a private or semi-private network, such as for vendor data polling.
  • vendors may enter particular characteristics of users to which the vendors wish to target messages, such as particular characteristics in storage database 210 . More current data, and more current targeting data, from a vendor will, in general, generate a more positive response by users to messages from vendors.
  • Searcher 126 preferably utilizes the overall model to respond to, and/or to predict, the needs or desires of the user. For example, if it is known by the storage database 210 that the user gets a haircut once every five weeks, a prediction may be made in the overall model within the virtual database 104 as to when the next haircut is needed, and a search may be generated for the searcher 126 , either automatically, such as every 4 weeks, or in accordance with a user request.
  • the search generated may be for any haircut vendors, such as by accessing an internet search or an internet search engine by searcher 126 , for any hair cut vendors having a targeted message, for local vendors having a targeted messages, or for any local vendors, and may particularly be for local vendors offering specific discounts, and/or for local vendors within 5 miles of the home of the user, or local vendors within 5 miles of the then-current location of the user, and/or local vendors specializing in a particular style of haircut, for example.
  • the instructions for these priorities for the search are forwarded by the controller 202 , and may be in accordance with user instructions, and/or in accordance with data in the storage database 210 entered by the user and/or heuristically generated, such as data in the overall model.
  • Matching results having sufficient probabilities, may be returned by the searcher 126 .
  • the searcher 126 may present all matching results, or may weight results for presentation, or may weight results for pseudo-random selection.
  • a first matching result may receive two points for return, due to the payment of a higher fee by the providing vendor, for example, and second and third vendors may each receive one point for return, due to the payment of lower fees by the providing respective vendors.
  • the first vendor may have a 50% chance of random selection (2 points out of 4 total), and the second and third vendors may each have a 25% chance of selection (1 point each out of the 4 total).
  • FIG. 3 is a block diagram illustrating an exemplary embodiment of the searcher 126 .
  • the searcher 126 is accessible to, and may be controlled by, virtual database 104 .
  • the searcher 126 may include filter 302 that identifies messages relevant to an inquiry, and that may tailor messages to a particular request or to a particular user profile.
  • the filter 302 accesses vendor data or basic message information from subscribing vendors at vendor access 129 via the vendor data interface 304 , and may access generally available information, such as internet information, over interface 306 .
  • the internet interface 306 may be utilized to access general information from the internet such as weather information, transportation schedules, and accident reports, either by a search performed by filter 302 , or by accessing available internet search engines known to those skilled in the art. Data that is accessed may be placed into memory 308 for accessibility, such as for subsequent searches, in order to expedite those subsequent searches.
  • Memory 308 may be any memory apparent to those skilled in the art, such as a cache, RAM, ROM, or the like.
  • the virtual database interface 310 of searcher 126 may communicate with the virtual database 104 via link 128 , and may communicate directly with storage database 210 .
  • Link 128 may include a buffer for buffering requested, or pushed, user data.
  • a message buffer 312 may store, include, or construct a message, or a targeted message, from a vendor or other data source.
  • a bus 313 using links 313 a - f may be used to interconnect the elements of the searcher 126 .
  • the filter 302 may scan available resources, such as vendor services, and may locate opportunities for advertisements or messages in accordance with instructions received from controller 202 . It will be apparent to those skilled in the art that searcher 126 may include a controller independent from controller 202 , or that controller 202 may be included entirely within, or partially within, the searcher, rather than entirely within the virtual database 104 .
  • the filter 302 may filter search results in accordance with additional received instructions, in addition to the search instruction or request, such as time, date, location, hours of operation, or transaction type constraints, which additional instructions may be accessed from vendor-entered data, such as in a database separate from search instructions.
  • the filter 302 may acquire these additional instructions at any time prior to, or simultaneously with, generation of a search result, such as upon entry by the user, or by a vendor, upon assessment by a device monitor, or concurrently with receipt of the search instruction.
  • the additional instructions may be stored in the message buffer 312 .
  • the time and location of the user, and the location of at least one vendor, and the operating hours of that vendor may be necessary in order to assess the availability of vendor messages from that vendor to that user on a search topic.
  • additional instructions may include that messages may be available, with priority granted to the most current messages, such that the current time and location of the user may optimally be proximate to the location and operating hours of the vendor or the services.
  • vendor messages may be matched with a location and the time of day, and/or with other additional instructions, and/or with at least one aspect of the overall model in the virtual database 104 , in order to match a potential message with the needs and/or desires of the user.
  • vendor access 129 may additionally be used to indirectly and continuously update the overall model in virtual database 104 .
  • the filter 302 may match a message against a probability of success of that message, based upon a perceived success of other or similar messages, in order to select a message.
  • a high probability is indicative of a high likelihood that the message may be favorably received by the user. For example, the messages having the highest probability of success may receive a highest priority for transmission to the user.
  • FIG. 4 is a flow diagram illustrating an exemplary heuristic method of performing message searches.
  • the method begins 400 with the building of the virtual database and overall model.
  • the user may log into a personal site to enter user information, and a controller may accept the data entries of the personal data 402 , and may store that information into the virtual database 410 .
  • the information in the virtual database may be analyzed 412 , and transactional habit and personal preference data and events may be extracted or extrapolated by a heuristic model.
  • the probability associated with a new behavior is calculated and appended to the derived data 418 , and the virtual data base and overall model are updated 420 .
  • an input may be accepted from the device information 404 , and time and location information 406 may be acquired. Time and location may be stored in the virtual database, or may be interactively exchanged to assess whether and/or when and/or where the user seeks to make a direct request for information 408 .
  • the controller may provide an interactive dialogue with the user on the wireless device.
  • This interactive exchange may include the presentation of mode selection 422 , or the acceptance of instructions for a topical or terminology search. If a search is requested, then a searcher may assume control of the exchange 424 in order to provide search functions.
  • FIG. 5 is a flow diagram illustrating a heuristic methodology for use in the present invention.
  • the controller assesses user time and location, and/or transaction, information 502 .
  • the searcher may be initiated automatically when the user device monitored in step 502 is activated. Activation may be defined as a turning-on, or the transmittal of a user action, such as a search, or a call or dial-in.
  • the controller may access vendor messages 504 via, for example, a vendor data access point.
  • the time and location and/or transactional data may be compared 506 with the available vendor messages, and a determination off message applicability may then be made.
  • the virtual model 508 may be accessed to gain insight into the applicability of the message to that user.
  • the results are compared 510 , and if a favorable match to the profile is available, the probability of success 512 of the message may be assessed.
  • the message may be constructed 514 and sent to the user communication device 516 .
  • the message may be personalized for the preferences or the needs of the user. For example, the format of the message may be adjusted to fit the display of the user communications device during construction 514 or issuance 516 .
  • the response by the user is awaited 518 for success or failure, such as by monitoring a transaction monitor at the vendor associated with the message, or by querying the user to assess an interest level of the user, to thereby provide system feedback. If received, the feedback is recorded 520 in order to assist in predicting future transactions.
  • the probability of success may be assessed differently with respect to different modes of operation, or different types of messages or advertisements.
  • automobile advertisements may be considered highly successful if the advertisements meet a 5% probability of success, while restaurant advertisements must meet a 30% probability of success.
  • messages may be sent freely, highest probability first, for example, due to the overall high probability that the user desires the information.
  • only messages meeting a minimum probability of success may be selected in an embodiment wherein a message is selected automatically, such as in accordance with a time, date, and location of the user.
  • the search capabilities of the present invention may include an open request mode, wherein the user requests delivery of messages associated with a term, and with the profile of that user, rather than searching for a specific term. For example, a user might enter the term “food”, and the search might proceed to locate restaurants, in the area then-local to the user, having messages available. Additionally, for example, if a user were in the East end of a town, and selected the open request mode, and entered a blank search, all advertisements of interest to that profile, location, and time might be located. If multiple messages were located, the messages might be sent to the user in a priority order based upon the relative probabilities of success.
  • assessing the location of the user in the present invention may be accomplished by a variety of methods, as will be apparent to those skilled in the art, such as, but not limited to, a global positioning system, geo-location using triangulation, such as with telephone towers, internet IP addresses, and/or landline telephone caller identifications.
  • assessing the time of user transactions and predictions may be accomplished in a variety of ways, as will be apparent to those of ordinary skill in the art, such as by a device clock in communication with a device monitor, an external system clock, internet time, or global position time.

