US20150278853A1 - System And Method For Identifying Hidden Content - Google Patents

System And Method For Identifying Hidden Content Download PDF

Info

Publication number
US20150278853A1
US20150278853A1 US14/535,873 US201414535873A US2015278853A1 US 20150278853 A1 US20150278853 A1 US 20150278853A1 US 201414535873 A US201414535873 A US 201414535873A US 2015278853 A1 US2015278853 A1 US 2015278853A1
Authority
US
United States
Prior art keywords
digital display
display page
content
analysis
hidden
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/535,873
Inventor
Matthew McLaughlin
Roy Kalman ROSENFELD
Lahat Michael ABU
Lior SIMON
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DoubleVerify Inc
Original Assignee
DoubleVerify Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DoubleVerify Inc filed Critical DoubleVerify Inc
Priority to US14/535,873 priority Critical patent/US20150278853A1/en
Assigned to DoubleVerify, Inc. reassignment DoubleVerify, Inc. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ABU, LAHAT MICHAEL, MCLAUGHLIN, MATTHEW, ROSENFELD, ROY KALMAN, SIMON, LIOR
Publication of US20150278853A1 publication Critical patent/US20150278853A1/en
Assigned to CAPITAL ONE, NATIONAL ASSOCIATION, AS ADMINISTRATIVE AGENT reassignment CAPITAL ONE, NATIONAL ASSOCIATION, AS ADMINISTRATIVE AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: DOUBLEVERIFY INC.
Priority to US17/469,699 priority patent/US20210406953A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0248Avoiding fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • G06F17/30864
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0277Online advertisement
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols

Definitions

  • the present invention relates to identifying hidden content and/or advertisements on a digital display page, such as web page, app, etc., and to distinguishing the illegitimate pieces of hidden content from legitimate ones.
  • Web pages contain many different content elements, including advertisements. Some content elements that exist on the page may be hidden from view. Sometimes, they are hidden unintentionally because of an implementation error. Other times, they may intentionally be hidden for legitimate reasons (such as to pre-fetch pieces of content so that they display quickly when the user selects to view them), but many times they are hidden for illegitimate reasons. Illegitimate reasons for hiding content elements may include, but are not limited to, inflating advertisement delivery counts and misleading search engines.
  • Identifying hidden pieces of content or ads is particularly important in situations in which content may be hidden for illegitimate reasons.
  • an advertisement may be invisibly embedded on a web page so that someone gets paid every time the page loads and the ad is delivered to the browser, even though it is not visibly displayed.
  • Some publishers may embed a very large number of ads invisibly on the page.
  • the ads are made invisible when there is a desire to make a large profit from advertisements, but not negatively impact the user experience by “cluttering” the page with ads or in order to avoid detection by rudimentary review. Hence they are made invisible.
  • the present invention provides improved techniques that can be used to identify hidden content and/or advertisements on a digital display page, such as a web page, app, etc., and to tell the illegitimate pieces of hidden content apart from legitimate ones, which provide reduced levels of false results.
  • a technique involves analyzing rendered code for a digital display page to identify objects, fetching graphic images displayed in the objects, creating a repository of the graphic images, saving a rendered version of the page as an image, using an image analysis algorithm to identify “visible” images, and marking the remaining images as “invisible”, and classifying the digital display page accordingly.
  • a technique involves analyzing code for a digital display page by performing a geometric analysis of a location of an object to identify whether the object is within the viewable portion of the screen, performing a resource-based analysis to measure computer resources to determine whether the computer is optimizing the object for display on the screen, and when an object is identified as viewable based on the geometric analysis while at the same time considered not viewable based on the resource based analysis, the conclusion is that this object is an invisible object, and the object and digital display page are classified accordingly.
  • a technique involves performing a plurality of analyses on a digital display page to determine whether the digital display page includes content is hidden, wherein each analysis may determine a different result based on whether content in the digital display page is delivered but hidden, comparing the resulting determinations of the analyses, when the analyses all determine that the content is not hidden, classifying the digital display page as not including hidden content, and when at least one analysis determines that the content is not hidden and at least one analysis determines that the content is hidden, classifying the digital display page as including hidden content.
  • FIG. 1 is an exemplary block diagram of an embodiment of a system for identifying hidden content and/or advertisements on a web page.
  • FIG. 2 is an exemplary flow diagram of an embodiment of a process for identifying hidden advertisements or hidden content situations on a web page.
  • FIG. 3 is an exemplary flow diagram of an embodiment of a process for identifying hidden advertisements or hidden content situations on a web page.
  • FIG. 4 is an exemplary flow diagram of an embodiment of a process for identifying hidden advertisements or hidden content situations on a web page.
  • FIG. 5 is an exemplary block diagram of an embodiment of a system for identifying hidden content and/or advertisements on a web page.
  • the present invention provides improved techniques that can be used to identify hidden content and/or advertisements on a web page and to tell the illegitimate pieces of hidden content apart from legitimate ones, which provide reduced levels of false results.
  • FIG. 1 An exemplary system for identifying hidden content and/or advertisements on a web page is shown in FIG. 1 .
  • the system of FIG. 1 includes, but is not limited to, content analysis platform 102 , end user devices 104 , websites 106 A-N, such as search engines, commerce websites, news websites, social media websites, etc., all of which may be coupled together over a communications network, such as the Internet 108 .
  • Content analysis platform 102 typically includes, but is not limited to, a CPU, memory, network interface and computer program instructions stored in memory and executed by the CPU to implement the functions and methods disclosed herein.
  • the end user devices 104 may include devices such as personal computers, workstations, tablet computers, smartphones, etc., that implement one or more standard browsing platforms to issue requests for the content analysis platform 102 to perform the functions described herein. Alternatively, the functions of end user devices 104 may be performed by or within content analysis platform 102 .
  • Process 200 may be implemented in content analysis platform 102 , shown in FIG. 1 .
  • Process 200 begins with step 202 , in which a page that may include advertisements or other content is received.
  • a page that may include advertisements or other content is received.
  • advertisements or content are captured using a crawler, which may be implemented in content analysis platform 102 , or a client side browser plugin, which may be implemented in content analysis platform 102 and/or end user devices 104 or through click-stream data.
  • the page is analyzed to identify advertisements or other content. For example, the rendered html code of the page may be analyzed. (See U.S. Pat. No. 8,583,482, issued Nov.
  • Rendered html code may be obtained in one of several ways. For example, a crawler can visit the page, download the page content and render or cause the browser to render the web page. For another example, a plugin installed in a browser can access the web page rendered by the browser. For another example, a piece of html code embedded in the page can access the browser document object module (DOM) to get access to the rendered page.
  • DOM browser document object module
  • advertisements or other content can be identified in one of multiple ways. For example, the process may look for known ad server “signatures” on the page and/or known ad sizes. Pieces of content may similarly be identified by looking for known types of content elements via the Document Object Model (DOM).
  • DOM Document Object Model
  • step 204 whenever an advertisement or content is identified, the “creative”—the graphic images displayed in the advertisement or content, may be extracted and stored. This may create a repository of the graphic images of all the advertisements or content embedded in the web page, whether visible or not.
  • a rendered version of the page may be saved as an image. This may be termed a rendered page image or a page screenshot.
  • the rendered image will contain all the elements that are viewable on the page, as a user might see them. Hence elements that are hidden will not be visible in the rendered page image.
  • image analysis software may be used to compare between the graphic images obtained in step 204 and the rendered page image obtained in step 206 .
  • the image analysis software may try to identify each of the graphic images contained within the rendered page image by comparing them with the graphic images in the repository. Any image that is from the rendered page image that is found in the repository is marked as “visible”. Any standard image analysis software capable of comparing and identifying images may be used.
  • step 210 once all the images obtained in step 204 have been compared with the rendered page image obtained in step 206 , any remaining images that have not been marked as “visible” are considered “invisible” advertisements or content.
  • step 210 if the page contains at least one invisible advertisement or content, the page may be classified as “contains invisible advertisements” or content.
  • Process 200 may requires an additional step when the graphic images of the advertisements or content contain animation.
  • animation When animation is included, the rendered page screenshot that is captured may have randomly captured any frame of the animation. Therefore, to compare effectively, the images fetched in step 204 that contain animation need to be broken down into multiple images, wherein each frame of the animation becomes a separate individual image that is ultimately compared to the page screenshot in step 2064 .
  • Process 300 may be implemented in content analysis platform 102 , shown in FIG. 1 .
  • the method does not require a crawler or a client side browser plugin to be used. Rather, the process may be implemented by including a code snippet in the advertisement in question itself or embedded in the web page. This code snippet may be inserted by the advertiser, the publisher, or any intermediary in the advertisement or content delivery chain.
