GB2480248A - User differentiation in internet session - Google Patents

User differentiation in internet session Download PDF

Info

Publication number
GB2480248A
GB2480248A GB1007759A GB201007759A GB2480248A GB 2480248 A GB2480248 A GB 2480248A GB 1007759 A GB1007759 A GB 1007759A GB 201007759 A GB201007759 A GB 201007759A GB 2480248 A GB2480248 A GB 2480248A
Authority
GB
United Kingdom
Prior art keywords
character
events
session
fingerprint
identification apparatus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1007759A
Other versions
GB201007759D0 (en
Inventor
Russell Offen
Kelvin Edmison
Rob Gaudet
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
KINDSIGHT Inc
Original Assignee
KINDSIGHT Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by KINDSIGHT Inc filed Critical KINDSIGHT Inc
Priority to GB1007759A priority Critical patent/GB2480248A/en
Publication of GB201007759D0 publication Critical patent/GB201007759D0/en
Publication of GB2480248A publication Critical patent/GB2480248A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation

Abstract

A method and apparatus for character differentiation, such as different users of the same internet connection, based on pattern recognition is provided. A sequence of events is received that have been generated from a given web browsing session and determines if the sequence of events is likely to have come from an existing, known character profile, or if the events are from a previously unknown character. A character identifier (1D) is tagged onto (i.e. associated with) the event for further processing in another system that can, for example, provide different content based on the identified character and an associated preference profile. The identification may be based on vocabulary in website host names, as well as from time of day, catagory, classification of websites visited, metadata, program title names, or descriptions. The system may be used to target advertising at the current user of an internet terminal.