Abstract

A system and method for providing a personalized advertisement for a good or service for display to a user is described. The system includes a communications device operated by the user; a virtual person database comprising information about the user; and a search engine useful for finding advertisements of interest to the user and generating personalized advertisements for display on the communications device. The method includes the steps of storing data concerning the user in a virtual person database wherein the database, searching the virtual person database and accessing at least one vendor's advertisement, selecting at least one vendor's advertisement based on time and location of the communications device and content of the virtual database, personalizing the advertisement to target the user, transmitting the personalized advertisement to the user's communications device, and updating the virtual person database upon the response of the advertisement by the user.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • This application claims priority to U.S. Provisional Patent Application Serial No. 60/398,215, filed Jul. 23, 2002.[0001]
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention [0002]
  • The invention relates to the adaptive behavior in a communications device, and, more specifically, to the personalization of, and targeting of content, such as advertisements, to, a mobile communication device. [0003]
  • 2. Description of the Background [0004]
  • The sending of messages, content, and/or advertisements for products and services to potential consumers, such as via handheld wireless communication devices, is well known. These messages, content, and/or advertisements are, in general, sent with the hope that the received message, content, or advertisement will be relevant to the needs of the handheld wireless device user, and thus will generate a desired response from the user, such as by a purchase by the user of the advertised product. Messages or content may be targeted to a potential consumer based, for example, on the location of the wireless device. These messages may provide the consumer with advertisements for the local community wherein the handheld wireless device is located, for example. [0005]
  • Unfortunately, messages and advertisements may be ignored by the potential customer due to a lack of then-current interest in the product or service. This may result from a poor selection of messages and/or advertisements, such as messages and/or advertisements for products or services that the potential consumer does not need or desire. Improvement to the targeting is necessary to more effectively select messages that have a greater probability of being favorably received by the consumer. This improvement in targeting necessitates an increased knowledge of the potential customer's buying habits, interests, background, advertising responsiveness, location, and schedule. [0006]
  • Thus, a need exists to improve knowledge of a customer's buying habits, interests, background, advertising responsiveness, location, schedule, and propensities in order to more effectively target messages and/or advertisements to the customer operating a communications device. [0007]
  • SUMMARY OF THE INVENTION
  • A targeting system for adapting a device to a user is disclosed. The targeting system includes at least one communications device in communication with at least one network, a virtual database accessible to at least one of the at least one communications device over the at least one network, and a searcher that provides content to the communications device over the at least one network, in accordance with the virtual database. The at least one communications device may include a wireless communications device. [0008]
  • A communication network for providing a personalized targeted message to a user is disclosed. The network includes a communications device operated by the user, a virtual database including at least one characteristic about the user, a searcher having access to a plurality of targeted messages and to the virtual database, wherein the searcher filters at least one of the targeted messages that is of interest to the user according to at least one of the at least one characteristics, and wherein the searcher communicates the at least one targeted message of interest to the communications device for provision to the user. [0009]
  • A method of targeting content to a user of a communications devices is disclosed. The method includes building a virtual database of information regarding the user, modeling at least one probabilistic behavior of the user, in accordance with the virtual database, searching for content targeted to the at least one modeled probabilistic behavior, and providing the content to the communications device. [0010]
  • Thus, the present invention provides improved knowledge of a customer's buying habits, interests, background, advertising responsiveness, location, schedule, and propensities in order to more effectively target messages, content, and/or advertisements to the customer operating a communications device.[0011]
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Understanding of the present invention will be facilitated by consideration of the following detailed description of the present invention taken in conjunction with the accompanying drawings, in which like numerals refer to like parts, and wherein: [0012]
  • FIG. 1 is a block diagram of the present invention; [0013]
  • FIG. 2 is a block diagram of the present invention; [0014]
  • FIG. 3 is a block diagram of the present invention; and [0015]
  • FIG. 4 is a flow diagram of the present invention.[0016]
  • DETAILED DESCRIPTION OF THE INVENTION
  • It is to be understood that the figures and descriptions of the present invention have been simplified to illustrate elements that are relevant for a clear understanding of the present invention, while eliminating, for purposes of clarity, many other elements found in a typical communications system and method. Those of ordinary skill in the art will recognize that other elements are desirable and/or required in order to implement the present invention. However, because such elements are well known in the art, and because they do not facilitate a better understanding of the present invention, a discussion of such elements is not provided herein. [0017]
  • FIG. 1 is a block diagram illustrating a targeting system for adapting a device to a user. The targeting system may include a communications device in communication with a network, such as an internet, an intranet, a direct dial-in network, a wireless network, or the like, a virtual database, which may include a heuristic modeler, a virtual searcher, and a content filter. [0018]
  • The [0019] communication device 102, 108, 124 displays personalized messages, content, and/or advertisements to the user of the device. The communication device may be a computer, television, wireless device, or the like, for example. The wireless device 108 may be, for example, a cellular telephone, a programmable digital assistant, a short range wireless device, or other wireless device, such as a web-enabled wireless device. The wireless device 108 may preferably be a mobile, hand-held device, although it may be a laptop computer having a wireless modem, for example. Additionally, the communications device may be a terminal-only device, such as a television set or network terminal.
  • Use of the [0020] communication device 102, 108, 124 may populate the virtual database 104, which may include a heuristic modeler. A virtual database, as used herein, may include, for example, a database, a relational database, a database server, a server farm, or the like. Searcher 126 produces information relevant to the user in accordance with information in database 104. Information may be entered into the virtual database 104 over network 106, such as by the user, such as via a personal computer, or other type of computer terminal, connecting to a network access point, such as access point 103, 125, such as an internet connection, and thereby connecting to network 106. A virtual database interface 105 may communicatively connect the virtual database to the network 106, via, for example, a one or a two way communicative connection. It should be noted that although the network 106 is shown as a single line with a distinct number of nodes, it will be apparent to one skilled in the art that a network, such as the internet, may have a great number of available nodes, ports and/or lines. For example, the user may, via the network 106, log onto a site that is associated with and/or communicatively connected to the virtual database 104 via any available methodology, and may subsequently be allowed to generate a personal profile for storage into the virtual database 104. More specifically, for example, the user may communicate with the virtual database 104 via the air interface link 114 via the wireless base station 110 via the network 106. The air interface link may be, for example, an RF, optical, or other format or protocol known to those of skill in the art.
  • Information about a device, such as [0021] wireless device 108, may be exchanged between an intermediary, such as the wireless base station 110, and a time and location monitor 116, via a link 118. It will be apparent to those skilled in the art that link 118 may be a wired link, wherein the time and location monitor is co-located located with, for example, the base station 110, or may be a networked or wireless link. The time and location monitor 116 may provide time and/or location information to the virtual database 104 over a link, such as link 120, as will be apparent to those skilled in the art. This time and/or location information may relate to the then-current time and location of a device, such as wireless device, as assessed at the wireless device 108, or at the at least one base station 110, or may relate to a batched history of time and/or location information for at least one device, such as wireless device 108. Time and/or location information may include times of telephone operation, time of calls, time of calls to particular numbers, and/or time of calls for particularly assessed purposes, or time of internet use, or time of internet sites visited, or times of television watching, or particular television programs watched at particular times, or particular channels watched at particular times, and/or location at which, or to which, activities occur, thereby allowing for the virtual database 104 to include time and position sensitive information, such as patterns of travel over time, or approximate hours of awakening, sleeping, working, playing, and the like, or when, to where, how often, and to whom cellular calls are made, or emails are sent, for example.
  • Time and location monitor [0022] 116 is an exemplary embodiment of a monitoring device 122. A monitoring device 122 may include, for example, a web-enabled device, or a wireless device, or a T1 or other hard-wired connection device, such as a television channel monitoring device, to record the activity on a television 124 in order to provide information on viewing habits, for example, or a telephone monitor to record telephonic activity, such as over a landline telephone 124, or an internet monitor to record internet viewing habits over a computer 124, or a purchasing monitor, such as a credit card machine 124, to track purchases at a particular store or stores by a particular user or users, or a monitor to track inter-relations between users, such as by telephone or over the internet. Communications device, such as device 124, may provide data to the monitoring device 122 via a link, such as link 123, via, for example, a wireless or a hard-wired connection. Monitoring device 122 may provide data to the virtual database 104 via link 125, such as an internet link 125 through the network 106. A networked link, or a non-wired link, or a non-networked link, including an RF or optical link, may couple the monitor 122 to the virtual database 104. The data provided may include, for example, portions of television programs, or television advertisements or internet advertisements, viewed, skipped over, or fast-forwarded through, such as via the use of tracking technologies, such as TiVo®, for example. Device monitors will be apparent to those of ordinary skill in the art, and each device monitor may include therein, for example, at least one database, such as a relational database, and/or at least one storage memory, and/or at least one batching memory.
  • [0023] Virtual database 104 may include therein a plurality of memories, processors, databases, comparators, or models, such as at least one overall model of at least one user, for example. Virtual database 104 may house data collected from user input on communications devices 108, 102, 124, and/or data on actual transactions of the user using the devices, as assessed via monitors 116, 122. The virtual database 104 may additionally include user profile information, wherein the user is uniquely known based on the user profile information, and wherein the profile information is entered by the user, such as in response to a series of registration questions to register for wireless service, or internet service, or internet site and/or over a wireless device, or wherein the profile information is entered, for example, by a registration agent receiving information from a registering user. User information may include the name, address, date of birth, marital status, economic, social, education, and/or responses to additional questions that will be apparent to those skilled in the art. Alternatively, the use of user profile questions may be minimized in an embodiment wherein certain user information may be hueristically estimated, as set forth further hereinbelow, or wherein the maintenance of detailed personal information is not desired. For example, in certain embodiments of the invention herein, detailed personal information necessary may be minimized, such as wherein the invention employs only age, or only location, or only time information to make decisions on the needs and/or desires of the user, such as decisions on desired searches of the user. Data forwarded to the database 104 may be permanently stored, or may be real time cached, such that actual incoming data is stored only for a time period necessary to update an overall model within the virtual database, as set forth more fully hereinbelow.
  • Questions may be posed from and/or by the [0024] virtual database 104 to discover information and trends about buying habits or interests, such as questions inquiring about the typical mode of dress, or hobbies, for a user. Questions may additionally include the time, content and location of meals normally eaten by the user, or the time and location of hobbies that the user enjoys, for example. Questions may additionally include the timing, location, and frequency of services that the user usually employs, such as hair care, automobile maintenance, home improvement or maintenance, dry cleaning, food service, pet grooming, home or office cleaning, and/or banking services, for example. Additional questions may include the geography and timing of daily travels, such as a work and home location, or repetitious visitations to friends, family, business associates, and the like. Questions may, for example, assess specific tastes in certain products, such as shoes, clothing, meals, housing, types of flowers or other gifts for family, friends, or business associates, or the special dates that the user may deem important such as birthdates, anniversaries, graduation dates, vacations and holidays. Other question types will be apparent to those skilled in the art.
  • Responses to questions may be permanently stored, such that questions need not be responded to repeatedly, and questions may be updated, or new questions may be added, periodically. Alternatively, question responses may be used only to build an overall model, as discussed hereinbelow, and those responses that change or contribute to the overall model may not be stored apart from the changes to the overall model. Additionally, as set forth hereinabove and hereinbelow, certain questions may be eliminated in an embodiment wherein responses to certain questions may be heuristically estimated, or questions may be minimized or eliminated in an embodiment wherein minimal information is necessary, or wherein a majority of information is automatically or heuristically provided, in order to provide the overall model for selection of a particular search. For example, a user may be located as to time and geography, as set forth hereinabove, and may be asked only whether the user is hungry. If the user replies with a restaurant suggestion request, or if the user automatically receives a restaurant suggestion message in response to a “Yes, I am hungry” response, and/or positively responds by engaging in eating at the suggested restaurant, as assessed by a device monitor, the overall model of that person as a late night eater may be updated, and the actual time, location, and positive restaurant response may, or may not, be permanently stored, or real-time cached for a period sufficient to allow for an updating of the overall model to include “late-night eater”. [0025]