  • Process 300 begins with step 302 , in which, when the advertisement or content is delivered to the page, a geometric analysis of the location of the advertisement or content may be done by the code snippet to identify if the advertisement or content is within the viewable portion of the screen (viewport). This analysis may be based on calculating the location of the advertisement or content on the page, the location of the viewable areas of the browser within the page, and the size of the open browser window. Based on these calculations, it may be determined whether the advertisement or content is located in an area that is viewable to the user, such as within the browser window, with the browser window in focus and not covered by other applications. In this example, if an advertisement or content is within the viewable viewport but is made invisible using one of the methods described above, it would still be considered viewable based on the geometric analysis approach.
  • a resource-based analysis may be performed in addition to the geometric analysis performed in step 302 .
  • the resource-based analysis may be performed simultaneously to the geometric analysis of step 302 and may use a variety of methods to measure the computer resources in order to conclude whether the computer is optimizing the advertisement or content for display on the screen. For example, a higher amount of CPU resource utilization may imply advertisement or content is being optimized. If the resource based analysis identifies that the advertisement or content is being optimized, then it is concluded to be visible. Note that an advertisement or content that is within the viewable viewport as determined in step 302 , but is made invisible based using any number of techniques, including those described above, would be considered not visible using the resource based method since it wasn't “drawn” on the screen.
  • step 306 when an advertisement or content is identified as viewable based on the geometric analysis while at the same time considered not viewable based on the resource based analysis, the conclusion is that this advertisement or content is “invisible”, and the advertisement or content unit and web page could be classified accordingly.
  • FIG. 4 a general process 400 for identifying hidden advertisements or hidden content situations on a web page is shown in FIG. 4 .
  • Process 400 begins with step 402 , in which advertisement or content may be actually “drawn” on the screen or viewport. Examples of such steps, may include, but are not limited to, the page-rendering method described in step 206 of FIG. 2 , or the resource-based method described in step 304 of FIG. 3 .
  • a code analysis may be performed. For example, it may be computationally determined whether the code for the advertisement or piece of content was present on the web page. Examples of such steps, may include, but are not limited to, identifying the existence of the advertisement or content and saving the creative or graphic elements as described in step 204 of FIG. 2 , or using the geometric analysis as described in step 302 of FIG. 3 .
  • step 406 if one method determines that the advertisement or content was visible and the other method determines that the advertisement or content was not visible, at the same point in time, then the process considers the advertisement or content to be “invisible”.
  • Computer system 500 is typically a programmed general-purpose computer system, such as a personal computer, workstation, server system, and minicomputer or mainframe computer.
  • Computer system 500 includes one or more processors (CPUs) 502 A- 502 N, input/output circuitry 504 , network adapter 506 , and memory 508 .
  • CPUs 502 A- 502 N execute program instructions in order to carry out the functions of the present invention.
  • CPUs 502 A- 502 N are one or more microprocessors, such as an INTEL PENTIUM® processor.
  • FIG. 5 illustrates an embodiment in which computer system 500 is implemented as a single multi-processor computer system, in which multiple processors 502 A- 502 N share system resources, such as memory 508 , input/output circuitry 504 , and network adapter 506 .
  • system resources such as memory 508 , input/output circuitry 504 , and network adapter 506 .
  • the present invention also contemplates embodiments in which computer system 500 is implemented as a plurality of networked computer systems, which may be single-processor computer systems, multi-processor computer systems, or a mix thereof.
  • Input/output circuitry 504 provides the capability to input data to, or output data from, computer system 500 .
  • input/output circuitry may include input devices, such as keyboards, mice, touchpads, trackballs, scanners, etc., output devices, such as video adapters, monitors, printers, etc., and input/output devices, such as, modems, etc.
  • Network adapter 506 interfaces device 500 with a network 510 .
  • Network 510 may be any public or proprietary LAN or WAN, including, but not limited to the Internet.
  • Memory 508 stores program instructions that are executed by, and data that are used and processed by, CPU 502 to perform the functions of computer system 500 .
  • Memory 508 may include, for example, electronic memory devices, such as random-access memory (RAM), read-only memory (ROM), programmable read-only memory (PROM), electrically erasable programmable read-only memory (EEPROM), flash memory, etc., and electro-mechanical memory, such as magnetic disk drives, tape drives, optical disk drives, etc., which may use an integrated drive electronics (IDE) interface, or a variation or enhancement thereof, such as enhanced IDE (EIDE) or ultra-direct memory access (UDMA), or a small computer system interface (SCSI) based interface, or a variation or enhancement thereof, such as fast-SCSI, wide-SCSI, fast and wide-SCSI, etc., or Serial Advanced Technology Attachment (SATA), or a variation or enhancement thereof, or a fiber channel-arbitrated loop (FC-AL) interface.
  • RAM random-access memory
  • ROM read-only memory
  • memory 508 varies depending upon the function that computer system 500 is programmed to perform.
  • memory contents that may be included in a system in which a content analysis platform is implemented are shown.
  • these functions along with the memory contents related to those functions, may be included on one system, or may be distributed among a plurality of systems, based on well-known engineering considerations.
  • the present invention contemplates any and all such arrangements.
  • memory 508 may include code analysis routines 512 , graphic image extraction routines 514 , rendered page image routines 516 , image analysis routines 518 , geometric analysis routines 520 , resource-based analysis routines 522 , advertisement/content marking routines 524 , and operating system 530 .
  • Code analysis routines 512 may computationally determine whether the code for an advertisement or piece of content is present on the web page, such as may be performed by step 202 of FIG. 2 and step 404 of FIG. 4 .
  • Graphic image extraction routines 514 may extract and store graphic images displayed in an advertisement or content, such as may be performed by step 204 of FIG. 2 .
  • Rendered page image routines 516 may save a rendered version of a page as an image, such as may be performed by step 206 of FIG. 2 .
  • Image analysis routines 518 may be used to compare between the extracted graphic images and the rendered page image, such as may be performed by step 208 of FIG. 2 .
  • Advertisement/content marking routines 520 may determine whether to mark an advertisement or content as “invisible”, based on the results of other routines, such as may be performed in steps 210 and 212 of FIG. 2 , step 306 of FIG. 3 , and step 406 of FIG. 4 .
  • Operating system 522 provides overall system functionality.
  • End user systems may be computer systems having a structure similar to that shown in FIG. 5 .
  • Such end user systems may include geometric analysis routines to perform geometric analysis of a location of an advertisement or content, such as may be performed by step 302 of FIG. 3 .
  • such end user systems may include resource-based analysis routines to determine whether a computer is optimizing an advertisement or content for display on the screen, such as may be performed by step 302 of FIG. 3 .
  • the present invention contemplates implementation on a system or systems that provide multi-processor, multi-tasking, multi-process, and/or multi-thread computing, as well as implementation on systems that provide only single processor, single thread computing.
  • Multi-processor computing involves performing computing using more than one processor.
  • Multi-tasking computing involves performing computing using more than one operating system task.
  • a task is an operating system concept that refers to the combination of a program being executed and bookkeeping information used by the operating system. Whenever a program is executed, the operating system creates a new task for it. The task is like an envelope for the program in that it identifies the program with a task number and attaches other bookkeeping information to it.
  • Multi-tasking is the ability of an operating system to execute more than one executable at the same time.
  • Each executable is running in its own address space, meaning that the executables have no way to share any of their memory. This has advantages, because it is impossible for any program to damage the execution of any of the other programs running on the system. However, the programs have no way to exchange any information except through the operating system (or by reading files stored on the file system).
  • Multi-process computing is similar to multi-tasking computing, as the terms task and process are often used interchangeably, although some operating systems make a distinction between the two.
  • non-transitory computer readable media include storage media, examples of which include, but are not limited to, floppy disks, hard disk drives, CD-ROMs, DVD-ROMs, RAM, and, flash memory.