Description

CHARACTER DIFFERENTIATION BASED ON PATTERN RECOGNITION
TECHNICAL FIELD
[001] The present disclosure relates to on-line content delivery and in particular to character differentiation from an on-line communication event stream to attribute sets of events within the streams to a particular character to enable targeted content delivery.
BACKGROUND
[002] With the proliferation of the use of information communications mechanisms such as, for example, the Internet and digital television (TV), it is desirable to be able to deliver content (e.g. advertisements) to a user of the information communications mechanism that is particularly relevant (i.e. is targeted) to the user. In a typical household there can be multiple users (i.e. persons), using and/or sharing multiple platforms (e.g. personal computers, different browsers, media players, and set-top boxes), which share a single connection (e.g. Digital Subscriber Line (DSL), or cable modem) to an information communications mechanism (e.g. Internet Service Provider (ISP) network). Given that most users are reluctant to accept invasive data collecting and reporting elements (e.g. agents) on their computing platforms, differentiation of the users in a single household must be accomplished by observing the aggregate data stream (i.e. data traffic) within the information communications mechanism (e.g. ISP network or digital TV network).
[003] A typical approach to attributing (i.e. associating) portions of the data traffic to each of a plurality users for the purposes of Internet advertising has been through the use of Hypertext Transfer Protocol (HTTP) cookies (a.k.a. Web cookies). Cookies are parcels of text sent by a server to a Web client (typically a browser) and then sent back unchanged by the client each time it accesses that server.
[004] The use of cookies to associate data traffic with individual users has a number of shortcomings including: Multiple users can share the same computer, login session, or browser and therefore will share cookies as well; The same user can use multiple combinalions of computers, login sessions and browsers, each with a unique set of cookies and no association between the sets of cookies; User can delete cookies at any time resulting in the assignment of a new cookie from a given server with no association with any previously deleted cookie from that server; and In some cases cookies associated only with particular websites have been used resulting in associations that reflect only a subset of the network (e.g. the Internet).
[005] Accordingly, there is a highly desirable need for improved identification of characters sharing the same access point.
SUMMARY
[006] In accordance with an aspect of the present disclosure there is provided a method of character differentiation of on-line communications originating from a subscriber access point coupled to a network. The method comprising: receiving user generated events from one of a plurality of computing devices coupled to the access point, each event associated with a subscriber identification (ID) and a session identification (ID), the events generated by a communication session between one of the plurality of computing devices and a communication endpoint through the network; generating a session fingerprint using a plurality of received events for the associated subscriber ID and session ID wherein the session fingerprint comprises a feature vector based upon data contained in the received events; and storing a character record comprising the generated fingerprint, an associated character identifier (ID) and the subscriber ID.
[0071 In accordance with an aspect of the present disclosure there is also provided a character identification apparatus for character differentiation of on-line communications originating from a subscriber access point coupled to a network.
The module comprising: a processor; a memory providing instructions for execution by the processor, the instructions for: receiving user generated events from one of a plurality of computing devices coupled to the access point, each event associated with a subscriber identification (ID) and a session identification (ID), the events generated by a communication session between one of the plurality of computing devices and a communication endpoint through the network; generating a session fingerprint using a plurality of received events for the associated subscriber ID and session ID wherein the session fingerprint comprises a feature vector based upon data contained in the received events; and storing a character record comprising the generated fingerprint, an associated character identifier (ID) and the subscriber ID.
[008] Other aspects and features of the present disclosure will become apparent to those ordinarily skilled in the art or science to which it pertains upon review of the following description of specific embodiments of the disclosure in conjunction with the accompanying figures
BRIEF DESCRIPTION OF THE DRAWINGS
[009] Further features and advantages of the present disclosure will become apparent from the following detailed description, taken in combination with the appended drawings, in which: [0010] Figure 1 is a schematic representation of character differentiation based on pattern recognition; [0011] Figure 2 is a schematic representation of a system providing character differentiation in profile selection; [0012] Figure 3 is a schematic representation of an apparatus for character differentiation based on pattern recognition; and [0013] Figure 4 is a flow diagram representing a method for generating a character fingerprint; [0014] Figure 5 is a flow diagram representing a method for character differentiation based on pattern recognition.
[0015] It will be noted that throughout the appended drawings, like features are identified by like reference numerals.
DETAILED DESCRIPTION