  • It will be apparent to those skilled in the art that privacy of profile information is protected in the present invention, using methodologies known to those skilled in the art. For example, the information provided to the virtual database is preferably not directly accessible outside of services provided by the present invention, or outside of those providing the services and/or apparatus of the present invention, to thereby ensure privacy of information, and may, in certain embodiments, not be forwarded to third parties for purposes not approved by a user. Information may additionally be protected, for example, through the use of data encrypting or proxy servers, such as over links, including those links between [0026] network 106 and virtual database 104.
  • The [0027] virtual database 104 thus may include personal habit, travel, buying, and other highly tailored information criteria for each user within the database 104, to thereby allow for targeting by searcher 126, or may include minimal information necessary to identify at least one user for message targeting by searcher 126. If the user does not provide all necessary and/or desired information to the database 104, such as wherein the user is reluctant to provide such information, a heuristic model within and/or in communication with the database 104 may collect behavioral data of the user via the communicative transactions with the communication monitors 116, 122, for example, or may access generally available data, and may use this information to estimate user responses to unanswered and/or unasked questions. The heuristic model adaptively modifies the virtual database 104, in accordance with user behavior, such as in accordance with known similar behavior patterns. The heuristic model adapts the virtual database 104 to the actual transactional behavior of the user, or to an estimated transactional behavior based upon the actual transactional behavior. For example, by knowing the location of the home and office of a user, the heuristic model may estimate a route that the user may travel from office to home, and thereby may prompt generation of a traffic alert message to that user in accordance with traffic information assessed, for example, via the searcher 126, in accordance with the heuristically generated data, as set forth more fully hereinbelow. The heuristic model may include, for example, a plurality of databases including heuristic data, accessible to at least one database including user specific data, which access may be provided relationally, such as through a comparator, for example.
  • Referring now to FIG. 2, a block diagram is shown illustrating, with more particularity, a [0028] virtual database 104 for use in the system of FIG. 1. The database of FIG. 2 includes a plurality of network and/or device interfaces 204, 206, 212, a searcher interface 208, a storage database 210, and a controller 202.
  • The [0029] controller 202 may control operation of the virtual database 104, and entry of information passing to the virtual database into storage database 210. The controller may be a controller known to those skilled in the art, such as a DSP, comparator, bus controller, or the like, for example. The controller may be resident as hardware or software, as will be apparent to those skilled in the art, and may be programmable. The controller 202 accesses data from at least one data source within, and/or associated with, the virtual database 104. For example, the storage database 210 is controlled by controller 202, and may include data entered by a user, and/or data obtained via the transaction monitors 122, 116, and/or may include an overall model of the user, and/or may include a cache for the temporary storage of incoming information. The cache may retain the data within the storage database at least until the updating of the overall model. The user may enter data via the controller 202 by, for example, entry over a network interface 204, such as by typing or voice over-IP, or entry over a wireless interface 206, such as by voice recognition or keypad entry on a cellular telephone 108. Data entry may be performed by the user in response to a data entry menu, or similar data entry request. A data entry request may be presented to the user upon a first use of a device, such as in response to entry of a username and/or password, or upon each use of the device. The data entry menu may provide for multiple choice answers, or multiple choice selections, for at least one polling questions, such as “are you hungry: Y or N?”, and answers may be selected by click and select, by key press, by a drop down menu, and/or by voice recognition. The data entry menu may allow for entry of any data, such as by text response, numeric response, or speaking response. Data entry may include, for example, a direct data entry, a user request for search entry, or modification of current data by the user.
  • [0030] Network interface 204 may be in communication with controller 202, and may be connected via link 105 to provide access to information entered, for example, by the user, such as from a personal computer or a device monitor. Controller 202 may accept information from a wireless communication device via, for example, link 112 and the wireless data interface 206, as interactive input, as entered data, or as data batched data at, or directly from, a device monitor, such as a base station 110 or a time and location monitor 116. Controller 202 may additionally accept information from the time and location monitor 116 via a dedicated time and location interface 212, such as time and location of at least one transaction. This time and location may be assessed directly, or over the network, by the monitor 116.
  • For example, the user may utilize the wireless device to access profile information and enter a preference for black shoes to be purchased every 2 months. If the user is to receive a targeted message about a particular item, such as, for example, the shoes, the user may enter the word “shoes” into the wireless device, and [0031] interface 206 may accept that information as a search request data entry, pass the information to the search interface 208, and may accept a returned messages from the searcher 126, wherein a tailored message or advertisement is returned to the user in accordance with black shoes, and may additionally be targeted at a shoe purchase within two months of a previous shoe purchase. This information may additionally be generated heuristically, such as wherein the heuristic model within the virtual database 104 assesses that the user makes a call from a location proximate to a given shoe store approximately every two months, and, according to the transaction monitor 122, purchases black shoes every two months, and therefore the user is estimated to purchase black shoes from that given shoe store every two months, thus necessitating a targeted message from searcher 126 regarding those shoes in that time frame at that location. A search for targeted messages may be performed by searcher 126, in accordance with the information, in order to locate black shoes on sale at that store in the two month interval, and in order to convey the results of that search to the user. Alternatively, if the targeted message sent to the user was confirmed as received by the user, and was recorded as acted upon by the user, such as by the monitoring of a purchase transaction, that selection may be entered as a preference in the storage database 210, such as by entry into the overall model for that user.
  • The [0032] controller 202 and/or the storage database 210 may include therewithin a simulator of human responses, such as a heuristic modeler 226. This heuristic modeler 226 may be programmed as software, and may have associated therewith a plurality of comparison information, or may include hardware, such as a comparator, in conjunction with the programming, or may reside in hardware only. In the example hereinabove, the controller may cause a simulation of selection of data, which selection may be based on known user preferences, and may interpret that simulated selection data in order to predict the actions of a person associated with those known preferences in the storage database 210. Heuristic predictions may thus be based on the data gathered by the user input, and/or user transaction monitoring, entered by controller 202 to storage database 210. For example, for a user that has entered that a hobby is baseball, and/or that has recently purchased a baseball card for a player on the San Diego Padres baseball team, and/or that frequently watches or listens to San Diego Padres baseball game telecasts on radio, television, or internet, according to the transaction monitoring, and that is then-present in San Diego, according to the time and location monitor, the controller 202 may cause the storage database to assess that the user is a fan of Padres baseball, by comparison to data of other parties that engage in similar transactions, and may consequently cause, via searcher interface 208, a search to be performed by searcher 126 as to whether the Padres are playing a game, that day, in San Diego. If that search results in an affirmative response, a targeted message may be sent to that user suggesting a trip to a Padres game that evening.
  • The heuristic model may be co-located in the [0033] controller 202 and the storage database 210, and may include a plurality of predictive rules as to human behavior. The heuristic model may accept direct data, as well as monitored data obtained by monitoring the transactions, locations, such as times of transmissions and/or transactions from and by the user, such as from the wireless device 108. In an exemplary embodiment, a weighting may be assigned to actual direct data and transaction monitoring data, such as approximately 80% for a particular user, in the overall model. This percentage may be dependent, for example, on the amount of information about that user currently available within the storage database 210. For example, if only two data items are present with respect to a particular user, and wherein ten data items are desired for the overall model, the 80% weighting may be adjusted to reflect that only 20% of the direct data desired is available. In such an embodiment, the 80% weighting might be adjusted to a 16% weight (80%×20%). The remaining percentage of the overall model may be heuristically defined, such as by the application of the plurality of predictive rules within the storage database 210 and/or the controller 202, by the controller 202, to the direct and monitored data. The predictive rules may include, for example, data on known general behavioral patterns of other persons, which general behavioral data may be gained by data entry to the controller, such as by a system controller, by monitoring, such as over the internet, by financial monitoring, such as monitoring of all purchases by a category of persons, or by monitoring of multiple users of the system of the present invention, for example. The overall model may thus be used to generate a probabilistically desirable search for the searcher 126 on behalf of the user.
  • Probabilistic entries may, for example, be generated by subjecting to a statistical probability analysis, as will be known to those skilled in the art, data resident in the storage database [0034] 210, as compared to, for example, the predictive rules on general behavior. For example, a plurality of statistical databases may be included in the storage database 210, and such databases may be relational in form. For example, an entry may be made that includes information that 80% of all persons interested in art are also interested in theater. This probabilistic data may be entered, via the controller 202, to the storage database 210 by, for example, a controller interface, wherein the relations and the data entered are of interest to the targeted message generators, such as vendors. These relations of interest may be directly entered by a targeted message generator programmer, or by at least one vendor via a vendor access 129, for example, or may be assessed via, for example, an automated internet data search, such as a spidering search.
  • In the example hereinabove, the monitor [0035] 116 may repeatedly locate a user as being within a local art museum, such as by monitoring cell phone call origination location, or by monitoring purchase of museum tickets, for example. This repeated locating may implicate a rule that, if a user is assessed as being at an art museum more than twice in a two week time period, that user is interested in art. The controller may then apply the heuristic rule stated hereinabove to assess that there is an 80% chance that the particular user repeatedly located in the art museum is also interested in theater, and, in response to this high probability, the controller may generate a command to the searcher to search for theater performances at a given time, such as 30 minutes after the museum closes, in a given area, such as within 2 miles of the art museum. Thus, the predictive rule may not only be implicated, but additionally may be “intelligently” applied in a manner to allow for sufficient time for a then-current activity to end, or sufficient time for user convenience, such as by assessing the proximity of the two perceived locations of interest. For example, the heuristic rule may state that 80% of all persons eat dinner between 6 pm and 8 pm, and that 90% of all art museum patrons have an annual salary in excess of $60,000, and that 70% of all patrons of 4 star and 5 star restaurants also have an annual salary in excess of $60,000, and that 90% of all art museums close between 5 pm and 6 pm, and, consequently, that there is a 45% probability (80%×90% ×70%×90%) that a search should be generated for a targeted message to the current user at the museum for a 4 or 5 star restaurant, within 5 miles of the art museum, between 6 pm and 7 pm. This heuristic model that contributes to the overall model may additionally include limitations as to minimum probabilities, such as 50% or greater, before a search is allowed to be generated.
  • For example, the heuristic modeler may include a series of inter-related relational databases. An actual user characteristic obtained from the user, and/or via device monitor may be used to locate a high probability event in a first database. Location of a high probability event in the first database may cause the location, within the storage database, of relationally high probability events in that first database, or other of the inter-related databases. [0036]
  • In an exemplary embodiment, data may be taken as to the location of a user at certain times of the day, week or month. If the time and location of the user is assessed as periodic, statistical analysis may draw a conclusion from the data, and may enter the conclusion as new data into the storage database [0037] 210. That is, if the data indicates that it is statistically significant that a user will be in a certain location at a specific day and time, that conclusion may be entered into the storage database 210 as data associated with an appropriate probability. That data and the resulting probability of that event may then be accessed as included in an overall model by the search engine 126.
  • In general, the highest probability of success for a targeted message occurs if the location or interests or needs or desires of the user can be predicted at a specific time, and if only the most relevant messages are transmitted to the user at, or slightly prior to, that predicted time. Thus, heuristic model statistical analysis within the overall model in the storage database [0038] 210 may be used to predict the locations, interests, needs, and/or desires of the user to within a specific probability, and to target messages accordingly. Should the user engage in behavior not predicted by the heuristic model of the overall model, the probability of the predicted event may be adjusted appropriately based upon the actual user behavior recorded in the direct and monitored data of the overall model within the storage database 210.
  • A Kalman filter predictor predicts the error of a prediction as compared to data actually encountered. In the case of the [0039] virtual database 104, the error of a prediction is in the occurrence or non-occurrence of a user engaging in a predicted transaction, or the user being at a predicted location. If the user changes patterns significantly, the heuristic estimations and the probability of the estimated occurrence may be corrected to bring the prediction within acceptable error, such as in accordance with known Kalman filters. Also in accordance with known error prediction filters, the predictive error decreases as more actual observation data is gained in the present invention.
  • In general, select types of user periodic behavior may be predicted with very high accuracy through the use of the present invention, and such high accuracy periodic behaviors may improve the predictive error of other behaviors. For example, the occurrence of anniversaries and birthdates for family, friends, and business associates, once known to the storage database [0040] 210, can be predicted with high accuracy, and are predictably recurrent. As such, these events may have a probability of nearly 1.0 within the overall model. In an exemplary embodiment wherein an anniversary occurs on October 25, and flowers are purchased for two consecutive anniversaries, the recurrent nature of the anniversary allows for a high probability prediction that the anniversary will occur again on the following October 25, and the monitored behavior leads to a prediction that flowers will be desired, and, as such, a direction may be forwarded via the searcher interface 208 to search for messages regarding flowers, such as in a then-current location of the user.