Abstract

The present invention provides improved techniques that can be used to identify hidden content and/or advertisements on a digital display page and to tell the illegitimate pieces of hidden content apart from legitimate ones, which provide reduced levels of false results. For example, a technique involves performing a plurality of analyses on a digital display page to determine whether the digital display page includes content is hidden, wherein each analysis may determine a different result based on whether content in the digital display page is delivered but hidden, comparing the resulting determinations of the analyses, when the analyses all determine that the content is not hidden, classifying the digital display page as not including hidden content, and when at least one analysis determines that the content is not hidden and at least one analysis determines that the content is hidden, classifying the digital display page as including hidden content.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims the benefit of U.S. Provisional Application No. 61/973,498, filed Apr. 1, 2014, which is incorporated herein in its entirety.
  • BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to identifying hidden content and/or advertisements on a digital display page, such as web page, app, etc., and to distinguishing the illegitimate pieces of hidden content from legitimate ones.
  • 2. Description of the Related Art
  • Web pages contain many different content elements, including advertisements. Some content elements that exist on the page may be hidden from view. Sometimes, they are hidden unintentionally because of an implementation error. Other times, they may intentionally be hidden for legitimate reasons (such as to pre-fetch pieces of content so that they display quickly when the user selects to view them), but many times they are hidden for illegitimate reasons. Illegitimate reasons for hiding content elements may include, but are not limited to, inflating advertisement delivery counts and misleading search engines.
  • There are many different techniques to hiding content elements on the web page, such as covering the piece of content with another content element on top of it using a z-index or other method or setting an item's visibility property to false. It is also possible to combine different techniques together and/or create variations of each one of these techniques.
  • Identifying hidden pieces of content or ads is particularly important in situations in which content may be hidden for illegitimate reasons. For example, an advertisement may be invisibly embedded on a web page so that someone gets paid every time the page loads and the ad is delivered to the browser, even though it is not visibly displayed. Some publishers may embed a very large number of ads invisibly on the page. The ads are made invisible when there is a desire to make a large profit from advertisements, but not negatively impact the user experience by “cluttering” the page with ads or in order to avoid detection by rudimentary review. Hence they are made invisible.
  • Traditional techniques of identifying hidden pieces of content relied on analyzing the html code of the web page and looking for various different html signatures that imply that a certain piece of content is hidden. For example, a traditional technique involved looking for an item with a negative z-index property or an item whose visibility property is set to false. The problem with this traditional technique is that because implementations can vary significantly, such traditional techniques yield a very high percentage of both false positives and false negatives.
  • A need arises for improved techniques that can be used to identify hidden content and/or advertisements on a web page and to tell the illegitimate pieces of hidden content apart from legitimate ones, which provide reduced levels of false results.
  • SUMMARY OF THE INVENTION
  • The present invention provides improved techniques that can be used to identify hidden content and/or advertisements on a digital display page, such as a web page, app, etc., and to tell the illegitimate pieces of hidden content apart from legitimate ones, which provide reduced levels of false results.
  • For example, a technique involves analyzing rendered code for a digital display page to identify objects, fetching graphic images displayed in the objects, creating a repository of the graphic images, saving a rendered version of the page as an image, using an image analysis algorithm to identify “visible” images, and marking the remaining images as “invisible”, and classifying the digital display page accordingly.
  • As another example, a technique involves analyzing code for a digital display page by performing a geometric analysis of a location of an object to identify whether the object is within the viewable portion of the screen, performing a resource-based analysis to measure computer resources to determine whether the computer is optimizing the object for display on the screen, and when an object is identified as viewable based on the geometric analysis while at the same time considered not viewable based on the resource based analysis, the conclusion is that this object is an invisible object, and the object and digital display page are classified accordingly.
  • As another example, a technique involves performing a plurality of analyses on a digital display page to determine whether the digital display page includes content is hidden, wherein each analysis may determine a different result based on whether content in the digital display page is delivered but hidden, comparing the resulting determinations of the analyses, when the analyses all determine that the content is not hidden, classifying the digital display page as not including hidden content, and when at least one analysis determines that the content is not hidden and at least one analysis determines that the content is hidden, classifying the digital display page as including hidden content.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is an exemplary block diagram of an embodiment of a system for identifying hidden content and/or advertisements on a web page.
  • FIG. 2 is an exemplary flow diagram of an embodiment of a process for identifying hidden advertisements or hidden content situations on a web page.
  • FIG. 3 is an exemplary flow diagram of an embodiment of a process for identifying hidden advertisements or hidden content situations on a web page.
  • FIG. 4 is an exemplary flow diagram of an embodiment of a process for identifying hidden advertisements or hidden content situations on a web page.
  • FIG. 5 is an exemplary block diagram of an embodiment of a system for identifying hidden content and/or advertisements on a web page.
  • DETAILED DESCRIPTION OF THE INVENTION
  • The present invention provides improved techniques that can be used to identify hidden content and/or advertisements on a web page and to tell the illegitimate pieces of hidden content apart from legitimate ones, which provide reduced levels of false results.
  • An exemplary system for identifying hidden content and/or advertisements on a web page is shown in FIG. 1. The system of FIG. 1 includes, but is not limited to, content analysis platform 102, end user devices 104, websites 106A-N, such as search engines, commerce websites, news websites, social media websites, etc., all of which may be coupled together over a communications network, such as the Internet 108. Content analysis platform 102 typically includes, but is not limited to, a CPU, memory, network interface and computer program instructions stored in memory and executed by the CPU to implement the functions and methods disclosed herein. The end user devices 104 may include devices such as personal computers, workstations, tablet computers, smartphones, etc., that implement one or more standard browsing platforms to issue requests for the content analysis platform 102 to perform the functions described herein. Alternatively, the functions of end user devices 104 may be performed by or within content analysis platform 102.
  • An example of a process 200 for identifying hidden advertisements or hidden content situations on a web page is shown in FIG. 2. Process 200 may be implemented in content analysis platform 102, shown in FIG. 1. Process 200 begins with step 202, in which a page that may include advertisements or other content is received. Typically, such advertisements or content are captured using a crawler, which may be implemented in content analysis platform 102, or a client side browser plugin, which may be implemented in content analysis platform 102 and/or end user devices 104 or through click-stream data. The page is analyzed to identify advertisements or other content. For example, the rendered html code of the page may be analyzed. (See U.S. Pat. No. 8,583,482, issued Nov. 12, 2013, entitled “Automated Monitoring and Verification of Internet Based Advertising”, the contents of which are incorporated by reference herein, for an example of a suitable technique to identify the existence and location of an advertisement). The analysis will identify all advertisements or content embedded in the page, whether visible or not.
  • Rendered html code may be obtained in one of several ways. For example, a crawler can visit the page, download the page content and render or cause the browser to render the web page. For another example, a plugin installed in a browser can access the web page rendered by the browser. For another example, a piece of html code embedded in the page can access the browser document object module (DOM) to get access to the rendered page. Once the page is rendered, advertisements or other content can be identified in one of multiple ways. For example, the process may look for known ad server “signatures” on the page and/or known ad sizes. Pieces of content may similarly be identified by looking for known types of content elements via the Document Object Model (DOM).
  • In step 204, whenever an advertisement or content is identified, the “creative”—the graphic images displayed in the advertisement or content, may be extracted and stored. This may create a repository of the graphic images of all the advertisements or content embedded in the web page, whether visible or not.
  • In step 206, a rendered version of the page may be saved as an image. This may be termed a rendered page image or a page screenshot. The rendered image will contain all the elements that are viewable on the page, as a user might see them. Hence elements that are hidden will not be visible in the rendered page image.
  • In step 206, image analysis software may be used to compare between the graphic images obtained in step 204 and the rendered page image obtained in step 206. The image analysis software may try to identify each of the graphic images contained within the rendered page image by comparing them with the graphic images in the repository. Any image that is from the rendered page image that is found in the repository is marked as “visible”. Any standard image analysis software capable of comparing and identifying images may be used.
  • In step 210, once all the images obtained in step 204 have been compared with the rendered page image obtained in step 206, any remaining images that have not been marked as “visible” are considered “invisible” advertisements or content.
  • In step 210, if the page contains at least one invisible advertisement or content, the page may be classified as “contains invisible advertisements” or content.
  • Process 200 may requires an additional step when the graphic images of the advertisements or content contain animation. When animation is included, the rendered page screenshot that is captured may have randomly captured any frame of the animation. Therefore, to compare effectively, the images fetched in step 204 that contain animation need to be broken down into multiple images, wherein each frame of the animation becomes a separate individual image that is ultimately compared to the page screenshot in step 2064.