[0016] Embodiments are described below, by way of example only, with reference to Figures 1 to 5.
[0017] A method, apparatus and system for character differentiation based on pattern recognition is provided. A sequence of events is observed that have been generated from a given session or connection and determines if the sequence of events is likely to have come from an existing, known character, or if the events are from a previously unknown character. A character identifier (ID) is tagged onto (i.e. associated with) the event for further processing in another system that can, for example, provide different content based on the identified character and an associated preference profile. Identification of a character or a personality associated with a data stream helps in identifying potential individual users associated with unique browsing or interaction sessions originating from a subscriber such as a household. The ability to identify unique characters or personalities enables appropriate content to be selected and delivered to the user by selecting an appropriate content preference profile. Each user may be associated with one or more character identifiers based upon their browsing or content preferences which may vary based upon any number of factors such as the type of device being used for interaction, time of day, type of content being accessed, or source of content (connection endpoint). In addition, a single character may be associated with more than one user if their browsing profiles are similar.
[0018] Figure 1 is a representation of character differentiation based on pattern recognition in a typical operating environment. Character or personality differentiation can be defined in the context of a broadband data communication network (e.g. the Internet). Alternative it can be used in other contexts such as, for example, a digital TV distribution network or other similar information communication mechanisms provided by a network service provider 150.
[0019] The service provider may be any provider such as an Internet service provider (ISP) or network carrier, such as a wireless network carrier, providing a network 150 to enable subscribers to use computing device to access network based services. The users of an household, the subscriber to the service provider, are connected to the service provider network 150 by an access point 132 provided by a modem such as for example a digital subscriber line (DSL), Data Over Cable Service Interface Specification (DOCSIS), or wireless modem. The users access the network using networked computing devices such as Internet Protocol television (IPTV) or settop boxes I 30a, mobile devices such as laptops, notebooks or netbooks 130b, desktop computing devices 130c to access content provided by connection endpoints such as web services or content servers coupled to the network. The service provide network 150 may provide direct access to web services provided from within the network, such as websites 152 or other content sources 154, or to services coupled to the Internet 160 (or other public communication network), such as website 162 or content sources 164. The traffic and event filtering 110 receives network application data such as subscriber traffic 134 from subscribers 130a-130c via access point 132 transiting network 150 and generates web events based upon the received traffic. The traffic may be to website servers 152 or content servers 154 coupled to or within the service provider network 150 or to an external network 160 such as website server 162 and content servers 164 which may be connected via a network such as the Internet.
[0020] The events are processed and assigned to a session originating from the access point 132 from a household or defined location. The filtered events are then provided to character identification unit 115 with a session identifier. The character identification unit 115 determines the character associated with the session by generating a fingerprint based upon associated web events and assigns a character ID. A targeted content delivery unit 120 processes the web events and utilizes the data to generate user profiles associated with web events and the character ID to enable targeted content to be provided to the users within the household.
[0021] The traffic and event filter 110 provides events from a network connection (e.g. a DSL line) 134 to the character identification module 115. The types of events that can be identified can be specific to the information communication context (i.e. the application) Events can include page views, ad views, ad clicks or search events in the case of Internet traffic across an ISP network. In the case of a set-top box or media application, events can include TV-channel-change or media-consumption-metadata. The events are identified by a subscriber id and by a session id that effectively provides the character identification module 115 with a stream of events for each concurrent session coming from a household or subscriber connection 134. The connection 134 is between a location (e.g. a household), having a plurality of computing platforms and/or browsers 130a- 130c, and a network infrastructure (e.g. ISP network) 150. The household id is an identifier used to distinguish one subscriber (household) from another. The session id is assigned by the traffic and event filter.
[0022] The character identification module 115 applies algorithms to recognize patterns in the event stream to match the stream to a known character. If a match is not found, a new character is created. To prevent proliferation of characters from anomalous one-off sessions, an additional aggregate character representing the entire event stream for the household is maintained so that a base level of targeting may be utilized.