  • The [0041] controller 202 may sort, classify, and/or store data entered by the user, and entered by the transaction monitors. The controller 202 may additionally cause the generation of, sort, classify, and/or store, predictive data resulting from the transactions of the user, and the probabilities related thereto. These actions of the controller form the overall model of the particular user in virtual space, which virtual user is stored in the storage database 210. The stored data of the storage database 210 may be used to generate messages through delegation by the controller 202 to the searcher 126. In order to generate a delegation to the searcher, the controller 202 utilizes the searcher interface 208, via link 128, to access the searcher. The controller may be in communication with the monitor interfaces 204, 206, 212, and the searcher interface 208, over, for example, a bus architecture including a bus 214 with interfaces 215 a-f, thereby providing direct access by the monitor interfaces and the searcher interface to the overall model in the storage database 210.
  • As set forth hereinabove, the storage database [0042] 210, in conjunction with controller 202, may allow for a plurality of input modes, selectable by the data gatherer, or by the user. In a data input mode, the user may add, delete, or modify user data in the storage database 210. A menu for the user may be presented by the controller in accordance with the selected input mode, and may allow the user to select the category of information that the user wishes to change or enter. Once a data category is selected, the user may be provided with any existing data for review. The user may then enter new or modified information, using methodologies apparent to those skilled in the art, such as a mouse, keyboard, keypad, stylus, or voice, for example, on a networked computer, personal digital assistant, or wireless communications device, for example. Other data entry formats and methodologies will be apparent to those skilled in the art.
  • In a message request mode, or search mode, the user may wish to make a query. It should be noted that, wherein the user enters a query, the controller may forward the request to the searcher via the [0043] searcher interface 208, similarly to an embodiment wherein a search request is hueristically generated. The transference of the query to the searcher from the controller 202 is preferably transparent to the user. The user may enter a specific, or a general, message request, via interfaces known to those skilled in the art, which request may be forwarded to controller 202 via device interfaces 204, 206. For example, the user may enter a request for an advertisement for “pizza”. The nearest pizza parlor to the then-current location of the user, that is open at the current time, as assessed, for example, via the time and location monitor 116 over the interface 212, that can accommodate the user, might then be returned from the searcher 126, via interfaces 208 and 206, in response to the query. Additionally, for example, if the user entered the word “suit”, a targeted message regarding a suit from a local retailer might be provided, wherein the location of the local retailer, the hours of operation of the retailer, and the type of suit available from the retailer might be in accordance with the overall model.
  • Returning now to FIG. 1, the present invention processes a message request via the [0044] searcher 126, which message request may be controlled directly by the user, and/or may be controlled in accordance with the overall model, and via the controller 202, as set forth hereinabove. Vendor data access 129 is also preferably in communication with, and/or exerts control over, the virtual database 104.
  • [0045] Vendor data access 129 may include information for messages and advertisements, as entered and/or controlled by vendors, and is preferably accessible by searcher 126 via link 127. Vendor data access 129 may include, for example, databases, such as in relational format, links, such as internet links or hyper-links, or other textual information. Vendor data access 129 may be a compilation of vendor supplied data that is available for searcher 126 use, and the vendor data therein may be prioritized for return in a search by searcher 126. For example, each participating vendor may pay a fee, and the amount of the fee paid may allow a vendor access to vendor data access 129, or may cause a particular vendor to be returned in the first position in response to a particular search, a particular vendor to be returned second, and so on. Thus, particular vendors may have a “most favored”, or a “more favored” status. Vendors subscribing may provide specific messages, and/or may provide basic data for generation of messages by searcher 126. A vendor may provide data, for example, via a network connection to a network site 132, or via an alternative link 134, such as a wireless link, such that a vendor may push data into the vendor data access. Alternatively, the vendor data access 129 may query the vendor via connections 132, 134 for updated messages. Links 132, 134 may tie one or more vendors to a private or semi-private network, such as for vendor data polling. Additionally, vendors may enter particular characteristics of users to which the vendors wish to target messages, such as particular characteristics in storage database 210. More current data, and more current targeting data, from a vendor will, in general, generate a more positive response by users to messages from vendors.
  • [0046] Searcher 126 preferably utilizes the overall model to respond to, and/or to predict, the needs or desires of the user. For example, if it is known by the storage database 210 that the user gets a haircut once every five weeks, a prediction may be made in the overall model within the virtual database 104 as to when the next haircut is needed, and a search may be generated for the searcher 126, either automatically, such as every 4 weeks, or in accordance with a user request. The search generated may be for any haircut vendors, such as by accessing an internet search or an internet search engine by searcher 126, for any hair cut vendors having a targeted message, for local vendors having a targeted messages, or for any local vendors, and may particularly be for local vendors offering specific discounts, and/or for local vendors within 5 miles of the home of the user, or local vendors within 5 miles of the then-current location of the user, and/or local vendors specializing in a particular style of haircut, for example. The instructions for these priorities for the search are forwarded by the controller 202, and may be in accordance with user instructions, and/or in accordance with data in the storage database 210 entered by the user and/or heuristically generated, such as data in the overall model.
  • Matching results, having sufficient probabilities, may be returned by the [0047] searcher 126. The searcher 126 may present all matching results, or may weight results for presentation, or may weight results for pseudo-random selection. For example, a first matching result may receive two points for return, due to the payment of a higher fee by the providing vendor, for example, and second and third vendors may each receive one point for return, due to the payment of lower fees by the providing respective vendors. Thus, in an embodiment wherein a single message is to be returned, the first vendor may have a 50% chance of random selection (2 points out of 4 total), and the second and third vendors may each have a 25% chance of selection (1 point each out of the 4 total).
  • FIG. 3 is a block diagram illustrating an exemplary embodiment of the [0048] searcher 126. The searcher 126 is accessible to, and may be controlled by, virtual database 104. The searcher 126 may include filter 302 that identifies messages relevant to an inquiry, and that may tailor messages to a particular request or to a particular user profile. The filter 302 accesses vendor data or basic message information from subscribing vendors at vendor access 129 via the vendor data interface 304, and may access generally available information, such as internet information, over interface 306. The internet interface 306 may be utilized to access general information from the internet such as weather information, transportation schedules, and accident reports, either by a search performed by filter 302, or by accessing available internet search engines known to those skilled in the art. Data that is accessed may be placed into memory 308 for accessibility, such as for subsequent searches, in order to expedite those subsequent searches. Memory 308 may be any memory apparent to those skilled in the art, such as a cache, RAM, ROM, or the like.
  • The [0049] virtual database interface 310 of searcher 126 may communicate with the virtual database 104 via link 128, and may communicate directly with storage database 210. Link 128 may include a buffer for buffering requested, or pushed, user data. A message buffer 312 may store, include, or construct a message, or a targeted message, from a vendor or other data source. A bus 313 using links 313 a-f may be used to interconnect the elements of the searcher 126.
  • The [0050] filter 302 may scan available resources, such as vendor services, and may locate opportunities for advertisements or messages in accordance with instructions received from controller 202. It will be apparent to those skilled in the art that searcher 126 may include a controller independent from controller 202, or that controller 202 may be included entirely within, or partially within, the searcher, rather than entirely within the virtual database 104. The filter 302 may filter search results in accordance with additional received instructions, in addition to the search instruction or request, such as time, date, location, hours of operation, or transaction type constraints, which additional instructions may be accessed from vendor-entered data, such as in a database separate from search instructions. The filter 302 may acquire these additional instructions at any time prior to, or simultaneously with, generation of a search result, such as upon entry by the user, or by a vendor, upon assessment by a device monitor, or concurrently with receipt of the search instruction. In an embodiment wherein the additional instructions are received prior to the search instruction, the additional instructions may be stored in the message buffer 312. In an exemplary embodiment of additional instructions, the time and location of the user, and the location of at least one vendor, and the operating hours of that vendor, may be necessary in order to assess the availability of vendor messages from that vendor to that user on a search topic. For example, additional instructions may include that messages may be available, with priority granted to the most current messages, such that the current time and location of the user may optimally be proximate to the location and operating hours of the vendor or the services.
  • Thus, available vendor messages may be matched with a location and the time of day, and/or with other additional instructions, and/or with at least one aspect of the overall model in the [0051] virtual database 104, in order to match a potential message with the needs and/or desires of the user. As user response to messages may be tracked by the vendors, such as by the device monitors, vendor access 129 may additionally be used to indirectly and continuously update the overall model in virtual database 104. Further, the filter 302 may match a message against a probability of success of that message, based upon a perceived success of other or similar messages, in order to select a message. A high probability is indicative of a high likelihood that the message may be favorably received by the user. For example, the messages having the highest probability of success may receive a highest priority for transmission to the user.
  • FIG. 4 is a flow diagram illustrating an exemplary heuristic method of performing message searches. The method begins [0052] 400 with the building of the virtual database and overall model. The user may log into a personal site to enter user information, and a controller may accept the data entries of the personal data 402, and may store that information into the virtual database 410. The information in the virtual database may be analyzed 412, and transactional habit and personal preference data and events may be extracted or extrapolated by a heuristic model. The probability associated with a new behavior is calculated and appended to the derived data 418, and the virtual data base and overall model are updated 420. Alternatively, an input may be accepted from the device information 404, and time and location information 406 may be acquired. Time and location may be stored in the virtual database, or may be interactively exchanged to assess whether and/or when and/or where the user seeks to make a direct request for information 408.
  • If a direct request is made [0053] 408, the controller may provide an interactive dialogue with the user on the wireless device. This interactive exchange may include the presentation of mode selection 422, or the acceptance of instructions for a topical or terminology search. If a search is requested, then a searcher may assume control of the exchange 424 in order to provide search functions.
  • FIG. 5 is a flow diagram illustrating a heuristic methodology for use in the present invention. Upon initiation [0054] 500, the controller assesses user time and location, and/or transaction, information 502. The searcher may be initiated automatically when the user device monitored in step 502 is activated. Activation may be defined as a turning-on, or the transmittal of a user action, such as a search, or a call or dial-in. The controller may access vendor messages 504 via, for example, a vendor data access point. The time and location and/or transactional data may be compared 506 with the available vendor messages, and a determination off message applicability may then be made. If the comparison results in a potential message, the virtual model 508 may be accessed to gain insight into the applicability of the message to that user. The results are compared 510, and if a favorable match to the profile is available, the probability of success 512 of the message may be assessed.
  • If the probability of a successful event is sufficiently high, the message may be constructed [0055] 514 and sent to the user communication device 516. Upon selection of a message, the message may be personalized for the preferences or the needs of the user. For example, the format of the message may be adjusted to fit the display of the user communications device during construction 514 or issuance 516. After the message is sent, the response by the user is awaited 518 for success or failure, such as by monitoring a transaction monitor at the vendor associated with the message, or by querying the user to assess an interest level of the user, to thereby provide system feedback. If received, the feedback is recorded 520 in order to assist in predicting future transactions.
  • It will be apparent to those skilled in the art that, in the course of selection and construction of messages, the probability of success may be assessed differently with respect to different modes of operation, or different types of messages or advertisements. For example, automobile advertisements may be considered highly successful if the advertisements meet a 5% probability of success, while restaurant advertisements must meet a 30% probability of success. Additionally, if the user requests an advertisement, messages may be sent freely, highest probability first, for example, due to the overall high probability that the user desires the information. On the other hand, only messages meeting a minimum probability of success may be selected in an embodiment wherein a message is selected automatically, such as in accordance with a time, date, and location of the user. [0056]
  • The search capabilities of the present invention may include an open request mode, wherein the user requests delivery of messages associated with a term, and with the profile of that user, rather than searching for a specific term. For example, a user might enter the term “food”, and the search might proceed to locate restaurants, in the area then-local to the user, having messages available. Additionally, for example, if a user were in the East end of a town, and selected the open request mode, and entered a blank search, all advertisements of interest to that profile, location, and time might be located. If multiple messages were located, the messages might be sent to the user in a priority order based upon the relative probabilities of success. [0057]
  • It will be noted that assessing the location of the user in the present invention may be accomplished by a variety of methods, as will be apparent to those skilled in the art, such as, but not limited to, a global positioning system, geo-location using triangulation, such as with telephone towers, internet IP addresses, and/or landline telephone caller identifications. Similarly, assessing the time of user transactions and predictions may be accomplished in a variety of ways, as will be apparent to those of ordinary skill in the art, such as by a device clock in communication with a device monitor, an external system clock, internet time, or global position time. [0058]
  • It will be apparent to those skilled in the art that various modifications and variations may be made in the apparatus and process of the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention cover the modification and variations of this invention provided that those modifications and variations come within the scope of the appended claims and the equivalents thereof. [0059]