  • An example of a process 300 for identifying hidden advertisements or hidden content on a web page is shown in FIG. 3. Process 300 may be implemented in content analysis platform 102, shown in FIG. 1. In this example, the method does not require a crawler or a client side browser plugin to be used. Rather, the process may be implemented by including a code snippet in the advertisement in question itself or embedded in the web page. This code snippet may be inserted by the advertiser, the publisher, or any intermediary in the advertisement or content delivery chain.
  • Process 300 begins with step 302, in which, when the advertisement or content is delivered to the page, a geometric analysis of the location of the advertisement or content may be done by the code snippet to identify if the advertisement or content is within the viewable portion of the screen (viewport). This analysis may be based on calculating the location of the advertisement or content on the page, the location of the viewable areas of the browser within the page, and the size of the open browser window. Based on these calculations, it may be determined whether the advertisement or content is located in an area that is viewable to the user, such as within the browser window, with the browser window in focus and not covered by other applications. In this example, if an advertisement or content is within the viewable viewport but is made invisible using one of the methods described above, it would still be considered viewable based on the geometric analysis approach.
  • In step 304, a resource-based analysis may be performed in addition to the geometric analysis performed in step 302. The resource-based analysis may be performed simultaneously to the geometric analysis of step 302 and may use a variety of methods to measure the computer resources in order to conclude whether the computer is optimizing the advertisement or content for display on the screen. For example, a higher amount of CPU resource utilization may imply advertisement or content is being optimized. If the resource based analysis identifies that the advertisement or content is being optimized, then it is concluded to be visible. Note that an advertisement or content that is within the viewable viewport as determined in step 302, but is made invisible based using any number of techniques, including those described above, would be considered not visible using the resource based method since it wasn't “drawn” on the screen.
  • In step 306, when an advertisement or content is identified as viewable based on the geometric analysis while at the same time considered not viewable based on the resource based analysis, the conclusion is that this advertisement or content is “invisible”, and the advertisement or content unit and web page could be classified accordingly.
  • As another example, a general process 400 for identifying hidden advertisements or hidden content situations on a web page is shown in FIG. 4. In this example, to identify an invisible advertisement or piece of content, two different methods are employed simultaneously to identify whether the advertisement or the content has the opportunity to be viewed. Process 400 begins with step 402, in which advertisement or content may be actually “drawn” on the screen or viewport. Examples of such steps, may include, but are not limited to, the page-rendering method described in step 206 of FIG. 2, or the resource-based method described in step 304 of FIG. 3.
  • In step 404, a code analysis may be performed. For example, it may be computationally determined whether the code for the advertisement or piece of content was present on the web page. Examples of such steps, may include, but are not limited to, identifying the existence of the advertisement or content and saving the creative or graphic elements as described in step 204 of FIG. 2, or using the geometric analysis as described in step 302 of FIG. 3.
  • In step 406, if one method determines that the advertisement or content was visible and the other method determines that the advertisement or content was not visible, at the same point in time, then the process considers the advertisement or content to be “invisible”.
  • An exemplary block diagram of a computer system 500, in which the processes shown above may be implemented, is shown in FIG. 5. Computer system 500 is typically a programmed general-purpose computer system, such as a personal computer, workstation, server system, and minicomputer or mainframe computer. Computer system 500 includes one or more processors (CPUs) 502A-502N, input/output circuitry 504, network adapter 506, and memory 508. CPUs 502A-502N execute program instructions in order to carry out the functions of the present invention. Typically, CPUs 502A-502N are one or more microprocessors, such as an INTEL PENTIUM® processor. FIG. 5 illustrates an embodiment in which computer system 500 is implemented as a single multi-processor computer system, in which multiple processors 502A-502N share system resources, such as memory 508, input/output circuitry 504, and network adapter 506. However, the present invention also contemplates embodiments in which computer system 500 is implemented as a plurality of networked computer systems, which may be single-processor computer systems, multi-processor computer systems, or a mix thereof.
  • Input/output circuitry 504 provides the capability to input data to, or output data from, computer system 500. For example, input/output circuitry may include input devices, such as keyboards, mice, touchpads, trackballs, scanners, etc., output devices, such as video adapters, monitors, printers, etc., and input/output devices, such as, modems, etc. Network adapter 506 interfaces device 500 with a network 510. Network 510 may be any public or proprietary LAN or WAN, including, but not limited to the Internet.
  • Memory 508 stores program instructions that are executed by, and data that are used and processed by, CPU 502 to perform the functions of computer system 500. Memory 508 may include, for example, electronic memory devices, such as random-access memory (RAM), read-only memory (ROM), programmable read-only memory (PROM), electrically erasable programmable read-only memory (EEPROM), flash memory, etc., and electro-mechanical memory, such as magnetic disk drives, tape drives, optical disk drives, etc., which may use an integrated drive electronics (IDE) interface, or a variation or enhancement thereof, such as enhanced IDE (EIDE) or ultra-direct memory access (UDMA), or a small computer system interface (SCSI) based interface, or a variation or enhancement thereof, such as fast-SCSI, wide-SCSI, fast and wide-SCSI, etc., or Serial Advanced Technology Attachment (SATA), or a variation or enhancement thereof, or a fiber channel-arbitrated loop (FC-AL) interface.
  • The contents of memory 508 varies depending upon the function that computer system 500 is programmed to perform. In the example shown in FIG. 5, memory contents that may be included in a system in which a content analysis platform is implemented are shown. However, one of skill in the art would recognize that these functions, along with the memory contents related to those functions, may be included on one system, or may be distributed among a plurality of systems, based on well-known engineering considerations. The present invention contemplates any and all such arrangements.
  • In the example shown in FIG. 5, memory 508 may include code analysis routines 512, graphic image extraction routines 514, rendered page image routines 516, image analysis routines 518, geometric analysis routines 520, resource-based analysis routines 522, advertisement/content marking routines 524, and operating system 530. Code analysis routines 512 may computationally determine whether the code for an advertisement or piece of content is present on the web page, such as may be performed by step 202 of FIG. 2 and step 404 of FIG. 4. Graphic image extraction routines 514 may extract and store graphic images displayed in an advertisement or content, such as may be performed by step 204 of FIG. 2. Rendered page image routines 516, may save a rendered version of a page as an image, such as may be performed by step 206 of FIG. 2. Image analysis routines 518 may be used to compare between the extracted graphic images and the rendered page image, such as may be performed by step 208 of FIG. 2. Advertisement/content marking routines 520 may determine whether to mark an advertisement or content as “invisible”, based on the results of other routines, such as may be performed in steps 210 and 212 of FIG. 2, step 306 of FIG. 3, and step 406 of FIG. 4. Operating system 522 provides overall system functionality.
  • It is to be noted that additional functionality may be implemented in end user devices, such as end user devices 104 shown in FIG. 1. End user systems may be computer systems having a structure similar to that shown in FIG. 5. Such end user systems may include geometric analysis routines to perform geometric analysis of a location of an advertisement or content, such as may be performed by step 302 of FIG. 3. Likewise, such end user systems may include resource-based analysis routines to determine whether a computer is optimizing an advertisement or content for display on the screen, such as may be performed by step 302 of FIG. 3.
  • As shown in FIG. 5, the present invention contemplates implementation on a system or systems that provide multi-processor, multi-tasking, multi-process, and/or multi-thread computing, as well as implementation on systems that provide only single processor, single thread computing. Multi-processor computing involves performing computing using more than one processor. Multi-tasking computing involves performing computing using more than one operating system task. A task is an operating system concept that refers to the combination of a program being executed and bookkeeping information used by the operating system. Whenever a program is executed, the operating system creates a new task for it. The task is like an envelope for the program in that it identifies the program with a task number and attaches other bookkeeping information to it. Many operating systems, including Linux, UNIX®, OS/2®, and Windows®, are capable of running many tasks at the same time and are called multitasking operating systems. Multi-tasking is the ability of an operating system to execute more than one executable at the same time. Each executable is running in its own address space, meaning that the executables have no way to share any of their memory. This has advantages, because it is impossible for any program to damage the execution of any of the other programs running on the system. However, the programs have no way to exchange any information except through the operating system (or by reading files stored on the file system). Multi-process computing is similar to multi-tasking computing, as the terms task and process are often used interchangeably, although some operating systems make a distinction between the two.
  • It is important to note that while aspects of the present invention may be implemented in the context of a fully functioning data processing system, those of ordinary skill in the art will appreciate that the processes of the present invention are capable of being distributed in the form of a computer program product including a computer readable medium of instructions. Examples of non-transitory computer readable media include storage media, examples of which include, but are not limited to, floppy disks, hard disk drives, CD-ROMs, DVD-ROMs, RAM, and, flash memory.
  • Although specific embodiments of the present invention have been described, it will be understood by those of skill in the art that there are other embodiments that are equivalent to the described embodiments. Accordingly, it is to be understood that the invention is not to be limited by the specific illustrated embodiments, but only by the scope of the appended claims.