[0023] The pattern recognition algorithm is designed to be modular. That is that the logic/rules applied in the algorithm can be changed and/or supplemented.
The algorithm can, for example, take into account various factors of the initial activities of a user's browsing session. A fingerprint can be determined for a session by considering the first n' (i.e. a configurable number of) browsing events after a configurable period of inactivity of the connection. Additional factors that can be considered in the algorithm include the time-of-day or day of the week that the session occurs in as well as a classification of the websites that were visited (i.e. pages viewed). A session fingerprint is primarily a feature vector' in which features have been selected to represent important information that will distinguish one browsing session from another. Features used in the case of an Internet advertising application can include a vocabulary of words and tokens that are commonly present in the website host names that a user browses, as well as time-of-day and major category information. In the case of a set-top box or media application, exemplary features can include channel change events, time-of-day events or metadata information including program title names, descriptions and categories (e.g. sports, movies, drama).
[0024] Multiple algorithms can be used simultaneously in a live (i.e. active) session to allow for NB comparisons to determine the effectiveness of tuning the various parameters of the system. The comparison of multiple active algorithms can be used to determine the most effective algorithm by determining the relative effectiveness at selecting appropriate content. For example, in an Internet advertising application, if one algorithm is consistently better at presenting ads that are clicked by the user, that algorithm is much more effective than the alternate algorithm.
[0025] Unlike traditional systems that attempt to track individual users, the character identification module 115 attempts to match characters exhibited during a browsing or other content consumption session. In the case of two members of a household that share similar interests and behaviors, they will be identified as the same character for targeting purposes. There is no personally identifiable information (P11) used in the selection of characters.
[0026] As shown in Figure 2, subscriber 130 household, accesses content from web server 202 through service provider network 150. The server 202 may be may be directly connected to network 150, such as servers 152 and 154, or may be coupled to an external network 160 such as servers 162 and 164 which may be connected via a network such as the Internet. The traffic and event filtering unit 110 comprises one or more elements or devices deployed within the service provider network 150 or coupled to the service provider network 150.
[0027] The elements can comprise one or more network application elements 210 deployed in the service provider network. Each network application unit 110 comprises at least a processor 214, memory 216 and a network interface (not shown), one or more data preparation and event generation elements 230 comprising at least a processor 232, memory 234 and a network interface (not shown). An event processor 240 comprising at least a processor 242, memory 244 and a network interface (not shown) provides filtered web events to a character identification unit 115, comprising at least a processor 262 and memory 264 and a network interface (not shown). The character identification unit 115 may also provide storage 266 for the determine characters. Once a character fingerprint has been assigned, the web event and the determined character identifier are provided to the profiler 270 comprising at least a processor 272, memory 274 and a network interface (not shown). The profiler 270 maintains user preference profile associated with each determine character with may be provided in storage 276 for retrieval as required. A content server 280 comprising at least a processor 282, memory 284 and a network interface (not shown), retrieves profile information from the profiler and selects appropriate content for the profile to be delivered to the end user.
Although the network application unit 110 and the targeted content delivery unit 120 are described as comprising individual elements and/or units each being executed by individual processors and memory, the functionality of the network application unit 110 and the targeted content delivery unit may each be consolidated and executed on a single processor or computing platform depending on network topology. Similarly, the functionality may be distributed across multiple computing platforms as required.
[0028] The network application unit 110 supports capturing and processing of network application data, web traffic or web activities, between the subscriber 120 and the web server 202. The term web' refers to the accessing network accessible data comprising content such as text, images, videos, and other multimedia using hyperlinks. The network application element 210 also supports exporting or allows external access of these web traffic activities. Web traffic is typically hypertext transfer protocol (HTTP)-based traffic that uses transmission control part (TOP) port 80. Web activities are summarized web traffic that can, for example, include: website visit, video download, e-Commerce interaction on website, search performed, and other similar Internet activities. A network application unit 110 can comprise one or more types of network application elements 210 based upon the integration within the service provider network. The network application elements may be incorporated in the communication path between the access point and communication end point or adjunct to the communication path where copies or duplicates of the events are forwarded to the network application element from a device within the communication path.