Claims (105)

What is claimed is:
1. A targeting system for adapting a device to a user, comprising:
at least one communications device in communication with at least one network;
a virtual database accessible to at least one of said at least one communications device over the at least one network, wherein said virtual database comprises:
at least one actual user characteristic accepted over the at least one network; and
a heuristic modeler that generates at least one heuristic user characteristic in accordance with the at least one actual user characteristic; and
a searcher that provides content to said at least one of said at least one communications device over the at least one network, in accordance with said virtual database.
2. The targeting system of claim 1, wherein the at least one network comprises at least one selected from the group consisting of an internet, an intranet, a direct dial-in network, and a wireless network.
3. The targeting system of claim 1, wherein at least one of said at least one communications device comprises a wireless communications device.
4. The targeting system of claim 3, wherein said wireless communication device comprises at least one selected from the group consisting of a cellular telephone, a programmable digital assistant, a short range wireless device, a laptop having a modem, and a web-enabled wireless device.
5. The targeting system of claim 1, wherein at least one of said at least one communications device comprises at least one selected from the group consisting of a computer and a television.
6. The targeting system of claim 1, further comprising at least one monitor, wherein said at least one monitor monitors at least one of said at least one communications device, wherein said monitor is communicatively connected to said virtual database, and wherein at least one actual user characteristic is varied in accordance with at least one output of said at least one monitor.
7. The targeting system of claim 6, wherein said at least one monitor comprises at least one selected from the group consisting of a time monitor and a location monitor.
8. The targeting system of claim 6, wherein said monitor provides at least one actual characteristic comprising at least one selected from the group consisting of time of activity information, and position of activity information, current time information, current position information, and behavioral pattern information.
9. The targeting system of claim 6, wherein at least two of the at least one actual user characteristic are batched prior to acceptance over the at least one network by said virtual database.
10. The targeting system of claim 6, wherein said at least one monitor records at least one selected from the group consisting of activity on a television, on a telephone monitor, on the at least one network, and on a purchasing point.
11. The targeting system of claim 6, wherein said at least one monitor comprises at least one selected from the group consisting of a database, at least one storage memory, and at least one batching memory.
12. The targeting system of claim 1, wherein the at least one actual user characteristic is accepted from the user.
13. The targeting system of claim 12, comprising at least two of the at least one actual user characteristic, wherein the at least two actual user characteristics comprise at least one user profile accepted from the user over the at least one network by said virtual database.
14. The targeting system of claim 12, further comprising an access restrictor that restricts access to the at least one user profile.
15. The targeting system of claim 1, wherein said virtual database is two-way accessible to said at least one of said at least one communications device over the at least one network.
16. The targeting system of claim 1, wherein said virtual database comprises at least one memory, at least one processor, at least one database, and at least one comparator.
17. The targeting system of claim 1, wherein said virtual database comprises a real-time cache, and wherein at least one of the at least one actual user characteristic is real-time cached in the real-time cache.
18. The targeting system of claim 1, wherein said virtual database comprises at least one inquiry generator, wherein at least one of the at least one actual user characteristic is generated responsively to a response by the user to an inquiry from the at least one inquiry generator.
19. The targeting system of claim 18, wherein the response is permanently stored within said virtual database.
20. The targeting system of claim 18, wherein the response is temporarily stored to form, in conjunction with the at least one heuristic user characteristic, an overall model of the user within said virtual database.
21. The targeting system of claim 18, wherein the inquiry generator comprises a monitor for monitoring at least one of said at least one communications device, and wherein the response by the user comprises an activity monitored by the monitor.
22. The targeting system of claim 1, wherein the heuristic modeler comprises at least two interrelated relational database.
23. The targeting system of claim 1, wherein said virtual database comprises:
at least one network interface to the at least one network;
a plurality of device interfaces to a plurality of communications devices;
a searcher interface to said searcher;
a storage database comprising the at least one actual user characteristic and the at least one heuristic user characteristic; and
a controller communicatively connected to the at least one network interface, the plurality of device interfaces, the searcher interface, and the storage database.
24. The targeting system of claim 23, wherein the controller controls information passing to the storage database.
25. The targeting system of claim 24, wherein the controller comprises at least one selected from the group consisting of a DSP, a comparator, and a bus controller.
26. The targeting system of claim 24, wherein the controller passes the information to the storage database by at least one selected from the group consisting of text, voice over-IP, and data streaming.
27. The targeting system of claim 1, wherein the at least one actual user characteristic comprises a search request from the user for said searcher.
28. The targeting system of claim 1, wherein said virtual database weights the at least one actual user characteristic and the at least one heuristic user characteristic.
29. The targeting system of claim 28, wherein the at least one actual user characteristic is weighted 80%, and wherein the at least one heuristic user characteristic is weighted 20%.
30. The targeting system of claim 1, wherein the heuristic modeler comprises a plurality of predictive rules in accordance with general behavioral patterns of persons other than the user.
31. The targeting system of claim 30, wherein the general behavioral patterns are directly entered to the heuristic modeler.
32. The targeting system of claim 30, wherein the general behavioral patterns are monitored by the heuristic modeler.
33. The targeting system of claim 30, wherein said virtual database instructs said searcher in accordance with a statistical probability output of the heuristic modeler, in accordance with a comparison of the at least one actual user characteristic and the predictive rules.
34. The targeting system of claim 33, wherein the statistical probability analysis is updated in accordance with a user behavior responsive to the content provided to the user by the searcher.
35. The targeting system of claim 23, wherein said virtual database further comprises an input mode selector.
36. The targeting system of claim 35, wherein the input mode selector is controllable by the user.
37. The targeting system of claim 35, wherein the input mode selector comprises a data input mode.
38. The targeting system of claim 35, wherein the input mode selector comprises a message request mode.
39. The targeting system of claim 35, wherein the input mode selector comprises a search mode.
40. The targeting system of claim 39, wherein the search mode is an automated search mode generated in accordance with the heuristic modeler.
41. The targeting system of claim 1, further comprising a vendor data access in communication with said virtual database.
42. The targeting system of claim 41, wherein said vendor data access comprises a plurality of messages entered by a plurality of vendors.
43. The targeting system of claim 42, wherein said vendor data access is in communication with said searcher, and wherein the content comprises at least one of the plurality of messages.
44. The targeting system of claim 43, wherein said vendor data access comprises at least one selected from the group consisting of a relational database and a hyperlink.
45. The targeting system of claim 43, wherein the content comprises at least two of the plurality of messages, and wherein the at least two messages are prioritized.
46. The targeting system of claim 45, wherein the at least two messages are prioritized in accordance with a fee paid by at least two of the vendors.
47. The targeting system of claim 45, wherein the at least two messages are prioritized in accordance with a probability of success of each of the at least two messages, according to the at least one heuristic user characteristic.
48. The targeting system of claim 43, wherein said vendor data access further comprises at least one of the at least one actual user characteristic and the at least one heuristic user characteristic, and wherein said searcher selects the content in accordance with the at least one of the at least one actual user characteristic and the at least one heuristic user characteristic in said vendor data access.
49. The targeting system of claim 1, wherein said searcher comprises a filter that identifies the content as relevant to at least one of said virtual database and said vendor data access.
50. The targeting system of claim 49, wherein the filter tailors the content to the user in accordance with said virtual database.
51. The targeting system of claim 49, wherein the filter comprises an internet interface, and wherein the internet interface accesses internet information responsive to said virtual database, and wherein the content comprises the accessed internet information.
52. The targeting system of claim 1, further comprising at least one user response monitor, wherein said at least one user response monitor updates said virtual database in accordance with a response of the user to the contents.
53. A system for providing a personalized targeted message to a user, comprising:
a communications device operated by the user;
a virtual database comprising at least one characteristic about said user;
a searcher having access to a plurality of targeted messages and to said virtual database, wherein said searcher filters at least one of the targeted messages that is of interest to the user according to at least one of the at least one characteristics; and
wherein said searcher communicates the at least one targeted message of interest to said communications device for provision to the user.
54. The system of claim 53, wherein said communications device comprises a wireless communications device.
55. The system of claim 54, wherein said wireless communications device is selected from the group consisting of a wireless telephone, a web-enabled programmable digital assistant, and a web-enabled personal computer.
56. The system of claim 53, wherein said virtual database comprises an overall model, wherein said overall model includes the at least one characteristic, and wherein at least one of the at least one characteristic is heuristically predicted.
57. The system of claim 56, wherein the at least one targeted message comprises at least one vendor advertisement, and wherein the at least one characteristic comprises at least one heuristically predicted characteristic and at least one actual characteristic, and wherein the interest assessed according to the at least one characteristic comprises an interest in purchasing from the at least one vendor advertisement.
58. An adaptive wireless communication device network, comprising:
a wireless communication device;
at least one first database comprising actual information entered by a user of the wireless device;
at least one second database comprising monitored information of behavior by the user of the wireless device;
at least one heuristic database comprising heuristically estimated information on user behavior, wherein the heuristically estimated information is estimated in accordance with said at least one first database and said at least one second database;
a searcher that performs a search in accordance with at least one of said at least one first database, said at least one second database, and said at least one heuristic database, and that returns a result of the search to said wireless device.
59. A method of targeting content to a user of a communications device, comprising:
building a virtual database of information regarding the user;
modeling at least one probabilistic behavior of the user, in accordance with the virtual database;
searching for content targeted to the at least one modeled probabilistic behavior; and
providing the content to the communications device.
60. The method of claim 59, wherein the communications device comprises a wireless communications device.
61. The method of claim 59, wherein said building comprises monitoring a plurality of information input by the user.
62. The method of claim 59, wherein said building comprises monitoring of transactions engaged in by the user.
63. The method of claim 62, wherein said monitoring comprises monitoring for positive responses by the user to the content provided.
64. The method of claim 61, 62, or 63, further comprising updating the virtual database in accordance with said monitoring.
65. The method of claim 59, wherein said building comprises monitoring a time and a location of the user.
66. The method of claim 59, wherein said building comprises batching the information, and accepting the information subsequent to said batching.
67. The method of claim 59, wherein said building comprises caching the information prior to said modeling.
68. The method of claim 67, wherein said caching comprises caching until said modeling, and deleting upon said modeling.
69. The method of claim 59, further comprising restricting access to the virtual database.
70. The method of claim 59, wherein said modeling comprises comparing the virtual database with general behavioral information.
71. The method of claim 59, further comprising accepting a search request from the user, wherein said searching is further in accordance with the search request.
72. The method of claim 59, further comprising accepting a heuristic search request in accordance with said modeling, wherein said searching is further in accordance with the heuristic search request.
73. The method of claim 72, further comprising limiting said providing of the content to content having a minimum modeled probability.
74. The method of claim 59, wherein said modeling comprises weighting actual data in the virtual database, monitored data in the virtual database in the virtual database, and heuristic data in the virtual database.
75. The method of claim 59, further comprising:
receiving at least one vendor instruction; and
targeting the content in accordance with the at least one received vendor instruction.
76. The method of claim 59, further comprising prioritizing the content in accordance with said modeling.
77. The method of claim 59, wherein said providing comprises tailoring the content to the user in accordance with the virtual database.
78. The method of claim 59, wherein said providing comprises tailoring the content to the communications device in accordance with the virtual database.
79. The method of claim 59, wherein said modeling comprises assessing transactional habit and personal preference data.
80. The method of claim 59, further comprising receiving feedback on the success of the content with the user, and updating said modeling in accordance with the feedback.
81. An adaptive message targeting system, comprising:
means for accepting a virtual database of information regarding the user;
means for modeling at least one probabilistic behavior of the user, in accordance with the virtual database;
means for searching for content targeted to the at least one modeled probabilistic behavior; and
means for providing the content to the communications device.
82. The targeting system of claim 81, wherein the communications device comprises a wireless communications device.
83. The targeting system of claim 81, wherein said means for accepting comprises means for monitoring a plurality of information input by the user.
84. The targeting system of claim 81, wherein said means for accepting comprises means for monitoring of transactions engaged in by the user.
85. The targeting system of claim 84, wherein said means for monitoring comprises means for monitoring for positive responses by the user to the content provided.
86. The targeting system of claim 81, wherein said means for accepting comprises means for monitoring a time and a location of the user.
87. The targeting system of claim 81, wherein said means for accepting comprises a real-time cache for the information.
88. The targeting system of claim 81, wherein said means for modeling comprises a database including general behavioral information.
89. The targeting system of claim 81, further comprising:
means for targeting the content in accordance with at least one vendor instruction.
90. The targeting system of claim 81, further comprising means for prioritizing the content in accordance with said means for modeling.
91. A virtual database for use in targeting messages to at least one user of a communications device, comprising:
at least one network interface to at least one network;
a plurality of device interfaces to at least one of the communications devices;
a searching interface;
a storage database comprising at least one actual user characteristic of the at least one user and the at least one heuristic user characteristic of the at least one user; and
a controller communicatively connected to the at least one network interface, the plurality of device interfaces, the searching interface, and the storage database;
wherein said controller generates the at least one heuristic user characteristic in accordance with the at least one actual user characteristic, and wherein said controller generates a search for the searching interface in accordance with at least one of the at least one heuristic user characteristic, the at least one actual user characteristic, a monitoring of the at least one network interface, and a monitoring of at least one of the plurality of device interfaces.
92. The virtual database of claim 91, wherein the controller controls information passing to the storage database from at least one of the at least one network interface, the plurality of device interfaces, the searching interface, and the storage database.
93. The virtual database of claim 92, wherein the controller comprises at least one selected from the group consisting of a DSP, a comparator, and a bus controller.
94. The virtual database of claim 92, wherein the controller passes the information to the storage database by at least one selected from the group consisting of text, voice over-IP, and data streaming.
95. The virtual database of claim 91, wherein the at least one actual user characteristic comprises a search request from the user to be performed by said searching interface.
96. The virtual database of claim 91, wherein the at least one heuristic user characteristic comprises a search request from the controller to be performed by said searching interface.
97. The virtual database of claim 91, wherein said controller instructs said searching interface in accordance with a statistical probability output of the at least one heuristic user characteristic, in accordance with a comparison to the at least one actual user characteristic.
98. The virtual database of claim 97, wherein the statistical probability output is updated in accordance with a user behavior responsive to content provided to the user by the searching interface.
99. The virtual database of claim 91, wherein said plurality of device interfaces comprises device monitoring interfaces that monitor user behavior on at least two of the communications devices.
100. The virtual database of claim 99, wherein the user behavior is monitored for a television.
101. The virtual database of claim 99, wherein the user behavior is monitored for a computer.
102. The virtual database of claim 99, wherein the user behavior is monitored for a wireless telephone.
103. A searcher for use in targeting messages to at least one user of a wireless communications device, comprising:
a first data bank of user characteristics, wherein said first data bank includes at least one user characteristic entered by the user, and at least one user characteristic monitored by a device monitor monitoring the wireless communications device;
a comparator communicatively connected to said first data bank;
a second data bank of objective characteristics communicatively connected to said comparator, wherein the objective characteristics are compared to the user characteristics by said comparator for a probabilistic message target;
an available content data bank including available content;
a content filter communicatively connected to said comparator and to said available content data bank, wherein the content filter accesses the available content, and filters the available content in accordance with the probabilistic message target output from said comparator;
wherein the filtered available content is displayed to the user on the wireless communications device.
104. The searcher of claim 103, wherein the said available content data bank comprises network content.
105. The searcher of claim 104, wherein the network content comprises internet content.
US10/624,085 2002-07-23 2003-07-21 System and method for an adaptive user communications device Abandoned US20040147265A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/624,085 US20040147265A1 (en) 2002-07-23 2003-07-21 System and method for an adaptive user communications device
US13/166,708 US8965871B2 (en) 2002-07-23 2011-06-22 System and method for providing targeted content to a user based on user characteristics

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US39821502P 2002-07-23 2002-07-23
US10/624,085 US20040147265A1 (en) 2002-07-23 2003-07-21 System and method for an adaptive user communications device

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US13/166,708 Continuation US8965871B2 (en) 2002-07-23 2011-06-22 System and method for providing targeted content to a user based on user characteristics

Publications (1)

Publication Number Publication Date
US20040147265A1 true US20040147265A1 (en) 2004-07-29

Family

ID=32738030

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/624,085 Abandoned US20040147265A1 (en) 2002-07-23 2003-07-21 System and method for an adaptive user communications device
US13/166,708 Expired - Fee Related US8965871B2 (en) 2002-07-23 2011-06-22 System and method for providing targeted content to a user based on user characteristics

Family Applications After (1)

Application Number Title Priority Date Filing Date
US13/166,708 Expired - Fee Related US8965871B2 (en) 2002-07-23 2011-06-22 System and method for providing targeted content to a user based on user characteristics

Country Status (1)

Country Link
US (2) US20040147265A1 (en)

Cited By (48)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050192014A1 (en) * 2004-02-24 2005-09-01 Lucent Technologies Inc. Wireless communication network for processing call traffic over a backhaul network
US20050267810A1 (en) * 2004-06-01 2005-12-01 Zhiliang Zheng System, method and computer program product for organizing items for presentment to a user
US20050267820A1 (en) * 2004-06-01 2005-12-01 Zhiliang Zheng System, method and computer program product for finding customer orientated advertisements
US20050267809A1 (en) * 2004-06-01 2005-12-01 Zhiliang Zheng System, method and computer program product for presenting advertising alerts to a user
US20060002532A1 (en) * 2004-06-30 2006-01-05 Microsoft Corporation Methods and interfaces for probing and understanding behaviors of alerting and filtering systems based on models and simulation from logs
US20060041478A1 (en) * 2004-06-01 2006-02-23 Zhiliang Zheng Universal network market system
US20060041476A1 (en) * 2004-08-17 2006-02-23 Zhiliang Zheng System and method for providing an expert platform
US20060041477A1 (en) * 2004-08-17 2006-02-23 Zhiliang Zheng System and method for providing targeted information to users
US20060100926A1 (en) * 2004-11-11 2006-05-11 International Business Machines Corp. On demand advertising
US20070021065A1 (en) * 2005-07-22 2007-01-25 Sengupta Uttam K Methods and apparatus for operating an ensemble of wireless electronic devices based on user activity
WO2007038761A2 (en) * 2005-09-28 2007-04-05 Feeva, Inc. Systems and methods of network operation and information processing, including data acquisition, processing and provision and/or interoperability features
US20080032666A1 (en) * 2006-08-07 2008-02-07 Microsoft Corporation Location based notification services
EP1895461A1 (en) * 2005-06-23 2008-03-05 Sony Corporation Electronic advertisement system
EP1898351A1 (en) * 2005-06-23 2008-03-12 Sony Corporation Electronic advertisement system and its display control method
US20080141345A1 (en) * 2006-12-06 2008-06-12 Motorola, Inc. System and method for providing secure access to password-protected resources
US20080162627A1 (en) * 2006-12-27 2008-07-03 Nortel Networks Limited Using telecom data to enhance web interaction
US20080198995A1 (en) * 2006-11-14 2008-08-21 Mcgary Faith System and method for providing a search portal with enhanced results
US20080235090A1 (en) * 2007-03-23 2008-09-25 Olof Lundstrom Method and arrangement for managing personalized advertisements in a tv system
US20080250001A1 (en) * 2007-04-06 2008-10-09 Ntt Docomo, Inc. Method and System for Providing Information in Virtual Space
US20090203361A1 (en) * 2008-02-07 2009-08-13 Microsoft Corporation Providing relevant advertisements or other content based on a communications identifier
US20100169959A1 (en) * 2008-12-29 2010-07-01 Motorola, Inc. System and Method for Providing Secure Access to Password-Protected Resources
US20100241663A1 (en) * 2008-02-07 2010-09-23 Microsoft Corporation Providing content items selected based on context
US20110136442A1 (en) * 2009-12-09 2011-06-09 Echostar Technologies Llc Apparatus and methods for identifying a user of an entertainment device via a mobile communication device
US20110179435A1 (en) * 2005-12-29 2011-07-21 Charles Cordray Systems and methods for managing content
US8107940B1 (en) 2007-03-20 2012-01-31 Jackson Timothy R System and method for providing advertising on a mobile device
US20120079135A1 (en) * 2010-09-27 2012-03-29 T-Mobile Usa, Inc. Insertion of User Information into Headers to Enable Targeted Responses
US20120131136A1 (en) * 2002-07-23 2012-05-24 Mark Kelley System and method for providing targeted content to a user based on user characteristics
US8566871B2 (en) 1998-07-29 2013-10-22 Starsight Telecast, Inc. Multiple interactive electronic program guide system and methods
US8776111B1 (en) * 2009-10-08 2014-07-08 Prime Research Alliance E, Inc. Methods and systems for generating subscriber usage profiles in a multi-platform targeted advertising system
US8892495B2 (en) 1991-12-23 2014-11-18 Blanding Hovenweep, Llc Adaptive pattern recognition based controller apparatus and method and human-interface therefore
US9535563B2 (en) 1999-02-01 2017-01-03 Blanding Hovenweep, Llc Internet appliance system and method
US9996577B1 (en) 2015-02-11 2018-06-12 Quest Software Inc. Systems and methods for graphically filtering code call trees
US20180189341A1 (en) * 2009-05-08 2018-07-05 Google Llc Refining location estimates and reverse geocoding based on a user profile
US10187260B1 (en) 2015-05-29 2019-01-22 Quest Software Inc. Systems and methods for multilayer monitoring of network function virtualization architectures
US10200252B1 (en) 2015-09-18 2019-02-05 Quest Software Inc. Systems and methods for integrated modeling of monitored virtual desktop infrastructure systems
US10230601B1 (en) 2016-07-05 2019-03-12 Quest Software Inc. Systems and methods for integrated modeling and performance measurements of monitored virtual desktop infrastructure systems
US10250837B2 (en) 2012-12-05 2019-04-02 DISH Technologies L.L.C. User proximity recognition and hands-free control
US10291493B1 (en) * 2014-12-05 2019-05-14 Quest Software Inc. System and method for determining relevant computer performance events
US10333820B1 (en) 2012-10-23 2019-06-25 Quest Software Inc. System for inferring dependencies among computing systems
US10394778B2 (en) 2010-09-03 2019-08-27 Robert Lewis Jackson, JR. Minimal representation of connecting walks
US10817593B1 (en) * 2015-12-29 2020-10-27 Wells Fargo Bank, N.A. User information gathering and distribution system
US10990939B2 (en) * 2019-04-15 2021-04-27 Advanced New Technologies Co., Ltd. Method and device for voice broadcast
US11005738B1 (en) 2014-04-09 2021-05-11 Quest Software Inc. System and method for end-to-end response-time analysis
US11432149B1 (en) 2019-10-10 2022-08-30 Wells Fargo Bank, N.A. Self-sovereign identification via digital credentials for selected identity attributes
US11564015B2 (en) 2007-04-17 2023-01-24 Intent IQ, LLC Targeted television advertisements based on online behavior
US11610226B2 (en) 2006-06-16 2023-03-21 Almondnet, Inc. Condition-based method of directing electronic profile-based advertisements for display in ad space in video streams
US11831964B2 (en) 2007-12-31 2023-11-28 Intent IQ, LLC Avoiding directing online advertisements based on user interaction with television advertisements
US11974025B2 (en) 2023-06-07 2024-04-30 Intent IQ, LLC Targeted television advertisements based on online behavior

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101392936B1 (en) * 2012-06-29 2014-05-09 한국과학기술연구원 User Customizable Interface System and Implementing Method thereof
US8554873B1 (en) * 2012-10-05 2013-10-08 Google Inc. Custom event and attraction suggestions
US10242088B2 (en) * 2014-09-18 2019-03-26 Microsoft Technology Licensing, Llc Multi-source search
US10341317B2 (en) * 2014-10-20 2019-07-02 Yp Llc Systems and methods for implementing a personalized provider recommendation engine
US10963917B2 (en) * 2018-12-26 2021-03-30 Yandex Europe Ag Method and system for determining fact of visit of user to point of interest

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5761662A (en) * 1994-12-20 1998-06-02 Sun Microsystems, Inc. Personalized information retrieval using user-defined profile
US5809242A (en) * 1996-04-19 1998-09-15 Juno Online Services, L.P. Electronic mail system for displaying advertisement at local computer received from remote system while the local computer is off-line the remote system
US5855015A (en) * 1995-03-20 1998-12-29 Interval Research Corporation System and method for retrieval of hyperlinked information resources
US6311194B1 (en) * 2000-03-15 2001-10-30 Taalee, Inc. System and method for creating a semantic web and its applications in browsing, searching, profiling, personalization and advertising
US6327574B1 (en) * 1998-07-07 2001-12-04 Encirq Corporation Hierarchical models of consumer attributes for targeting content in a privacy-preserving manner
US6363419B1 (en) * 1999-04-05 2002-03-26 Openwave Systems Inc. Method and apparatus for generating idle loop screen displays on mobile wireless computing devices
US6493327B1 (en) * 1997-11-03 2002-12-10 Bellsouth Intellectual Property Corporation Market research using wireless subscription management
US6869018B2 (en) * 2000-07-31 2005-03-22 Reallegal, Llc Transcript management software and methods therefor

Family Cites Families (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5724521A (en) * 1994-11-03 1998-03-03 Intel Corporation Method and apparatus for providing electronic advertisements to end users in a consumer best-fit pricing manner
US6460036B1 (en) * 1994-11-29 2002-10-01 Pinpoint Incorporated System and method for providing customized electronic newspapers and target advertisements
WO1997043724A1 (en) * 1996-05-10 1997-11-20 Aim Corporation Message searching system and terminal
US20020049745A1 (en) * 1996-05-10 2002-04-25 Global Media Online, Inc. Maintaining most current client version
US5758938A (en) * 1996-07-24 1998-06-02 Stirling Thermal Motors, Inc. Solar concentrator elevational drive mechanism
US5909589A (en) * 1996-11-12 1999-06-01 Lance T. Parker Internet based training
US5812126A (en) * 1996-12-31 1998-09-22 Intel Corporation Method and apparatus for masquerading online
US5974398A (en) * 1997-04-11 1999-10-26 At&T Corp. Method and apparatus enabling valuation of user access of advertising carried by interactive information and entertainment services
US6134532A (en) * 1997-11-14 2000-10-17 Aptex Software, Inc. System and method for optimal adaptive matching of users to most relevant entity and information in real-time
US20020123928A1 (en) * 2001-01-11 2002-09-05 Eldering Charles A. Targeting ads to subscribers based on privacy-protected subscriber profiles
US7904187B2 (en) * 1999-02-01 2011-03-08 Hoffberg Steven M Internet appliance system and method
US7181438B1 (en) * 1999-07-21 2007-02-20 Alberti Anemometer, Llc Database access system
US7424439B1 (en) * 1999-09-22 2008-09-09 Microsoft Corporation Data mining for managing marketing resources
US7062510B1 (en) * 1999-12-02 2006-06-13 Prime Research Alliance E., Inc. Consumer profiling and advertisement selection system
US6944215B2 (en) * 2000-03-22 2005-09-13 Inter-Tel, Inc. Method and apparatus for transmitting data from an analogue modem to a digital modem through an analogue channel
US20020046102A1 (en) * 2000-04-24 2002-04-18 Dohring Doug Carl Method and system for including an advertisement in messages delivered by a character or characters
WO2002023444A1 (en) * 2000-09-15 2002-03-21 Mobliss, Inc. System for conducting user-specific promotional campaigns using multiple communications device platforms
US8302127B2 (en) * 2000-09-25 2012-10-30 Thomson Licensing System and method for personalized TV
US20020059387A1 (en) * 2000-09-26 2002-05-16 Wolfe Robert L. Method and apparatus for identifying user characteristics and device characteristics using a communication network
CA2326368A1 (en) * 2000-11-20 2002-05-20 Adexact Corporation Method and system for targeted content delivery, presentation, management, and reporting
JP2002277787A (en) * 2001-03-16 2002-09-25 Ricoh Co Ltd Optical scanner and image forming device
WO2002076077A1 (en) * 2001-03-16 2002-09-26 Leap Wireless International, Inc. Method and system for distributing content over a wireless communications system
US6907581B2 (en) * 2001-04-03 2005-06-14 Ramot At Tel Aviv University Ltd. Method and system for implicitly resolving pointing ambiguities in human-computer interaction (HCI)
US7007074B2 (en) * 2001-09-10 2006-02-28 Yahoo! Inc. Targeted advertisements using time-dependent key search terms
US7035863B2 (en) * 2001-11-13 2006-04-25 Koninklijke Philips Electronics N.V. Method, system and program product for populating a user profile based on existing user profiles
US20040147265A1 (en) * 2002-07-23 2004-07-29 Mark Kelley System and method for an adaptive user communications device
US7548928B1 (en) * 2005-08-05 2009-06-16 Google Inc. Data compression of large scale data stored in sparse tables

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5761662A (en) * 1994-12-20 1998-06-02 Sun Microsystems, Inc. Personalized information retrieval using user-defined profile
US5855015A (en) * 1995-03-20 1998-12-29 Interval Research Corporation System and method for retrieval of hyperlinked information resources
US5809242A (en) * 1996-04-19 1998-09-15 Juno Online Services, L.P. Electronic mail system for displaying advertisement at local computer received from remote system while the local computer is off-line the remote system
US6493327B1 (en) * 1997-11-03 2002-12-10 Bellsouth Intellectual Property Corporation Market research using wireless subscription management
US6327574B1 (en) * 1998-07-07 2001-12-04 Encirq Corporation Hierarchical models of consumer attributes for targeting content in a privacy-preserving manner
US6363419B1 (en) * 1999-04-05 2002-03-26 Openwave Systems Inc. Method and apparatus for generating idle loop screen displays on mobile wireless computing devices
US6311194B1 (en) * 2000-03-15 2001-10-30 Taalee, Inc. System and method for creating a semantic web and its applications in browsing, searching, profiling, personalization and advertising
US6869018B2 (en) * 2000-07-31 2005-03-22 Reallegal, Llc Transcript management software and methods therefor

Cited By (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8892495B2 (en) 1991-12-23 2014-11-18 Blanding Hovenweep, Llc Adaptive pattern recognition based controller apparatus and method and human-interface therefore
US8566871B2 (en) 1998-07-29 2013-10-22 Starsight Telecast, Inc. Multiple interactive electronic program guide system and methods
US9535563B2 (en) 1999-02-01 2017-01-03 Blanding Hovenweep, Llc Internet appliance system and method
US20120131136A1 (en) * 2002-07-23 2012-05-24 Mark Kelley System and method for providing targeted content to a user based on user characteristics
US8965871B2 (en) * 2002-07-23 2015-02-24 At&T Mobility Ii Llc System and method for providing targeted content to a user based on user characteristics
US20050192014A1 (en) * 2004-02-24 2005-09-01 Lucent Technologies Inc. Wireless communication network for processing call traffic over a backhaul network
US7215963B2 (en) * 2004-02-24 2007-05-08 Lucent Technolgies Inc. Wireless communication network for processing call traffic over a backhaul network
US20060041478A1 (en) * 2004-06-01 2006-02-23 Zhiliang Zheng Universal network market system
US20050267809A1 (en) * 2004-06-01 2005-12-01 Zhiliang Zheng System, method and computer program product for presenting advertising alerts to a user
US20050267810A1 (en) * 2004-06-01 2005-12-01 Zhiliang Zheng System, method and computer program product for organizing items for presentment to a user
US20050267820A1 (en) * 2004-06-01 2005-12-01 Zhiliang Zheng System, method and computer program product for finding customer orientated advertisements
US20060002532A1 (en) * 2004-06-30 2006-01-05 Microsoft Corporation Methods and interfaces for probing and understanding behaviors of alerting and filtering systems based on models and simulation from logs
US7664249B2 (en) * 2004-06-30 2010-02-16 Microsoft Corporation Methods and interfaces for probing and understanding behaviors of alerting and filtering systems based on models and simulation from logs
US20060041477A1 (en) * 2004-08-17 2006-02-23 Zhiliang Zheng System and method for providing targeted information to users
US20060041476A1 (en) * 2004-08-17 2006-02-23 Zhiliang Zheng System and method for providing an expert platform
US20060100926A1 (en) * 2004-11-11 2006-05-11 International Business Machines Corp. On demand advertising
US20090179733A1 (en) * 2005-06-23 2009-07-16 Sony Corporation Electronic advertisement system and its display control method
EP1898351A4 (en) * 2005-06-23 2010-07-07 Sony Corp Electronic advertisement system and its display control method
US20100223111A1 (en) * 2005-06-23 2010-09-02 Sony Corporation Electronic advertisement system
EP1895461A4 (en) * 2005-06-23 2010-06-30 Sony Corp Electronic advertisement system
EP1898351A1 (en) * 2005-06-23 2008-03-12 Sony Corporation Electronic advertisement system and its display control method
EP1895461A1 (en) * 2005-06-23 2008-03-05 Sony Corporation Electronic advertisement system
US20070021065A1 (en) * 2005-07-22 2007-01-25 Sengupta Uttam K Methods and apparatus for operating an ensemble of wireless electronic devices based on user activity
US7689167B2 (en) * 2005-07-22 2010-03-30 Intel Corporation Methods and apparatus for operating an ensemble of wireless electronic devices based on user activity
US20080263633A1 (en) * 2005-09-28 2008-10-23 Jasminder Banga Systems and Methods of Network Operation and Information Processing, Including Data Acquisition, Processing and Provision and/or Interoperability Features
WO2007038761A3 (en) * 2005-09-28 2008-10-16 Feeva Inc Systems and methods of network operation and information processing, including data acquisition, processing and provision and/or interoperability features
WO2007038761A2 (en) * 2005-09-28 2007-04-05 Feeva, Inc. Systems and methods of network operation and information processing, including data acquisition, processing and provision and/or interoperability features
US20110179435A1 (en) * 2005-12-29 2011-07-21 Charles Cordray Systems and methods for managing content
US11610226B2 (en) 2006-06-16 2023-03-21 Almondnet, Inc. Condition-based method of directing electronic profile-based advertisements for display in ad space in video streams
US11836759B2 (en) 2006-06-16 2023-12-05 Almondnet, Inc. Computer systems programmed to perform condition-based methods of directing electronic profile-based advertisements for display in ad space
US20080032666A1 (en) * 2006-08-07 2008-02-07 Microsoft Corporation Location based notification services
WO2008060573A3 (en) * 2006-11-14 2008-12-31 Grape Technology Group Inc System and method for providing a search portal with enhanced results
US20080198995A1 (en) * 2006-11-14 2008-08-21 Mcgary Faith System and method for providing a search portal with enhanced results
US20080141345A1 (en) * 2006-12-06 2008-06-12 Motorola, Inc. System and method for providing secure access to password-protected resources
US7958539B2 (en) 2006-12-06 2011-06-07 Motorola Mobility, Inc. System and method for providing secure access to password-protected resources
US20080162627A1 (en) * 2006-12-27 2008-07-03 Nortel Networks Limited Using telecom data to enhance web interaction
US8787895B2 (en) 2007-03-20 2014-07-22 Timothy R. Jackson System and method for providing advertising on a device
US8107940B1 (en) 2007-03-20 2012-01-31 Jackson Timothy R System and method for providing advertising on a mobile device
US20080235090A1 (en) * 2007-03-23 2008-09-25 Olof Lundstrom Method and arrangement for managing personalized advertisements in a tv system
WO2008118054A1 (en) * 2007-03-23 2008-10-02 Telefonaktiebolaget Lm Ericsson (Publ) Method and arrangement for managing personalized advertisements in a tv system
US8209324B2 (en) * 2007-04-06 2012-06-26 Ntt Docomo, Inc. Method and system for providing information in virtual space
US20080250001A1 (en) * 2007-04-06 2008-10-09 Ntt Docomo, Inc. Method and System for Providing Information in Virtual Space
US11564015B2 (en) 2007-04-17 2023-01-24 Intent IQ, LLC Targeted television advertisements based on online behavior
US11589136B2 (en) 2007-04-17 2023-02-21 Intent IQ, LLC Targeted television advertisements based on online behavior
US11805300B2 (en) 2007-04-17 2023-10-31 Intent IQ, LLC System for taking action using cross-device profile information
US11831964B2 (en) 2007-12-31 2023-11-28 Intent IQ, LLC Avoiding directing online advertisements based on user interaction with television advertisements
US8874086B2 (en) 2008-02-07 2014-10-28 Microsoft Corporation Providing relevant advertisements or other content based on a communications identifier
US20090203361A1 (en) * 2008-02-07 2009-08-13 Microsoft Corporation Providing relevant advertisements or other content based on a communications identifier
US20100241663A1 (en) * 2008-02-07 2010-09-23 Microsoft Corporation Providing content items selected based on context
US8166526B2 (en) 2008-12-29 2012-04-24 Motorola Mobility, Inc. System and method for providing secure access to password-protected resources
US20100169959A1 (en) * 2008-12-29 2010-07-01 Motorola, Inc. System and Method for Providing Secure Access to Password-Protected Resources
US20180189341A1 (en) * 2009-05-08 2018-07-05 Google Llc Refining location estimates and reverse geocoding based on a user profile
US11314715B2 (en) * 2009-05-08 2022-04-26 Google Llc Refining location estimates and reverse geocoding based on a user profile
US8776111B1 (en) * 2009-10-08 2014-07-08 Prime Research Alliance E, Inc. Methods and systems for generating subscriber usage profiles in a multi-platform targeted advertising system
US20110136442A1 (en) * 2009-12-09 2011-06-09 Echostar Technologies Llc Apparatus and methods for identifying a user of an entertainment device via a mobile communication device
US10394778B2 (en) 2010-09-03 2019-08-27 Robert Lewis Jackson, JR. Minimal representation of connecting walks
US9235843B2 (en) * 2010-09-27 2016-01-12 T-Mobile Usa, Inc. Insertion of user information into headers to enable targeted responses
US20120079135A1 (en) * 2010-09-27 2012-03-29 T-Mobile Usa, Inc. Insertion of User Information into Headers to Enable Targeted Responses
US10333820B1 (en) 2012-10-23 2019-06-25 Quest Software Inc. System for inferring dependencies among computing systems
US10250837B2 (en) 2012-12-05 2019-04-02 DISH Technologies L.L.C. User proximity recognition and hands-free control
US11005738B1 (en) 2014-04-09 2021-05-11 Quest Software Inc. System and method for end-to-end response-time analysis
US10291493B1 (en) * 2014-12-05 2019-05-14 Quest Software Inc. System and method for determining relevant computer performance events
US9996577B1 (en) 2015-02-11 2018-06-12 Quest Software Inc. Systems and methods for graphically filtering code call trees
US10187260B1 (en) 2015-05-29 2019-01-22 Quest Software Inc. Systems and methods for multilayer monitoring of network function virtualization architectures
US10200252B1 (en) 2015-09-18 2019-02-05 Quest Software Inc. Systems and methods for integrated modeling of monitored virtual desktop infrastructure systems
US10817593B1 (en) * 2015-12-29 2020-10-27 Wells Fargo Bank, N.A. User information gathering and distribution system
US11755707B1 (en) 2015-12-29 2023-09-12 Wells Fargo Bank, N.A. User information gathering and distribution system
US10230601B1 (en) 2016-07-05 2019-03-12 Quest Software Inc. Systems and methods for integrated modeling and performance measurements of monitored virtual desktop infrastructure systems
US11232420B2 (en) 2019-04-15 2022-01-25 Advanced New Technologies Co., Ltd. Method and device for voice broadcast
US10990939B2 (en) * 2019-04-15 2021-04-27 Advanced New Technologies Co., Ltd. Method and device for voice broadcast
US11432149B1 (en) 2019-10-10 2022-08-30 Wells Fargo Bank, N.A. Self-sovereign identification via digital credentials for selected identity attributes
US11729616B1 (en) 2019-10-10 2023-08-15 Wells Fargo Bank, N.A. Self-sovereign identification via digital credentials for identity attributes
US11974025B2 (en) 2023-06-07 2024-04-30 Intent IQ, LLC Targeted television advertisements based on online behavior

Also Published As

Publication number Publication date
US8965871B2 (en) 2015-02-24
US20120131136A1 (en) 2012-05-24

Similar Documents

Publication Publication Date Title
US8965871B2 (en) System and method for providing targeted content to a user based on user characteristics
US11756067B2 (en) Method, system, and computer program for contribution triggering transactions
US10755293B2 (en) Customer journey prediction and resolution
US8185137B2 (en) Intensity-based maps
US20190110156A1 (en) Methods of conducting social network operations
AU2010204767B2 (en) Conditional incentive presentation, tracking and redemption
US20180191894A1 (en) Event handling system
US20100223641A1 (en) System and method for predicting the optimum delivery of multimedia content based on human behavior patterns
US20060026067A1 (en) Method and system for providing network based target advertising and encapsulation
JP2002517918A (en) System and method for controlling personal information and delivering information to / from a telecommunications device
CN101785019A (en) System and method of mobile device advertising
US11195205B2 (en) Systems and methods for processing and providing transaction affinity profile information
CA2410869A1 (en) Customer decision support at point-of-sale
US20050220280A1 (en) System and method for rating alternative solutions
JP2005078497A (en) Server device and advertisement distribution method
JP2002271855A (en) Advertisement providing system
US20100223638A1 (en) System and method for optimizing the scheduling of multimedia content
US20100268599A1 (en) Method and system for proactively and remotely triggering applications for marketing campaigns on mobile devices
JP2003122902A (en) Marketing support service providing device and method, and marketing support service providing program
US20140143016A1 (en) Method and system for implementing progressive profiling of potential customers
US20190213622A1 (en) Secure and remote dynamic requirements matching
JP2003122785A (en) Device, method and program for automatic updating of user attribute register information
KR20090100672A (en) Schedule sharing system and its method for using other user's schedule
KR101800369B1 (en) Joining user lists with external data
JP2002133066A (en) Questionnaire examining system

Legal Events

Date Code Title Description
AS Assignment

Owner name: WELLS FARGO BANK, N.A., AS COLLATERAL AGENT, MINNE

Free format text: SECURITY AGREEMENT;ASSIGNOR:LEAP WIRELESS INTERNATIONAL, INC.;REEL/FRAME:015732/0121

Effective date: 20040816

AS Assignment

Owner name: BANK OF AMERICA N.A., NORTH CAROLINA

Free format text: SECURITY INTEREST;ASSIGNORS:CRICKET COMMUNICATIONS, INC.;LEAP WIRELESS INTERNATIONAL, INC.;BACKWIRE.COM, INC.;AND OTHERS;REEL/FRAME:016290/0577

Effective date: 20050110

AS Assignment

Owner name: WILMINGTON TRUST FSB, DELAWARE

Free format text: SECURITY AGREEMENT;ASSIGNORS:CRICKET COMMUNICATIONS, INC.;LEAP WIRELESS INTERNATIONAL, INC.;CRICKET LICENSEE (REAUCTION), LLC;AND OTHERS;REEL/FRAME:022793/0850

Effective date: 20090605

Owner name: WILMINGTON TRUST FSB,DELAWARE

Free format text: SECURITY AGREEMENT;ASSIGNORS:CRICKET COMMUNICATIONS, INC.;LEAP WIRELESS INTERNATIONAL, INC.;CRICKET LICENSEE (REAUCTION), LLC;AND OTHERS;REEL/FRAME:022793/0850

Effective date: 20090605

Owner name: CRICKET COMMUNICATIONS, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: LEAP WIRELESS INTERNATIONAL, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: TELEPHONE ENTERTAINMENT NETWORK, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CHASETEL LICENSEE CORP., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICESNSEE (ALBANY), INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE (COLUMBUS), INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE (DENVER) INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSSE (LAKELAND) INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE (MACON), INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE (NORTH CAROLINA) INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE (PITTSBURGH) INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE (REAUCTION), INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE I, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE II, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE III, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE IV, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE V, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE VI, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE VII, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE VIII, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE IX, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE X, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XI, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XII, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XIII, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XIV, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XV, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XVI, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XVII, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XVIII, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XIX, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XX, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET HOLDINGS DAYTON, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: MCG PCS LICENSEE CORPORATION, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CHASETEL REAL ESTATE HOLDING COMPANY, INC., CALIFO

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: BACKWIRE.COM, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET ALABAMA PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET ARIZONA PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET ARKANSAS PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET CALIFORNIA PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET COLORADO PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET FLORIDA PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET GEORGIA PROPERTY COMPANY, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET IDAHO PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET ILLINOIS PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET INDIANA PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET KANSAS PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET KENTUCKY PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET MICHIGAN PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET MINNESOTA PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET MISSISSIPPI PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET NEBRASKA PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET NEVADA PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET NEW MEXICO PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET NEW YORK PROPERTY COMPANY, INC., CALIFORNI

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET NORTH CAROLINA PROPERTY COMPANY, CALIFORNI

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET OHIO PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET OKLAHOMA PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET OREGON PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET PENNSYLVANIA PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET TEXAS PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET UTAH PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET WASHINGTON PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET WISCONSIN PROPERTY COMPANY, CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: LEAP PCS MEXICO, INC., CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET COMMUNICATIONS, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: LEAP WIRELESS INTERNATIONAL, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: TELEPHONE ENTERTAINMENT NETWORK, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CHASETEL LICENSEE CORP.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICESNSEE (ALBANY), INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE (COLUMBUS), INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE (DENVER) INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSSE (LAKELAND) INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE (MACON), INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE (NORTH CAROLINA) INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE (PITTSBURGH) INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE (REAUCTION), INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE I, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE II, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE III, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE IV, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE V, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE VI, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE VII, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE VIII, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE IX, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE X, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XI, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XII, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XIII, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XIV, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XV, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XVI, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XVII, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XVIII, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XIX, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET LICENSEE XX, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET HOLDINGS DAYTON, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: MCG PCS LICENSEE CORPORATION, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CHASETEL REAL ESTATE HOLDING COMPANY, INC.,CALIFOR

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: BACKWIRE.COM, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET ALABAMA PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET ARIZONA PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET ARKANSAS PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET CALIFORNIA PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET COLORADO PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET FLORIDA PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET GEORGIA PROPERTY COMPANY, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET IDAHO PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET ILLINOIS PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET INDIANA PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET KANSAS PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET KENTUCKY PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET MICHIGAN PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET MINNESOTA PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET MISSISSIPPI PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET NEBRASKA PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET NEVADA PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET NEW MEXICO PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET NEW YORK PROPERTY COMPANY, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET NORTH CAROLINA PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET OHIO PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET OKLAHOMA PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET OREGON PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET PENNSYLVANIA PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET TEXAS PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET UTAH PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET WASHINGTON PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: CRICKET WISCONSIN PROPERTY COMPANY,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

Owner name: LEAP PCS MEXICO, INC.,CALIFORNIA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:022804/0745

Effective date: 20090605

AS Assignment

Owner name: CRICKET COMMUNICATIONS, INC.,CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KELLEY, MARK;CALIGURI, STEVEN JOHN;GALLOUZI, SOUHEIL;SIGNING DATES FROM 20090729 TO 20100311;REEL/FRAME:024097/0284

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION

AS Assignment

Owner name: LEAP WIRELESS INTERNATIONAL, INC., CALIFORNIA

Free format text: RELEASE OF SECURITY INTEREST IN INTELLECTUAL PROPERTY COLLATERAL AT REEL/FRAME NO. 22793/0850;ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, SUCCESSOR BY MERGER TO WILMINGTON TRUST FSB;REEL/FRAME:032495/0684

Effective date: 20140313

Owner name: CRICKET COMMUNICATIONS, INC., CALIFORNIA

Free format text: RELEASE OF SECURITY INTEREST IN INTELLECTUAL PROPERTY COLLATERAL AT REEL/FRAME NO. 22793/0850;ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, SUCCESSOR BY MERGER TO WILMINGTON TRUST FSB;REEL/FRAME:032495/0684

Effective date: 20140313

Owner name: CRICKET LICENSE COMPANY, LLC (FORMERLY KNOWN AS CR

Free format text: RELEASE OF SECURITY INTEREST IN INTELLECTUAL PROPERTY COLLATERAL AT REEL/FRAME NO. 22793/0850;ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, SUCCESSOR BY MERGER TO WILMINGTON TRUST FSB;REEL/FRAME:032495/0684

Effective date: 20140313