Claims (27)

What is claimed is:
1. A method of identifying hidden content comprising:
analyzing rendered code for a digital display page to identify objects;
extracting graphic images displayed in the objects;
creating a repository of the graphic images;
saving a rendered version of the digital display page as an image;
identifying visible images, and marking the remaining images as “invisible”; and
classifying the digital display page based on the marked images.
2. The method of claim 1, wherein the digital display page is captured using a crawler or using a client side browser plugin.
3. The method of claim 1, wherein the visible images are identified by using image analysis to compare each graphic image contained within the image of the rendered version of the digital display page with the graphic images in the repository, and identifying as visible those graphic images from the image of the rendered version of the digital display page that are found among the graphic images in the repository.
4. The method of claim 1, wherein the digital display page is classified as containing an invisible object if any object of the digital display page is marked as invisible.
5. A method of identifying hidden content comprising:
analyzing code for a digital display page by performing a geometric analysis of a location of an object to identify whether the object is within a viewable portion of the digital display page;
performing a resource-based analysis to measure computer resources in use to determine whether the object is being prepared for display, and
when an object is identified as viewable based on the geometric analysis while at the same time considered not viewable based on the resource based analysis, the object and digital display page are classified as invisible.
6. The method of claim 5, wherein the geometric analysis is performed by:
calculating a location of the object on the digital display page;
calculating a location of viewable areas of a browser within the digital display page;
calculating a size of an open browser window; and
determining whether the object is located in an area that is viewable to the user, such as within the browser window, with the browser window in focus and not covered by other applications.
7. The method of claim 5, wherein the resource-based analysis is performed by:
determining an amount of CPU resource utilization.
8. A method of identifying hidden content comprising:
performing a plurality of analyses on a digital display page to determine whether the digital display page includes content is hidden, wherein each analysis may determine a different result based on whether content in the digital display page is delivered but hidden;
comparing the resulting determinations of the analyses;
when the analyses all determine that the content is not hidden, classifying the digital display page as not including hidden content; and
when at least one analysis determines that the content is not hidden and at least one analysis determines that the content is hidden, classifying the digital display page as including hidden content.
9. The method of claim 8, wherein the plurality of analyses includes at least one of a page-rendering analysis, a resource-based analysis, a code analysis, a geometric analysis, or identifying existence of the object and saving creative or graphic elements of the object.
10. A system for identifying hidden content comprising a processor, memory accessible by the processor, and program instructions and data stored in the memory, the program instructions executable by the processor to perform:
analyzing rendered code for a digital display page to identify objects;
extracting graphic images displayed in the objects;
creating a repository of the graphic images;
saving a rendered version of the digital display page as an image;
identifying visible images, and marking the remaining images as “invisible”; and
classifying the digital display page based on the marked images.
11. The system of claim 10, wherein the digital display page is captured using a crawler or using a client side browser plugin.
12. The system of claim 10, wherein the visible images are identified by using image analysis to compare each graphic image contained within the image of the rendered version of the digital display page with the graphic images in the repository, and identifying as visible those graphic images from the image of the rendered version of the digital display page that are found among the graphic images in the repository.
13. The system of claim 10, wherein the digital display page is classified as containing an invisible object if any object of the digital display page is marked as invisible.
14. A system for identifying hidden content comprising a processor, memory accessible by the processor, and program instructions and data stored in the memory, the program instructions executable by the processor to perform:
analyzing code for a digital display page by performing a geometric analysis of a location of an object to identify whether the object is within a viewable portion of the digital display page;
performing a resource-based analysis to measure computer resources in use to determine whether the object is being prepared for display, and
when an object is identified as viewable based on the geometric analysis while at the same time considered not viewable based on the resource based analysis, the object and digital display page are classified as invisible.
15. The system of claim 14, wherein the geometric analysis is performed by:
calculating a location of the object on the digital display page;
calculating a location of viewable areas of a browser within the digital display page;
calculating a size of an open browser window; and
determining whether the object is located in an area that is viewable to the user, such as within the browser window, with the browser window in focus and not covered by other applications.
16. The system of claim 14, wherein the resource-based analysis is performed by:
determining an amount of CPU resource utilization.
17. A system for identifying hidden content comprising a processor, memory accessible by the processor, and program instructions and data stored in the memory, the program instructions executable by the processor to perform:
performing a plurality of analyses on a digital display page to determine whether the digital display page includes content is hidden, wherein each analysis may determine a different result based on whether content in the digital display page is delivered but hidden;
comparing the resulting determinations of the analyses;
when the analyses all determine that the content is not hidden, classifying the digital display page as not including hidden content; and
when at least one analysis determines that the content is not hidden and at least one analysis determines that the content is hidden, classifying the digital display page as including hidden content.
18. The system of claim 17, wherein the plurality of analyses includes at least one of a page-rendering analysis, a resource-based analysis, a code analysis, a geometric analysis, or identifying existence of the object and saving creative or graphic elements of the object.
19. A computer program product for identifying hidden content comprising a non-transitory computer readable medium storing program instructions that when executed by a processor perform:
analyzing rendered code for a digital display page to identify objects;
extracting graphic images displayed in the objects;
creating a repository of the graphic images;
saving a rendered version of the digital display page as an image;
identifying visible images, and marking the remaining images as “invisible”; and
classifying the digital display page based on the marked images.
20. The computer program product of claim 19, wherein the digital display page is captured using a crawler or using a client side browser plugin.
21. The computer program product of claim 19, wherein the visible images are identified by using image analysis to compare each graphic image contained within the image of the rendered version of the digital display page with the graphic images in the repository, and identifying as visible those graphic images from the image of the rendered version of the digital display page that are found among the graphic images in the repository.
22. The computer program product of claim 19, wherein the digital display page is classified as containing an invisible object if any object of the digital display page is marked as invisible.
23. A computer program product for identifying hidden content comprising a non-transitory computer readable medium storing program instructions that when executed by a processor perform:
analyzing code for a digital display page by performing a geometric analysis of a location of an object to identify whether the object is within a viewable portion of the digital display page;
performing a resource-based analysis to measure computer resources in use to determine whether the object is being prepared for display, and
when an object is identified as viewable based on the geometric analysis while at the same time considered not viewable based on the resource based analysis, the object and digital display page are classified as invisible.
24. The computer program product of claim 23, wherein the geometric analysis is performed by:
calculating a location of the object on the digital display page;
calculating a location of viewable areas of a browser within the digital display page;
calculating a size of an open browser window; and
determining whether the object is located in an area that is viewable to the user, such as within the browser window, with the browser window in focus and not covered by other applications.
25. The computer program product of claim 23, wherein the resource-based analysis is performed by:
determining an amount of CPU resource utilization.
26. A computer program product for identifying hidden content comprising a non-transitory computer readable medium storing program instructions that when executed by a processor perform:
performing a plurality of analyses on a digital display page to determine whether the digital display page includes content is hidden, wherein each analysis may determine a different result based on whether content in the digital display page is delivered but hidden;
comparing the resulting determinations of the analyses;
when the analyses all determine that the content is not hidden, classifying the digital display page as not including hidden content; and
when at least one analysis determines that the content is not hidden and at least one analysis determines that the content is hidden, classifying the digital display page as including hidden content.
27. The computer program product of claim 26, wherein the plurality of analyses includes at least one of a page-rendering analysis, a resource-based analysis, a code analysis, a geometric analysis, or identifying existence of the object and saving creative or graphic elements of the object.
US14/535,873 2014-04-01 2014-11-07 System And Method For Identifying Hidden Content Abandoned US20150278853A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US14/535,873 US20150278853A1 (en) 2014-04-01 2014-11-07 System And Method For Identifying Hidden Content
US17/469,699 US20210406953A1 (en) 2014-04-01 2021-09-08 System And Method For Identifying Hidden Content