[00291 Each data preparation and event generation element 230 provides for interfacing with one or more of network application elements 210 (of various types) and is responsible for accessing the network application data such as web traffic or web activities that are alternatively forwarded or logged by the network application elements 210. After receiving the web traffic or web activities, the data preparation and event generation element 210 is responsible for eliminating unnecessary data (e.g. removing the content portion of HTTP web traffic, removing the content portion of a web based video stream, etc.) and ultimately formulating the web traffic I activities into well-defined web events for down stream processing. Examples of web events are search events, website visit events, advertisement (ad) click events, e-Commerce interaction events, online video selection events, and other similar events. These events, accompanied by a subscriber identifier (ID) such as, for example, an Internet Protocol (IF) address associated with the subscriber household 130, are sent to targeted content delivery unit 120 for processing.
[0030] The event processor 240 provides for collecting and aggregating events from the data preparation and event generation elements 230. The network application data such as web events are further filtered (e.g. by eliminating any personal or sensitive information). The events and the associated session ID are processed by the character identification unit 115. The character identification unit 115 determines a fingerprint for the session and determines a character identifier 266 for the session, as described in connection with Figure 4, and forwards the web events, subscriber identifier and character identifier to the profiler 270 for further processing.
[0031] The profiler 270 is a real-time component within the targeted content delivery unit 120. The profiler 270 takes each filtered web event, subscriber ID and character ID, from the event processor 240 as input and generates or updates stored profiles 276 using the one or more profiling algorithms. The profile can be related to character interests within the subscriber household. The profiler 270 operates in real-time and the generated profiles are made available to the content server 280.
[0032] The content server 280, upon receiving a request for targeted content (e.g. an advertisement, a video clip, a music file, etc.) from a content user, queries the profiler 270 for profile information related to the content user; and/or profile information related to the context of the request (e.g. this might include the context of the content provider, publisher, genre of the requested content, etc.). The content server 280 can request, from the profiler 270, profile information generated using one or more profile modelling algorithms. Based on the received profile information, the most appropriate piece of content is selected and served to the content user.
The selection criteria can be based on relevancy to the user, revenue-generating ability, or other business rules related to the content user or the targeted content.
The content server 280 can choose to use profile information generated using different profile modelling algorithms on successive targeted content requests in order to conduct NB testing (i.e. alternative comparison) to optimize performance on an ongoing basis.
[0033] Figure 3 is a schematic representation of the character identification module 115 for character or personality differentiation based on pattern recognition.
The character identification module 115 comprises an event receiver 310, an event collector 320, a character calculator 330, a matching engine 340, a repository of matching algorithms 350, a character creator/updater 360 and a character repository 370. The event receiver 310 receives event traffic and extracts a household ID and a session ID. The event collector 320 provides for events to be stored until there are a sufficient number for processing. The character calculator 330 provides for generating a character fingerprint based on a plurality of events occurring in a session. The matching engine 340 provides for matching a candidate character with one of a plurality of known characters. Matching is based on matching algorithms provided by the matching algorithm repository 350. The character creator/updater 360 provides for creating a new character and for updating the fingerprint of an existing character. A plurality of characters can be stored in and retrieved from the character repository 370 which may be coupled to an external storage repository 266.
[0034] The method according to the present disclosure can be implemented using the character identification module 115 described above with reference to Figures 1 to 3. Alternatively, the method according to the present disclosure can be implemented using computer executable program instructions stored on a computer-readable storage memory.
[0035] Figure 4 is a flow diagram representing a method 400 for character or personality differentiation based on pattern recognition. The generated events are received at 402 from one of a plurality of computers, in a household, connected to an access point. Each event is associated with a subscriber identification (ID) and a session identification (ID) and generated by with a communication session between one of the plurality of computing devices and a communication endpoint, such as a web server or content through, the network. At 404 a session fingerprint is generated using a plurality of received events for the associated subscriber ID and session ID. The session fingerprint comprises a feature vector based upon data contained in the received events. A character record is then stored at 406, the record comprises the generated fingerprint, an associated character identifier (ID) and the subscriber ID.
[0036] Figure 5 is a flow diagram representing a method 500 for character or personality differentiation based on pattern recognition. An event is received at 502, the event is associated with a household ID (or subscriber ID) and a session ID.
The session ID is assigned by the traffic and event filtering 110 based upon OS fingerprinting and session detection techniques. The session ID is also based upon a defined period of usages where periods of inactivity restart a session.
[00371 For each incoming event, a check is made at 504 to determine if the session has already been assigned a character. When the session ID has already been assigned to a character, YES at 504, a determination is made as to whether the session has recently been active at 506. When the session has been active, YES at 506, the event is assigned to the character associated with the session at 508 and the event is forwarded to the content delivery unit 120 to determine an associate profile. Determination of session activity may be based upon a defined time interval, such as 15 minutes, in which associated events must be received to maintain session as active.
[0038] When there has been no recent activity on the session, NO at 506, events are collected at 510. A determination is made as to whether enough events -11 -have been received to perform the pattern-matching algorithm. Until enough events have been received to assign a character, NO at 512, each event is assigned to an aggregate household character at 514.
[0039] Once the required events have been collected, YES at 512, the session character fingerprint is calculated at 516. Each character fingerprint is represented as a feature vector that represents the attributes of the initial portions of a browsing session. The fingerprint is comprised of tokens from a vocabulary list based on, for example, the first 5 (this can be tuned) events of a web browsing session. Specifically the host name from the web event is broken down into tokens.
These tokens form the feature vector that represent a term associated with a host name and a weight defining the occurrence of the term in collected events. By adding together the feature vectors for each of the five events, a feature vector that represents the fingerprint of the session is generated. A sample fingerprint is shown
in Table 2.
[0040] The calculated character is compared with existing known characters at 518 for the household. The matching algorithm is not absolute (i.e. a perfect match is not necessary to conclude that it is the same character). The initial matching algorithm utilized is an application of an adaptation of well known natural language processing.
[0041] Multiple feature vectors can be compared for similarity using a technique such as cosine similarity. The matching algorithm, such as cosine similarity, comprises a calculation to determine the angle between two vectors.
Cosine similarity is known approach in text mining and data mining. It measures the similarity between two vectors of equal dimensions by looking at the cosine of the angIe between them. The output of the algorithm is a score between 0 and 1. When the angle between the session fingerprint and the character fingerprint is small, the sessions are considered to be matched. The threshold used to determine that two sessions are matched can be tuned and configured to achieve a desire level of matching.
[0042] If similarity between the best match and the current session is above a certain threshold (for example 0.5), then that character is chosen, YES at 518, all -12-events from that session are assigned to the known character at 520 and the fingerprint is updated at 522. If there is an existing character fingerprint and the current session's character fingerprint are averaged, and the existing character is updated (i.e. replaced) with a result of the averaging. This means that characters are continually learning to incorporate small differences in the initial character fingerprint.
[00431 When an appropriate match cannot be found within the existing characters, NO at 518, a new character is created that reflects the new initial browsing behavior that has been observed at 524. A limit can be defined as to how many characters can be defined for a household as well as an aging process that is used to remove characters that have not recently being observed from the household and replaced by the new character. The character associated with the session and the event is forwarded to the content delivery unit 120.
[0044] The character data structure may be defined in a record such as in
Table 1.
Household ID <INTEGER> Character ID <INTEGER> Last Activity Time <TIMESTAMP> Fingerprint <RECORD> Table 1: Character structure [0045] The household ID may be based upon any number of identifiers such as IP address, radius client; user logon identifier or any static data associated with the household access point The character ID is an identifier to uniquely identify the character. An activity time stamp identifying the last update or creation of the character. Each character has an associated fingerprint as shown in Table 2.
Index Weight
______ _____ 132 2 198 1 364 4 -13-
Table 2: Fingerprint structure [00461 The fingerprint represents a session with 5 unique tokens, with a total of 9 occurrences between them. The feature vector is sparsely stored. Any indices for which the corresponding token did not occur, is simply not stored. The index maps to a source index of terms found in or associated with event metadata or terms identified in the Universal Resource Locator (URL) of the event.
[0047] It will be apparent to one skilled in the art that numerous modifications and departures from the specific embodiments described herein may be made without departing from the spirit and scope of the present disclosure. -14-

Claims (39)

  1. CLAIMS: 1. A character identification apparatus for character differentiation of on-line communications originating from a subscriber access point coupled to a network, the apparatus comprising: an event receiver for receiving user generated events from one of a plurality of computing devices coupled to the access point, each event associated with a subscriber identification (ID) and a session identification (ID), the events generated by a communication session between one of the plurality of computing devices and a communication endpoint through the network; a character calculator coupled to the event receiver for generating a session fingerprint using a plurality of received events for the associated subscriber ID and session ID wherein the session fingerprint comprises a feature vector calculated from data contained in the received events; and a character creator/uploader for storing a character record in a memory, the character record comprising the generated session fingerprint, an associated character identifier (ID) and the subscriber ID.
  2. 2. The character identification apparatus of claim 1 wherein the feature vector comprises tokens, each token indexed to a term defined in a vocabulary list, the tokens determined based upon communication endpoint host name information provided by the received events associated with the vocabulary list.
  3. 3. The character identification apparatus of claim 2 wherein each token further comprises a weight associated with token defined in the feature vector, the weight defining the relative occurrence of the token in the received events.
  4. 4. The character identification apparatus of claim 3 wherein the tokens are defined by host names identified in the event, the tokens form the vector that represent the host name.
  5. 5. The character identification apparatus of claim 1 wherein the feature vector comprises words selected from a vocabulary of words commonly present in website host names, as well as time-of-day and major category information.
  6. 6. The character identification apparatus of any one of claims 2 or 3 wherein the feature vector comprises features selected from the group comprising: channel change events, time-of-day events, and metadata information including program title names, descriptions and categories.
  7. 7. The character identification apparatus of any one of claims I to 6 further comprising the character calculator determines if the character record is active within a defined time interval, wherein if the character record is active, the character record is updated with the received events.
  8. 8. The character identification apparatus of claim 7 wherein the character calculator determines if the received events are associated with an existing active session by determining an active time interval in which associated events must be received to maintain a character record as active.
  9. 9. The character identification apparatus of any one of claims 1 to 8 wherein prior to the character record being stored, a matching engine compares the session fingerprint to one or more stored fingerprints, each associated with a character record sharing a common subscriber ID, to determine if a character fingerprint has already been identified.
  10. 10. The character identification apparatus of claim 9 wherein the matching engine compares the fingerprints using a matching algorithm to provide a similarity indicator between the determined fingerprint and the stored fingerprints, the matching algorithm providing a value between 0 and 1.
  11. 11. The character identification apparatus of claim 10 wherein if the similarity is greater than 0.5 a match is declared and the feature vectors are updated based upon the received events.
  12. 12. The character identification apparatus of claim 11 wherein the matching algorithm is a cosine similarity algorithm.
  13. 13. The character identification apparatus of claim 9 wherein comparing the fingerprint further comprises comparing a time-cf-day or day of the week associated with the character record.
  14. 14. The character identification apparatus of claim 13 further comprising comparing a classification of websites that were visited.
  15. 15. The character identification apparatus of any one of claims ito 14 wherein the events define a HTTP request portion between the computing device and communication endpoint.
  16. 16. The character identification apparatus of any one of claims ito 15 wherein the session ID is assigned by OS fingerprinting technique to distinguish active communication sessions originating from the same access point.
  17. 17. The character identification apparatus of any one of claims 1 to 16 wherein the access point is selected from the group comprising: a digital subscriber line modem; a Data Over Cable Service Interface Specification (DOCSIS), and a wireless modem.
  18. 18. The character identification apparatus of any one of claims ito 17 wherein the character 10, subscriber identifier and received events are used to determine an associated content preference profile used for determining applicable content to be provided to a user associated with the session based upon user content preferences. -17-
  19. 19. A method of character differentiation of on-line communications originating from a subscriber access point coupled to a network, the method comprising: receiving user generated events from one of a plurality of computing devices coupled to the access point, each event associated with a subscriber identification (ID) and a session identification (ID), the events generated by a communication session between one of the plurality of computing devices and a communication endpoint through the network; generating a session fingerprint using a plurality of received events for the associated subscriber ID and session ID wherein the session fingerprint comprises a feature vector based upon data contained in the received events; and storing a character record comprising the generated fingerprint, an associated character identifier (ID) and the subscriber 1D.
  20. 20. The method of claim 19 wherein the feature vector comprises tokens, each token indexed to a term defined in a vocabulary list, the tokens determined based upon communication endpoint host name information provided by the received events selected from the vocabulary list.
  21. 21. The. method of claim 20 wherein each token further comprises a weight associated with token defined in the feature vector, the weight defining the relative occurrence of the token in the received events.
  22. 22. The method of claim 21 wherein the tokens are defined by host names identified in the event, the tokens from the vector that represent the host name.
  23. 23. The method of claim 19 wherein feature vector comprises words selected from a vocabulary of words commonly present in website host names, as well as time-of-day and major category information. -18-
  24. 24. The method of any one of claims 20 or 21 wherein the feature vector comprises features selected from the group comprising: channel change events, time-of-day events, and metadata information including program titlenames, descriptions and categories.
  25. 25. The method of any one of claims 19 to 24 further comprising determining if the character record is active within a defined time interval, wherein if character record is active, the character record is updated with the received events.
  26. 26. The method of any one of claims 19 to 25 wherein prior to storing the character record, the method further comprising comparing the session fingerprint to one or more stored fingerprints, each associated with a character record sharing a common subscriber ID, to determine if a character fingerprint has already been identified.
  27. 27. The method of claim 26 wherein comparing the fingerprints is performed by a matching algorithm to provide a similarity indicator between the determined fingerprint and the stored fingerprints, the matching algorithm providing a value between 0 and 1.
  28. 26. The method of claim 27 wherein if the similarity is greater than 0.5 a match is declared and the feature vectors are updated based upon the received events.
  29. 29. The method of claim 28 wherein the matching algorithm is a cosine similarity algorithm.
  30. 30. The method of any one of claims 19 to 29 determining if the received events are associated with an existing active session is further defined based upon an active time interval in which associated events must be received to maintain character record as active. -19-
  31. 31. The method of claim 26 wherein comparing the fingerprint further comprises comparing a time-of-day or day of the week associated with the character record.
  32. 32. The method of claim 31 further comprises comparing a classification of websites that were visited.
  33. 33. The method of any one of claims 19 to 32 wherein the events define a HTTP request portion between the computing device and communication endpoint.
  34. 34. The method of any one of claims 19 to 33 wherein the session ID is assigned by OS fingerprinting technique to distinguish active communication sessions originating from the same access point.
  35. 35. The method of any one of claims 19 to 34 wherein the access point is selected from the group comprising: a digital subscriber line modem; a Data Over Cable Service Interface Specification (DOCSIS), and a wireless modem.
  36. 36. The method of any one of claims 19 to 35 wherein the character ID, subscriber identifier and received events are used to determine an associated content preference profile used for determining applicable content to be provided to a user associated with the session based upon user content preferences.
  37. 37. A method of character differentiation substantially as hereinbefore described with reference to the drawings.
  38. 38. A computer readable memory storing instructions for execution by a processor, the instructions for performing the method of any one of claims 19 to 37.-20 -
  39. 39. A character identification apparatus substantially as hereinbefore described with reference to the drawings. -21 -
GB1007759A 2010-05-10 2010-05-10 User differentiation in internet session Withdrawn GB2480248A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB1007759A GB2480248A (en) 2010-05-10 2010-05-10 User differentiation in internet session

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1007759A GB2480248A (en) 2010-05-10 2010-05-10 User differentiation in internet session

Publications (2)

Publication Number Publication Date
GB201007759D0 GB201007759D0 (en) 2010-06-23
GB2480248A true GB2480248A (en) 2011-11-16

Family

ID=42315065

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1007759A Withdrawn GB2480248A (en) 2010-05-10 2010-05-10 User differentiation in internet session

Country Status (1)

Country Link
GB (1) GB2480248A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9948744B1 (en) 2016-10-14 2018-04-17 International Business Machines Corporation Mobile device identification

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9948744B1 (en) 2016-10-14 2018-04-17 International Business Machines Corporation Mobile device identification
US10230814B2 (en) 2016-10-14 2019-03-12 International Business Machines Corporation Mobile device identification
US10778802B2 (en) 2016-10-14 2020-09-15 Hcl Technologies Limited Mobile device identification

Also Published As

Publication number Publication date
GB201007759D0 (en) 2010-06-23

Similar Documents

Publication Publication Date Title
US8150974B2 (en) Character differentiation system generating session fingerprint using events associated with subscriber ID and session ID
US10154310B2 (en) System and method for associating individual household members with television programs viewed
US20220067782A1 (en) System and method for segmenting and targeting audience members
US10063636B2 (en) Analyzing requests for data made by users that subscribe to a provider of network connectivity
JP6827515B2 (en) Viewing time clustering for video search
US10678807B1 (en) Generating real-time search results
US8984047B2 (en) Targeted content delivery mechanism based on network application data
US8972530B2 (en) Method of data collection among participating content providers in a distributed network
US10089402B1 (en) Display of videos based on referrers
US20110184813A1 (en) Targeting offers to users of a web site
US20120203639A1 (en) Targeting offers to users of a web site
US20100223105A1 (en) Method and apparatus for content targeting one user group based on behavioral profiling of another user group
US20050125289A1 (en) Audience targeting system with segment management
US20050125290A1 (en) Audience targeting system with profile synchronization
US20070219955A1 (en) Advertising service based on content and user log mining
US9832504B2 (en) Event-based content distribution
US20080091767A1 (en) Method and system for mitigating automated agents operating across a distributed network
KR20120031232A (en) Content-management system for user behavior targeting
JP2007286832A (en) System, method, and program for advertisement distribution
EP2244441A1 (en) User profiling
US11126456B2 (en) Tracking usage of user interaction data using blockchains
US20100138278A1 (en) Applications for telecommunications services user profiling
JP6329015B2 (en) Ad distribution server
US20100299691A1 (en) System and Method for Personalization of Television Content Provided by a Set-Top Box Based on a User&#39;s Context and Uniquifiers
GB2480248A (en) User differentiation in internet session

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)