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201461973498P 2014-04-01 2014-04-01
US14/535,873 US20150278853A1 (en) 2014-04-01 2014-11-07 System And Method For Identifying Hidden Content

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/469,699 Continuation US20210406953A1 (en) 2014-04-01 2021-09-08 System And Method For Identifying Hidden Content

Publications (1)

Publication Number Publication Date
US20150278853A1 true US20150278853A1 (en) 2015-10-01

Family

ID=54190985

Family Applications (3)

Application Number Title Priority Date Filing Date
US14/535,650 Pending US20150278852A1 (en) 2014-04-01 2014-11-07 System And Method For Identifying Online Advertisement Laundering And Online Advertisement Injection
US14/535,873 Abandoned US20150278853A1 (en) 2014-04-01 2014-11-07 System And Method For Identifying Hidden Content
US17/469,699 Pending US20210406953A1 (en) 2014-04-01 2021-09-08 System And Method For Identifying Hidden Content

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US14/535,650 Pending US20150278852A1 (en) 2014-04-01 2014-11-07 System And Method For Identifying Online Advertisement Laundering And Online Advertisement Injection

Family Applications After (1)

Application Number Title Priority Date Filing Date
US17/469,699 Pending US20210406953A1 (en) 2014-04-01 2021-09-08 System And Method For Identifying Hidden Content

Country Status (1)

Country Link
US (3) US20150278852A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150029226A1 (en) * 2013-07-25 2015-01-29 Adam Barry Feder Systems and methods for displaying representative images
CN106021582A (en) * 2016-06-02 2016-10-12 腾讯科技(深圳)有限公司 Position information filtering method and method and device for extracting effective webpage information
CN108183908A (en) * 2017-12-29 2018-06-19 哈尔滨安天科技股份有限公司 A kind of advertisement link based on network flow finds method, system and storage medium
US10296552B1 (en) * 2018-06-30 2019-05-21 FiaLEAF LIMITED System and method for automated identification of internet advertising and creating rules for blocking of internet advertising
US20210011982A1 (en) * 2018-03-27 2021-01-14 Nippon Telegraph And Telephone Corporation Illegal content search device, illegal content search method, and program
US11196765B2 (en) * 2019-09-13 2021-12-07 Palo Alto Networks, Inc. Simulating user interactions for malware analysis
US11455654B2 (en) 2020-08-05 2022-09-27 MadHive, Inc. Methods and systems for determining provenance and identity of digital advertising requests solicited by publishers and intermediaries representing publishers
US11604878B2 (en) 2018-06-29 2023-03-14 Palo Alto Networks, Inc. Dynamic analysis techniques for applications
US11620383B2 (en) 2018-06-29 2023-04-04 Palo Alto Networks, Inc. Dynamic analysis techniques for applications

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110125587A1 (en) * 2008-06-23 2011-05-26 Double Verify, Inc. Automated Monitoring and Verification of Internet Based Advertising
US20120022926A1 (en) * 2010-07-12 2012-01-26 Kumaresan Ramanathan Process for increasing visibility of animated advertisements

Family Cites Families (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6457130B2 (en) * 1998-03-03 2002-09-24 Network Appliance, Inc. File access control in a multi-protocol file server
US6317722B1 (en) * 1998-09-18 2001-11-13 Amazon.Com, Inc. Use of electronic shopping carts to generate personal recommendations
JP2003525477A (en) * 1998-10-02 2003-08-26 インターナショナル・ビジネス・マシーンズ・コーポレーション Structural skeleton for efficient voice navigation through generic hierarchical objects
US20020062382A1 (en) * 1999-05-19 2002-05-23 Rhoads Geoffrey B. Collateral data combined with other data to select web site
US6990591B1 (en) * 1999-11-18 2006-01-24 Secureworks, Inc. Method and system for remotely configuring and monitoring a communication device
US6976063B1 (en) * 2000-11-02 2005-12-13 Microsoft Corporation Method and system for dynamically configuring a server computer
US20030131106A1 (en) * 2002-01-09 2003-07-10 Stephane Kasriel Web-page performance toolbar
US20040205119A1 (en) * 2002-03-26 2004-10-14 Streble Mary C. Method and apparatus for capturing web page content development data
US7171481B2 (en) * 2002-04-23 2007-01-30 Intel Corporation Validating a data link before its access
WO2004025540A2 (en) * 2002-09-13 2004-03-25 United States Postal Services Method for detecting suspicious transactions
US7644283B2 (en) * 2002-12-09 2010-01-05 Cowan William W Media analysis method and system for locating and reporting the presence of steganographic activity
US7467183B2 (en) * 2003-02-14 2008-12-16 Microsoft Corporation Method, apparatus, and user interface for managing electronic mail and alert messages
US7516086B2 (en) * 2003-09-24 2009-04-07 Idearc Media Corp. Business rating placement heuristic
US20050159999A1 (en) * 2003-12-18 2005-07-21 Totten Gregory S. Method and system for developing a relationship between college students, universities and businesses
US7409393B2 (en) * 2004-07-28 2008-08-05 Mybizintel Inc. Data gathering and distribution system
US8195822B2 (en) * 2006-02-13 2012-06-05 International Business Machines Corporation Substituting content for undesirable content in a web browser
US20080052377A1 (en) * 2006-07-11 2008-02-28 Robert Light Web-Based User-Dependent Customer Service Interaction with Co-Browsing
US20080066181A1 (en) * 2006-09-07 2008-03-13 Microsoft Corporation DRM aspects of peer-to-peer digital content distribution
US20090248807A1 (en) * 2008-03-26 2009-10-01 Ami-Go Group, Inc. System and Method of Matching Presence for Subscribers in a Social Network
US8204985B2 (en) * 2008-04-28 2012-06-19 Alcatel Lucent Probabilistic aggregation over distributed data streams
US9123022B2 (en) * 2008-05-28 2015-09-01 Aptima, Inc. Systems and methods for analyzing entity profiles
US20090319388A1 (en) * 2008-06-20 2009-12-24 Jian Yuan Image Capture for Purchases
GB2463669A (en) * 2008-09-19 2010-03-24 Motorola Inc Using a semantic graph to expand characterising terms of a content item and achieve targeted selection of associated content items
US8230089B2 (en) * 2009-03-25 2012-07-24 Digital River, Inc. On-site dynamic personalization system and method
US8924279B2 (en) * 2009-05-07 2014-12-30 Visa U.S.A. Inc. Risk assessment rule set application for fraud prevention
US8276057B2 (en) * 2009-09-17 2012-09-25 Go Daddy Operating Company, LLC Announcing a domain name registration on a social website
US8578496B1 (en) * 2009-12-29 2013-11-05 Symantec Corporation Method and apparatus for detecting legitimate computer operation misrepresentation
US20110251951A1 (en) * 2010-04-13 2011-10-13 Dan Kolkowitz Anti-fraud event correlation
US20110270881A1 (en) * 2010-05-03 2011-11-03 Borton Joseph W System and method for analyzing historical aggregate case results for a court system
US20120036011A1 (en) * 2010-08-05 2012-02-09 Microsoft Corporation Search Personalization Using Identifiers and Authentication State
US8745753B1 (en) * 2011-06-20 2014-06-03 Adomic, Inc. Systems and methods for blocking of web-based advertisements
US20130060856A1 (en) * 2011-09-07 2013-03-07 Lance Fried Social proxy and protocol gateway
US8956211B2 (en) * 2012-03-08 2015-02-17 Tipping Point Group, Llc Method and system for linking casino games and on-line social network games
FR2988192B1 (en) * 2012-03-19 2016-01-01 Syneria METHOD AND SYSTEM FOR DEVELOPING CONSULTATION APPLICATIONS OF CONTENT AND SERVICES ON A TELECOMMUNICATION, DISTRIBUTION AND EXECUTION NETWORK OF SUCH APPLICATIONS ON MULTIPLE APPARATUSES.
US20150262227A1 (en) * 2014-03-17 2015-09-17 Linkshare Corporation Transaction tracking, managing, assessment, and auditing data processing system and network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110125587A1 (en) * 2008-06-23 2011-05-26 Double Verify, Inc. Automated Monitoring and Verification of Internet Based Advertising
US20120022926A1 (en) * 2010-07-12 2012-01-26 Kumaresan Ramanathan Process for increasing visibility of animated advertisements

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Saed Sayad, Decision Tree- Classification, Internet Archive Way Back Machine Capture date of 3-12-2013 from URL: http://www.saedsayad.com/decision_tree.htm *
Trademark Electronic Search System(TESS), LINUX, 1/4/2017, United States Patent and Trademark Office *

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150029226A1 (en) * 2013-07-25 2015-01-29 Adam Barry Feder Systems and methods for displaying representative images
US9721375B1 (en) 2013-07-25 2017-08-01 Duelight Llc Systems and methods for displaying representative images
US9741150B2 (en) * 2013-07-25 2017-08-22 Duelight Llc Systems and methods for displaying representative images
US9953454B1 (en) 2013-07-25 2018-04-24 Duelight Llc Systems and methods for displaying representative images
US10109098B2 (en) 2013-07-25 2018-10-23 Duelight Llc Systems and methods for displaying representative images
US10937222B2 (en) 2013-07-25 2021-03-02 Duelight Llc Systems and methods for displaying representative images
US10366526B2 (en) 2013-07-25 2019-07-30 Duelight Llc Systems and methods for displaying representative images
US10810781B2 (en) 2013-07-25 2020-10-20 Duelight Llc Systems and methods for displaying representative images
CN106021582A (en) * 2016-06-02 2016-10-12 腾讯科技(深圳)有限公司 Position information filtering method and method and device for extracting effective webpage information
CN108183908A (en) * 2017-12-29 2018-06-19 哈尔滨安天科技股份有限公司 A kind of advertisement link based on network flow finds method, system and storage medium
US20210011982A1 (en) * 2018-03-27 2021-01-14 Nippon Telegraph And Telephone Corporation Illegal content search device, illegal content search method, and program
US11604878B2 (en) 2018-06-29 2023-03-14 Palo Alto Networks, Inc. Dynamic analysis techniques for applications
US11620383B2 (en) 2018-06-29 2023-04-04 Palo Alto Networks, Inc. Dynamic analysis techniques for applications
US11960605B2 (en) 2018-06-29 2024-04-16 Palo Alto Networks, Inc. Dynamic analysis techniques for applications
US10296552B1 (en) * 2018-06-30 2019-05-21 FiaLEAF LIMITED System and method for automated identification of internet advertising and creating rules for blocking of internet advertising
US11196765B2 (en) * 2019-09-13 2021-12-07 Palo Alto Networks, Inc. Simulating user interactions for malware analysis
US20220046030A1 (en) * 2019-09-13 2022-02-10 Palo Alto Networks, Inc. Simulating user interactions for malware analysis
US11706251B2 (en) * 2019-09-13 2023-07-18 Palo Alto Networks, Inc. Simulating user interactions for malware analysis
US11455654B2 (en) 2020-08-05 2022-09-27 MadHive, Inc. Methods and systems for determining provenance and identity of digital advertising requests solicited by publishers and intermediaries representing publishers
US11734713B2 (en) 2020-08-05 2023-08-22 MadHive, Inc. Methods and systems for determining provenance and identity of digital advertising requests solicited by publishers and intermediaries representing publishers

Also Published As

Publication number Publication date
US20210406953A1 (en) 2021-12-30
US20150278852A1 (en) 2015-10-01

Similar Documents

Publication Publication Date Title
US20210406953A1 (en) System And Method For Identifying Hidden Content
US9898755B2 (en) System and method for verifying non-human traffic
Hils et al. Measuring the emergence of consent management on the web
KR102047568B1 (en) Measuring web page rendering time
WO2015143956A1 (en) Method and apparatus for blocking advertisement in web page
US9652553B2 (en) Method and device for displaying a web page
US10845939B2 (en) Method and system for determining user interface usage
US20080244391A1 (en) System and method for dynamic message placement
US10235712B1 (en) Generating product image maps
Zhou et al. Vulnerable gpu memory management: towards recovering raw data from gpu
CA2656425A1 (en) Recognizing text in images
US10445224B2 (en) Visible elements-based application testing
US10095920B2 (en) Optical character recognition utilizing hashed templates
JP2018527632A5 (en)
CN111435391A (en) Method and apparatus for automatically determining interactive GUI elements to be interacted with in GUI
CN107180194B (en) Method and device for vulnerability detection based on visual analysis system
Dietrich et al. Exploiting visual appearance to cluster and detect rogue software
CN104881452B (en) Resource address sniffing method, device and system
CN105808630B (en) Android application auditing method and device
CN108197465B (en) Website detection method and device
US8949771B2 (en) Media files including programming code and description
KR102288408B1 (en) Advertising generation method, computer readable storage medium and system
US9436669B1 (en) Systems and methods for interfacing with dynamic web forms
US10379880B2 (en) Recovering missed display advertising
WO2014068340A9 (en) Sytem and method for processing content of a web resource for display

Legal Events

Date Code Title Description
AS Assignment

Owner name: DOUBLEVERIFY, INC., NEW YORK

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MCLAUGHLIN, MATTHEW;ROSENFELD, ROY KALMAN;ABU, LAHAT MICHAEL;AND OTHERS;SIGNING DATES FROM 20141028 TO 20141029;REEL/FRAME:034127/0972

AS Assignment

Owner name: CAPITAL ONE, NATIONAL ASSOCIATION, AS ADMINISTRATI

Free format text: SECURITY INTEREST;ASSIGNOR:DOUBLEVERIFY INC.;REEL/FRAME:043636/0679

Effective date: 20170920

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION