US20170324831A1 - Method for transfer of information related to targeted content messages through a proxy server - Google Patents
Method for transfer of information related to targeted content messages through a proxy server Download PDFInfo
- Publication number
- US20170324831A1 US20170324831A1 US15/659,191 US201715659191A US2017324831A1 US 20170324831 A1 US20170324831 A1 US 20170324831A1 US 201715659191 A US201715659191 A US 201715659191A US 2017324831 A1 US2017324831 A1 US 2017324831A1
- Authority
- US
- United States
- Prior art keywords
- profile
- user
- external apparatus
- information
- refined
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000012546 transfer Methods 0.000 title abstract description 5
- 230000004044 response Effects 0.000 claims abstract description 51
- 230000003542 behavioural effect Effects 0.000 claims description 10
- 230000003993 interaction Effects 0.000 claims description 7
- 230000002194 synthesizing effect Effects 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 claims 7
- 239000003795 chemical substances by application Substances 0.000 description 75
- 230000006399 behavior Effects 0.000 description 29
- 238000004891 communication Methods 0.000 description 26
- 238000012545 processing Methods 0.000 description 26
- 238000001914 filtration Methods 0.000 description 18
- 230000006870 function Effects 0.000 description 18
- 230000008569 process Effects 0.000 description 14
- 238000010586 diagram Methods 0.000 description 12
- 230000008685 targeting Effects 0.000 description 10
- 238000013459 approach Methods 0.000 description 9
- 230000009471 action Effects 0.000 description 7
- VJYFKVYYMZPMAB-UHFFFAOYSA-N ethoprophos Chemical compound CCCSP(=O)(OCC)SCCC VJYFKVYYMZPMAB-UHFFFAOYSA-N 0.000 description 5
- 238000013475 authorization Methods 0.000 description 4
- 230000001413 cellular effect Effects 0.000 description 4
- 230000009118 appropriate response Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000013480 data collection Methods 0.000 description 2
- 230000037406 food intake Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 238000005065 mining Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000012384 transportation and delivery Methods 0.000 description 2
- JWAZRIHNYRIHIV-UHFFFAOYSA-N 2-naphthol Chemical compound C1=CC=CC2=CC(O)=CC=C21 JWAZRIHNYRIHIV-UHFFFAOYSA-N 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013523 data management Methods 0.000 description 1
- 238000007418 data mining Methods 0.000 description 1
- 201000001098 delayed sleep phase syndrome Diseases 0.000 description 1
- 208000033921 delayed sleep phase type circadian rhythm sleep disease Diseases 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 230000003340 mental effect Effects 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000004549 pulsed laser deposition Methods 0.000 description 1
- 230000001502 supplementing effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/40—Business processes related to the transportation industry
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9537—Spatial or temporal dependent retrieval, e.g. spatiotemporal queries
-
- G06F17/30867—
-
- G06F17/3087—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/101—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1062—Editing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/106—Enforcing content protection by specific content processing
- G06F21/1063—Personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
- G06F21/1073—Conversion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
- G06F21/1075—Editing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/107—License processing; Key processing
- G06F21/1078—Logging; Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
- G06Q30/0267—Wireless devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
- G06Q30/0269—Targeted advertisements based on user profile or attribute
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H04L67/22—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
- H04W8/24—Transfer of terminal data
- H04W8/245—Transfer of terminal data from a network towards a terminal
-
- G06F2221/0724—
-
- G06F2221/0731—
-
- G06F2221/0742—
-
- G06F2221/0744—
-
- G06F2221/0759—
-
- G06F2221/0768—
-
- G06F2221/0775—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2103—Challenge-response
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2129—Authenticate client device independently of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2145—Inheriting rights or properties, e.g., propagation of permissions or restrictions within a hierarchy
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2151—Time stamp
Definitions
- 60/948,451 entitled “USER PROFILE GENERATION ARCHITECTURE FOR MOBILE ADVERTISING USING SECURE EXTERNAL PROCESSES” filed Jul. 7, 2007, and Provisional Application No. 60/948,452 entitled “METHOD AND SYSTEM FOR PROVIDING TARGETED ADVERTISING BASED ON A USER IN A MOBILE ENVIRONMENT” filed Jul. 7, 2007, and Provisional Application No. 60/948,453 entitled “USER PROFILE GENERATION ARCHITECTURE FOR MOBILE ADVERTISING USING PROFILE ATTRIBUTES HAVING VARIABLE CONFIDENCE LEVELS” filed Jul. 7, 2007, and Provisional Application No.
- 60/948,455 entitled “METHOD AND SYSTEM FOR DELIVERY OF TARGETED ADVERTISING BASED ON A USER PROFILE IN A MOBILE COMMUNICATION DEVICE” filed Jul. 7, 2007, and Provisional Application No. 60/948,456 entitled “USER PROFILE GENERATION ARCHITECTURE FOR MOBILE ADVERTISING” filed Jul. 7, 2007, all of which are assigned to the assignee hereof and hereby expressly incorporated by reference herein in their entirety.
- This disclosure relates to wireless communications.
- the present disclosure relates to wireless communications systems usable for targeted content-message and related transactions.
- Mobile Targeted-Content-Message (TCM)-enabled systems can be described as systems capable of delivering targeted content information, such as local weather reports and advertisements targeted to a particular demographic, to wireless communication devices (WCDs), such as cellular telephones or other forms of wireless access terminals (W-ATs). Such systems may also provide a better user experience by presenting non-intrusive targeted-content-messages that are likely to be of interest to a user.
- targeted content information such as local weather reports and advertisements targeted to a particular demographic
- WCDs wireless communication devices
- W-ATs wireless access terminals
- a mobile TCM-enabled system is a mobile advertising system capable of delivering advertisements to wireless communication devices (WCDs).
- WCDs wireless communication devices
- a mobile advertising system can provide such things as an advertisement sales conduit for a cellular provider to provide advertisements on a W-AT, as well as some form of analytical interface to report back on the performance of various advertisement campaigns.
- a particular consumer benefit of mobile advertising is that it can provide alternate/additional revenue models for wireless services so as to allow more economical access to the wireless services to those consumers willing to accept advertisements.
- the revenue generated through advertising may allow W-AT users to enjoy various services without paying the full subscription price usually associated with such services.
- TCMs In order to increase the effectiveness of TCMs on W-ATs, it can be beneficial to provide targeted information, i.e., TCMs which are deemed likely to be well received by, and/or of likely interest to, a particular person or a designated group of people.
- Targeted-Content-Message (TCM) information can be based on immediate needs or circumstances, such as a need to find emergency roadside service or the need for information about a travel route.
- Targeted-Content-Message information can also be based on specific products or services (e.g., games) for which a user has demonstrated past interest, and/or based on demographics, for example, a determination of an age and income group likely to be interested in a particular product.
- Targeted Advertisements are an example of TCMs.
- Targeted advertisements can provide a number of advantages (over general advertisements) including: (1) in an economic structure based on cost per view, an advertiser may be able to increase the value of his advertising budget by limiting paid advertising to a smaller set of prospects; and (2) as targeted advertisements are likely to represent areas of interest for a particular user, the likelihood that users will respond positively to targeted advertisements increases substantially.
- GLBA Graham-Leach-Bliley Act
- data subject any information relating to an identified or identifiable natural person
- an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity.”
- Common carriers also may be restricted from using personal information about their subscribers for marketing purposes.
- the GLBA prohibits access to individually identifiable customer information, as well as the disclosure of location information, without the express prior authorization of the customer.
- an information transfer method for exchange of information with a wireless access terminal includes receiving a first message from a W-AT, the first message including first information related to targeted-content-message information and/or user profile information provided by the W-AT and an address of the W-AT capable of identifying the W-AT, converting the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), transmitting the anonymized message to a remote server, receiving a first response from the remote server, the first response having response information and the anonymized address information, converting the first response to a second response by replacing the transaction ID with the W-AT address, and transmitting the second response to the W-AT.
- ID transaction identifier
- a proxy server capable of transferring information to a wireless access terminal includes means for receiving a first message from a W-AT, the first message including first information related to targeted content message information and/or user profile information provided by the W-AT and an address of the W-AT capable of identifying the W-AT, means for converting the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), means for transmitting the anonymized message to a remote server, means for receiving a first response from the remote server, the first response having response information and the transaction ID, means for converting the first response to a second response by replacing the transaction ID with the W-AT address; and means for transmitting the second response to the W-AT by use of the W-AT address information.
- ID transaction identifier
- a proxy server capable of transferring information to a wireless access terminal includes wireless receiving circuitry configured to receive a first message from a W-AT, the first message including first information related to targeted content message information and/or user profile information provided by the W-AT and an address of the W-AT capable of identifying the W-AT, first processing circuitry configured to convert the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), first transmitting circuitry configured to transmit the anonymized message to a remote server, first receiving circuitry configured to receive a first response from the remote server, the first response having response information and the transaction ID, second processing circuitry configured to convert the first response to a second response by replacing the transaction ID with the W-AT address, and wireless transmitting circuitry configured to transmit the second response to the W-AT by use of the W-AT address information.
- ID transaction identifier
- a computer program product includes a computer-readable medium that includes a first set of instructions for receiving a first message from a W-AT, the first message including first information related to targeted content message information and/or user profile information provided by the W-AT and an address of the W-AT capable of identifying the W-AT, a second set of instructions for converting the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), a third set of instructions for transmitting the anonymized message to a remote server, a fourth set of instructions for receiving a first response from the remote server, the first response having response information and the anonymized address information, a fifth set of instructions for converting the first response to a second response by replacing the transaction ID with the W-AT address, and a sixth set of instructions for transmitting the second response to the W-AT.
- a computer-readable medium that includes a first set of instructions for receiving a first message from a W-AT, the first message including first information related to targeted content message information and/or user profile information provided by
- one or more integrated circuits that together includes wireless receiving circuitry configured to receive a first message from a W-AT, the first message including first information provided by the W-AT and an address of the W-AT capable of identifying the W-AT, first processing circuitry configured to convert the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), first transmitting circuitry configured to transmit the anonymized message to a remote server, first receiving circuitry configured to receive a first response from the remote server, the first response having response information and the transaction ID, second processing circuitry configured to convert the first response to a second response by replacing the transaction ID with the W-AT address, and wireless transmitting circuitry configured to transmit the second response to the W-AT by use of the W-AT address information.
- wireless receiving circuitry configured to receive a first message from a W-AT, the first message including first information provided by the W-AT and an address of the W-AT capable of identifying the W-AT
- first processing circuitry configured to convert the first message to an anonymized message by replacing
- an apparatus in another exemplary embodiment, includes processing circuitry; and a memory coupled to the processing circuitry that includes a first set of instructions for receiving a first message from a W-AT, the first message including first information related to targeted content messages provided by the W-AT and an address of the W-AT capable of identifying the W-AT, a second set of instructions for converting the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), a third set of instructions for transmitting the anonymized message to a remote server, a fourth set of instructions for receiving a first response from the remote server, the first response having response information and the anonymized address information, a fifth set of instructions for converting the first response to a second response by replacing the transaction ID with the W-AT address, and a sixth set of instructions for transmitting the second response to the W-AT.
- a transaction identifier ID
- FIG. 1 is a diagram showing the interaction between an exemplary wireless access terminal (W-AT) and a targeted-message-sending infrastructure.
- W-AT wireless access terminal
- FIG. 2 is schematic block diagram showing the operation of an exemplary W-AT having an on-board user profile generation agent.
- FIG. 3 is a schematic block diagram showing an exemplary operation of a data transfer of a user profile generation agent.
- FIG. 4 is a schematic block diagram handling an exemplary request for profile data processing.
- FIG. 5 is a schematic block diagram showing an exemplary operation of a user profile generation agent.
- FIG. 6 is a flowchart outlining an exemplary operation for generating and using a user profile.
- FIG. 7 is a flowchart outlining another exemplary operation for generating and using a user profile.
- FIG. 8 is a diagram illustrating the use of a one-way hash function for client identity protection when identifiable data is transferred to a mobile targeted-message-sending server.
- a targeted-message-sending server is an example of mobile targeted-content-message processing server.
- FIG. 9 is a diagram illustrating data flow implemented by a proxy server for anonymizing identifiable data transferred to a mobile targeted-message-sending server.
- FIG. 10 depicts a communication protocol for content distribution in a mobile targeted-message-sending-enabled network.
- FIG. 11 depicts another communication protocol for content distribution in a mobile targeted-message-sending-enabled network.
- FIG. 12 depicts another communication protocol for content distribution in a mobile targeted-message-sending-enabled network.
- FIG. 13 depicts another communication protocol for content distribution in a mobile targeted-message-sending-enabled network.
- FIG. 14 depicts a timeline for a first communication protocol for downloading targeted-message-sending content according to “contact windows” approach.
- FIG. 15 depicts an alternate timeline for a communication protocol for downloading targeted-message-sending content according to a defined time schedule.
- TCM Targeted-Content-Message.
- An advertisement can be an example of a Targeted-Content-Message.
- M-TCM-PS Mobile Targeted-Content-Message Processing System
- MAEC Mobile advertising enabled client. This can be an example of a Mobile TCM-Enabled Client
- M-TCM-P Mobile TCM Provider
- Advertiser A person or an entity that may want to display advertisements through a mobile advertising system (MAS).
- An advertiser may provide the advertisement data along with respective targeting and playback rules, which may in some instances form advertisement metadata to a MAS.
- An advertiser is an example of a Mobile TCM Provider.
- TCM Metadata A term used to identify data that can be used to provide additional information about a respective Targeted-Content-Message (TCM).
- Advertisement Metadata A term used to identify data that may be used to provide additional information about a respective advertisement. This may include, but is not limited to, mime type, advertisement duration, advertisement viewing start time, advertisement viewing end time, etc. Respective advertisement targeting and playback rules provided by the advertiser may also get attached to an advertisement as metadata for the advertisement. Advertisement Metadata is an example of TCM metadata.
- Application Developer A person who or an entity that develops an application for the mobile advertising enabled client (MAEC) that can feature advertisements.
- System Operator A person who or entity that operates a MAS.
- Third Party Inference Rule Provider A third party (other than a system operator) who may provide user profile inference rules to be used by a User Profile Generation Agent
- User Profile Generation Agent A functional unit at the client that may receive various pertinent data, such as advertisement inference rules, user behavior from a metric collection agent, location data from a GPS, explicit user preferences entered by a user (if any) and/or user behavior from other client applications, then generate various user profile elements.
- a User Profile Generation Agent may continuously update a profile based upon information gathered that may be used to characterize user behavior.
- User Behavior Synthesizer A functional device or agent within a User Profile Generation Agent that may be used to receive a variety of data, such as user behavior information, location information and user profile inference rules to generate synthesized profile attributes.
- Profile Element Refiner A functional device or agent within a User Profile Generation Agent that may receive profile attributes generated by a user behavior synthesizer as well as a number of user profile inference rules.
- a Profile Element Refiner may refine profile attributes, process them through queries sent to a profile attribute processor, and generate user profile elements.
- Profile Attribute Processor A server and/or resident agent of a server that may process profile attribute requests that may require data-intensive lookups, and then respond with refined profile attributes.
- TCM Filtering Agent A client agent that may receiver a number of TCMs with their respective meta-data, TCM targeting rules and TCM filtering rules, then store some or all of the TCMs in a TCM-cache memory.
- the filtering agent may also take a user profile as input from the User Profile Generation Agent.
- Advertisement Filtering Agent A client agent that may receive a number of advertisements with their respective metadata, advertisement targeting rules and advertisement filter rules, then store some or all of the received advertisements in an advertisement cache memory.
- the filtering agent may also take a user profile as input from the User Profile Generation Agent.
- An advertising filtering agent is an example of a TCM filtering agent.
- TCM Cache Manager A client agent that can maintain a targeted content-message cache.
- a cache manager may take cached targeted content-messages from a filtering agent, and respond to content-message requests from other applications on the access terminal.
- Advertisement Cache Manager A client agent that can maintain an advertisement cache.
- a cache manager may take cached advertisements from a filtering agent and respond to advertisement requests from other applications on the access terminal.
- An advertisement cache manager is an example of a TCM cache manager.
- User Profile Attributes User behavior, interests, demographic information, and so on that may be synthesized by a user behavior synthesizer to form profile attributes, which may be viewed as intermediate pre-synthesized forms of data that may be further processed and refined by a profile element refiner into more refined user profile elements.
- User Profile Elements Items of information used to maintain a user profile, which may include various types of data useful to categorize or define the user's interests, behavior, demographic etc.
- TCM Targeting Rules may include rules related to the presentation of a targeted-content-message specified by a Mobile TCM Provider.
- Advertisement Targeting Rules may include rules specified by advertisers to impose rules/restrictions on how advertisements may be displayed and/or rules to target an advertisement towards a particular segment of users. They may be specific to a number of criteria, such as an advertisement campaign or advertisement group. Advertisement Targeting Rules are an example of TCM Targeting Rules.
- TCM Playback Rules These can include display rules specified by a client application while querying a TCM Cache Manager for TCMs to display in the context of their application.
- Advertisement Playback Rules These can include display rules specified by a client application while querying an Advertisement Cache Manager for advertisements to display in the context of their application. Advertisement Playback Rules are an example of TCM Playback Rules.
- TCM Filter Rules These can include rules upon which TCMs may be filtered. Typically, a system operator may specify these rules.
- Advertisement Filter Rules These can include rules upon which advertisements may be filtered. Typically, a system operator may specify these rules. Advertisement Filter Rules are an example of TCM-Filter-Rules.
- User Profile Element Inference Rules can include rules, specified by a system operator (and/or a third party), that may be used to determine one or more processes usable to build a user profile from demographic and behavioral data.
- TCM Telescoping A display or presentation function for a TCM whereby additional presentation material may presented to a user in response to a user request.
- Advertisement Telescoping An advertisement display or presentation function whereby additional presentation material may presented to a user in response to a user request. Advertisement Telescoping is an example of TCM telescoping.
- W-ATs wireless access terminals
- One of the many approaches of this disclosure used to alleviate privacy issues includes offloading a variety of processes onto a user's W-AT that may, in turn, be used to generate a set of information that likely characterizes the user, i.e., it can create a “user profile” of the user on the W-AT itself. Accordingly, targeted-content-messages, such as advertisements and other media, may be directed to the user's W-AT based on the user's profiles without exposing potentially sensitive customer information to the outside world.
- M-TCM-PS Mobile TCM Processing System
- MAS Mobile Advertising System
- a MAS may also provide an analytical interface capable of reporting on the performance of a particular advertisement campaign. Accordingly, an appropriately constructed MAS may provide a better consumer experience by presenting only non-intrusive advertisements that are likely to be of interest to consumers.
- directed content such as commercial advertising
- content such as stock reports, weather reports, religious information, news and sports information specific to a user's interests, and so on is envisioned within the bounds of this disclosure.
- directed content may be an advertisement
- a score for a sports event and a weather report may just as easily be directed content.
- devices such as advertising servers may be viewed as more general content servers, and advertising-related agents and devices may be more generally thought of as content-related agents and servers.
- Information exchange between a TCM-enabled WAT and a content-related agent or server can be encrypted. All further discussion is provided in the context of advertisements as an example of a TCM (Targeted Content Message), and it should be noted that such discussion is applicable to Targeted-Content-Messages in general.
- FIG. 1 is a diagram of some of the various functional elements of a MAS showing the interaction between an advertisement-enabled W-AT 100 with a communication network having an advertising infrastructure.
- the exemplary MAS includes the advertisement-enabled mobile client/W-AT 100 , a radio-enabled network (RAN) 190 and an advertising infrastructure 150 embedded in the network associated with the wireless WAN infrastructure (not shown in FIG. 1 ).
- the advertising infrastructure could be available at a remote server not geographically co-located with a cellular base station in the wireless WAN.
- the W-AT can include a client applications device 110 , a client advertisement interface 112 , a metric collection agent 120 , an ad caching manager 122 , an ad filtering agent 124 , a metric reporting agent 126 , an advertisement reception agent 120 and a data service layer device 130 .
- the advertising infrastructure 150 can include an advertisement sales agent 160 , an analytics agent 162 , a server advertisement interface 164 , an advertisement ingestion agent 170 , an advertisement bundling agent 174 , an advertisement distribution agent 176 , a metric database 172 , a metric collection agent 178 , and having a proxy server 182 .
- the “client side” of the MAS can be handled by the W-AT 100 (depicted on the left-hand side of FIG. 1 ).
- the present W-AT 100 may have advertisement-related applications at the applications level 110 , which in turn may be linked to the rest of the MAS via a client advertisement interface 112 .
- the client advertisement interface 112 may provide for metrics/data collection and management. Some of the collected metrics/data may be transferred to the metric reporting agent 126 and/or to the W-AT's data service layer 130 (via the metric collection agent 120 ), without exposing individually identifiable customer information, for further distribution to the rest of the MAS.
- the transferred metrics/data may be provided through the RAN 190 to the advertising infrastructure 150 (depicted on the right-hand side of FIG. 1 ), which for the present example includes a variety of advertising-related and privacy-protecting servers.
- the advertising infrastructure 150 can receive the metrics/data at a data service layer 180 , which in turn may communicate the received metrics/data to a number of metrics/data collection servers (here metric collection agent 178 ) and/or software modules.
- the metrics/data may be stored in the metric database 172 , and provided to the advertising server interface 164 where the stored metrics/data may be used for marketing purposes, e.g., advertising, sales and analytics.
- information of interest may include, among other things, user selections at a W-AT and requests for advertisements executed by the W-AT in response to instructions provided by the advertising infrastructure 150 .
- the server advertisement interface 164 can provide a conduit for supplying advertisements (advertising ingestion), bundling advertisements, determining a distribution of advertisements and sending advertising through the data service layer 180 of the advertising infrastructure 150 to the rest of the MAS network.
- the advertising infrastructure 150 can provide the W-AT 100 with the advertisements, and metadata for advertisements.
- the W-AT 100 can be instructed by the advertising infrastructure 150 to select advertisements based on any available advertisement metadata according to rules provided by the advertising infrastructure.
- the exemplary W-AT 100 may be enabled to generate, in whole or in part, a user profile for the W-AT's user that, in turn, may be useful to enable the MAS to deliver targeted advertisements of likely interest to the user. This may result in better “click-through rates” for various advertisement campaigns.
- generating a user profile may raise privacy concerns because of the potentially sensitive nature of data that may reside in the user profile.
- privacy concerns may be alleviated by enabling a user's W-AT to generate a user profile while subsequently limiting the user profile to the confines of the user's W-AT except in very limited (and controlled) circumstances.
- FIG. 2 is a block diagram showing operational details of the exemplary W-AT of FIG. 1 configured to generate and use a user profile.
- the exemplary W-AT includes a processing system capable of processing a number of applications including a number of core client applications and a client advertising interface. Note that some components, such as the ad reception agent 128 and data service layer 130 , are omitted from FIG. 2 for simplicity of explanation for the functions relevant to FIG. 2 .
- FIG. 2 is shown having a platform specific adaptation interface 111 between the client advertisement interface 112 and the client applications device 110 , and an advertisement filtering agent 124 having a user profile generation agent 210 and a client advertisement filtering agent 220 responsive to the user profile generation agent 210 .
- An advertisement cache memory 240 is shown in communication with the advertisement cache manager 122 .
- External devices e.g., profile attribute processor 270 , system operator (or 3 rd party) 280 and advertisement sales interface 164 , are shown in communication with the advertisement filtering agent 124 .
- Devices 270 , 280 and 164 are generally not part of a W-AT, but likely to reside in another portion of a MAS network.
- each of these functional blocks may take a variety of forms including separate pieces of dedicated logic, separate processors running separate pieces of software/firmware, collections of software/firmware residing in a memory and being operated upon by a single processor, and so on.
- the client applications device 110 may perform any number of functional applications useful for telecommunications (e.g., calls and text messaging) or other tasks (e.g., games) using the platform specific adaptation interface 111 to interface with the client advertisement interface.
- the client advertisement interface 112 can be used to allow the W-AT 100 to perform a number of useful processes, such as monitor user behavior and pass user-related information to the user profile generation agent 210 .
- the user profile generation agent 210 may accrue user behavior information from the metrics collection agent 120 , which itself may receive the same or different information from the client advertisement interface 112 .
- user behavior may include advertising-related responses, such as advertisement clicks and other metrics indicating types and frequency of usage.
- Other user behavior information may include direct user preferences or authorizations.
- the metrics collection agent 120 may provide metrics/data to the metrics reporting agent 126 , which in turn may provide the metrics/data information to other components of MAS (discussed below) that may be internal or external to a W-AT.
- the profile attribute processor 270 can process incoming profile attribute processing requests from the W-AT 100 that require (or can otherwise benefit from) data-intensive lookups and respond with refined profile attributes to the user profile generation agent 210 .
- One function of the user profile generation agent 210 may include providing user profile information to the client advertisement filtering agent 220 , which may determine advertisements that may be provided to the W-AT's user in accordance with relevant filter rules, as well as advertisement data and advertisement metadata from the advertising sales interface 164 .
- the advertisement filtering agent 220 may also provide filtered advertisements to the advertisement cache manager 122 , which in turn may store and later provide such advertisements (via advertisement cache memory 240 ) for presentation to the user.
- a user profile generation agent can be any collection of hardware and/or software residing in a Mobile Advertising Enabled W-AT that can be used to collect user behavior information.
- Potential information sources may include, but are not limited to, applications residing on the user's W-AT, public information available in various accessible databases, previous user responses to advertisements, location data from a resident GPS radio and explicit user preferences entered by the user (if any). Any user profile information gathered may then be processed/synthesized to generate user profile attributes or elements, which may better characterize the user while using less memory resources.
- user profile inference rules provided by a system operator may drive the particular actions of a W-AT's user profile generation agent.
- these rules may be of a number of types, including: (1) Basic Rules, which include actions to be performed by a user profile generation agent on a pre-determined schedule associated with each action; and (2) Qualified Rules, which include “action(s)” that are qualified by a “condition”, where the “condition” may define a behavior that needs to be true, and the “action” may define an action taken by a rule engine of the user profile generation agent when the condition is detected to be true.
- Such rules may be useful in inferring information from specific user actions or behavior.
- a simple rule for a user profile generation agent might be to store GPS derived location information for the user's W-AT every five minutes.
- An associated rule could be that the location most frequented within a 09:00-17:00 time range in the day be marked as the user's likely work location.
- a rule qualified by a condition might be to add a “game” category to the user's list of interests if the user often spends more than 30 minutes a day in the gaming applications on his W-AT.
- the user profile generation agent may also take as input user preferences including user selection concerning express authorization of the user to derive a profile using location data, other authorizations made by the user and other specific information entered by the user. E.g. the user might input his preference to view travel related advertisements.
- a user profile generation agent may utilize any retrieved W-AT information to tailor information content in a manner best suited for the W-AT, including the choice of menu layout, such as linear, hierarchical, animated, popup and softkeys.
- profile generation rules can be interpreted by the W-AT's embedded user profile generation agent, there might be some rules that require large database lookups, e.g., government census data. Since memory on the W-AT may be too limited to accommodate large databases, it may be possible to further refine the already synthesized user behavior and demographic data by offloading the appropriate refinement tasks to a specially configured server at the W-AP side of the MAS network.
- any such external server capable of assisting in user profile generation may be referred to as a “profile attribute processor.” Additional discussion of profile attribute processors is provided below with respect to FIG. 4 .
- FIG. 3 is a schematic block diagram of the previously presented user profile generation agent 210 shown in the context of interacting with other devices 312 and 280 .
- Various capabilities of the user profile generation agent 210 are provided in part below.
- a mobile phone can be carried by a user wherever he/she goes.
- the W-AT can determine where the user is periodically or a-periodically spending some or most of his/her time.
- the use of GPS information and demographic data associated with locations that the user frequents may allow the development of at least some portions of a demographic profile associated with the user.
- Typical demographic profile elements associated with the user's profile using the location information may include, but are not limited to:
- the Mobile Advertising Enabled Client might be configured by the network to maintain two demographic profiles for the user—one for his “home” location (most frequented location between, say, 21:00-06:00) and one for his “work” location (most frequented location between, say 09:00-17:00).
- a user profile may be further developed using any of a W-AT's numerous applications. Which applications, e.g., games, a user tends to spend most of his time with or how he interacts with the various applications on the phone may provide an opportunity to build a profile for the user based on his behavior and preferences. Most of the data mining and user behavior profile determination of this sort can be done on the W-AT itself, being driven by user profile inference rules fed to the user profile generation agent 210 .
- Typical behavioral profile elements associated with a user may include, but are not limited to, the following:
- profile elements can be inferred from behavior mined by adding hooks to observe application behavior through a native user interface application on a W-AT. It is through such applications that the user may launch other applications. Applications of interest to the user and time spent in these applications can be inferred by monitoring when the user launches and exits a particular application.
- Rules fed to the user profile generation agent 210 can associate interest categories for a user based on the user's interactions with applications. Interest categories can also be assigned to the user profile using server assisted collaborative filtering on the behavior data collected at the W-AT.
- Rules that may get downloaded to the user profile generation agent 210 may allow a server to control the functioning of the user profile generation agent 210 in a dynamic fashion.
- a server By mining raw data on the incumbent W-AT and synthesizing it into more meaningful information (profile attributes), particular sensitive user behavior information can be transformed into advertisement behavior categories and user profile elements versus maintaining data in raw form.
- An exemplary W-AT can keep track of the advertisements of interest to the user and the keywords associated with such advertisements. Multiple clicks on the same advertisement may indicate to a user profile agent an interest level associated with the associated keywords and advertisement. On the same lines, games and music of interest to the user can be maintained at the W-AT. Server-assisted mode can also be used to associate user interest categories with the user's profile based on the user's music and game play-lists.
- such a profile can take a variety of forms, e.g., synthesized profile attributes and elements.
- some or all data attributes and elements in a user profile may have some confidence level associated with them. That is, because certain elements and attributes are based upon inferences and rules, their results may not be certain and have “fuzziness” associated with them. This fuzziness may be expressed as a confidence level associated with a user profile attribute and element.
- the profile generator might say that the user is likely to be in the age group from 15-24 with a confidence level of 60%. That means that if 100 users sending more than five-hundred SMS messages per month were to be polled for their age, about 60 of them are likely to fall within the age group of 15-24.
- the confidence level may indicate the number of times the profile attribute is expected to be accurate in a sample of one-hundred users with the same home location.
- the exemplary user profile generation agent 210 can also be fed rules to combine confidence levels on the same profile attribute from multiple sources to come up with a unified confidence level for the attribute. For example, if the SMS usage rate indicates that the user is within the age group of 15-24 years with a 60% confidence level and demographic profile for the home location indicates that the user is in age group of 15-24 years with a 20% confidence level, then these two items can be combined with fuzzy logic rules to come up with a unified confidence level for the user lying in the same age group.
- FIG. 4 is a schematic block diagram for a profile attribute processor 270 handling a request by a W-AT for profile attribute processing.
- a W-AT may be able to handle most processing, there may be cases where huge database lookups are required to determine portions of a behavior or demographic profile.
- An example of such cases includes instances where census databases, which may require gigabytes of storage, are useful.
- a profile attribute processor (or other assisting server) may be used to process user information to provide more refined forms of user profile information.
- synthesized profile attributes may be gathered at the relevant W-AT, and sent to the profile attribute processor 270 noting that the use of synthesized profile attributes can result in better use of bandwidth.
- Some of the user profile attributes, which require data-intensive lookups, can be processed by the profile attribute processor 270 optionally by anonymously querying techniques to protect user identities.
- the profile attribute processor 270 may further refine any received attributes, and provide the refined data to the appropriate W-AT in what may be referred to as a set of refined user profile attributes.
- the profile attribute processor 270 may process various types of specific and non-specific synthesized data regarding a user's behavior and demographics (e.g., profile attributes) and respond with the appropriate refined profile information.
- a user's behavior and demographics e.g., profile attributes
- some form of data scrambling e.g., a hashing function and a number of other tools may be employed via a device, such as the one-way hash function generator 810 of FIG. 8 .
- a hashing function employed in a W-AT can generate a predictable and unique, but anonymous, value associated with a particular user. Such an approach can enable the W-AT to query external servers without compromising on the privacy of the user.
- a hashing function may be based on a primary identifier of the W-AT, e.g. a serial number associated with the W-AT, as well as. a random value, a pseudo-random value, and a time-based value. Further, the hashing function may be calculated to provide a low probability of collision with other generated values.
- the W-AT may use the same random number for subsequent queries to allow external servers to associate multiple queries from the same client.
- the use of the random number can help to prevent external servers (or unauthorized agents) from doing a reverse lookup on a subscriber base to determine a user's identity.
- the hashed value may be used as an alternate user identifier for the W-AT and provided, along with geographic information or some or items of information from a user profile, and provided to a remote apparatus.
- one or more targeted content messages can be received from the remote apparatus based on the alternate user identifier and first advertisement-related information to the remote apparatus and/or other information capable of supplementing a user profile. Such information can be incorporated into the user profile of the W-AT.
- FIG. 9 depicts a particular communication scheme employing a proxy server for securely communicating in a mobile advertising-enabled network.
- a W-AT 910 the “Mobile Advertising-Enabled Client”
- WAP wireless application protocol
- the WAP proxy 920 can forward the request to a secure proxy server 930 , which may then create a transaction ID, change out the header to remove the W-AT's identification information in favor of the transaction ID, and forward the request to a mobile advertising server 940 while creating a look-up table containing that information, e.g., the W-AT's IP address, useful to relay a reply.
- a secure proxy server 930 may then create a transaction ID, change out the header to remove the W-AT's identification information in favor of the transaction ID, and forward the request to a mobile advertising server 940 while creating a look-up table containing that information, e.g., the W-AT's IP address, useful to relay a reply.
- the proxy server 930 may use the appropriate transaction ID to forward the mobile advertising server's reply. Later, the proxy server 930 may delete the look up table entry.
- the W-ATs may elect not to query the server for refinement of location data in real-time.
- queries can be sent anonymously and sparsely over an extended period of time (e.g., once a month).
- a typical schedule could be, for example, to collect location information every 5 minutes for 72 hours.
- the most frequented location during this time frame or during specific time frames can be used to query the demographic profile of the user from the server at a randomly selected time between 30 and 40 days or by some other schedule specified by a the system operator.
- FIG. 5 is a schematic block diagram shown depicting an exemplary operation of such a hybrid approach using a user profile generation agent 210 having a user behavior synthesizer 522 and a profile element refiner 524 . While the majority of functionality of the various devices of FIG. 5 has already been discussed above, further functionality will be described below with respect to the following flowcharts.
- FIG. 6 is a flowchart outlining an exemplary operation for generating and using a user profile.
- the operation starts in step 602 as a number of user profile inference rules (basic and/or qualified rules) can be received (and subsequently stored) by a W-AT from a system operator or other party.
- user profile inference rules basic and/or qualified rules
- basic rules may include pre-scheduled events, e.g., performing a query of the user at a specific time.
- a respective qualified rule might require the same query to be preceded by a condition and/or event, such as physical status information or operational status information.
- the received rules can be used to collect raw data, and in step 606 the raw data may be processed/synthesized into user profile elements or attributes noting that while all such processing/synthesizing may occur on board the W-AT, some refinement may occur using external devices, such as the profile attribute processors discussed above. That is, as discussed above raw data and/or synthesized data may be incorporated to form a user profile for the W-AT's user.
- a rule relating to monitoring SMS messages may be used to change a dynamic property of a user profile when applied to collect raw data and synthesize profile attributes/elements regarding SMS messages.
- Static data e.g., a user's birth date, may be likewise collected using a rule to query the user, and then applied as an element in a user profile.
- confidence levels for user profile data can be determined.
- confidence levels can have a variety of forms, such as a range of numbers, variance statistic, or distribution profile.
- various received rules plus raw data and synthesized data relating to various user profile elements and attributes, which may form all of a user profile may be used to receive targeted advertisements. That is, as discussed above, in various embodiments a used/usable rule on a W-AT may be used to generate a user profile—along with collected raw data and synthesized data—to provide any number of static or dynamic properties of the user profile, and such information may be used to receive content, such as advertisements, sports scores, weather reports and news directed to subjects of likely interest.
- rules may be applied to the confidence levels and targeted content messages may be received and displayed based on such confidence information.
- control of the operation may jump back to step 602 where new/more rules may be received and used to collect data and modify the user's profile.
- rules may be used based on physical configuration of an W-AT so as to utilize W-AT information to tailor content display in a manner suited for the W-AT to create suitable displays, such as menu layouts having linear, hierarchical, animated, popup and/or softkey attributes.
- FIG. 7 is a flowchart outlining another exemplary operation for generating and using a user profile.
- the operation starts in step 702 as a number of user profile inference rules are received by a W-AT from a system operator or other party.
- the received rules can be used to collect raw data, and in step 706 the raw data may be processed/synthesized into user profile elements or attributes using onboard resources.
- any item of user profile information may have confidence level information processed and synthesized along with the basic data.
- a determination may be made as to whether further information or processing is required that may not be practical on a W-AT. For example, assuming that a W-AT has accrued a series of locations for which the W-AT regularly has visited using a GPS, a software agent on the W-AT using one or more rules may determine the need to query a large external database, such as a geographic information service or a national census database on a remote server, to determine a likely ethnicity (or other demographics) of the user. If further information or processing is required, control continues to step 712 ; otherwise, control of the operation may jump back to the step 720 where profile attributes are used to generate/modify the user's profile.
- a request may be made of an external device (step 712 ), such as by the profile attribute processor discussed above (optionally using hashing functions and/or proxy servers) to protect user information.
- the external device can perform any number of refinement steps, such as query large databases, to produce refined user profile attributes.
- refined user profile attributes may then be provided to the appropriate W-AT, where (in step 720 ) they may be used to generate, modify or otherwise incorporated in a user profile.
- confidence levels when confidence levels are available for processing, unified confidence levels may be determined based on individual confidence levels. Control of the operation may then jump back to the step 702 where new/more rules may be received and used to collect data and modify the user's profile.
- FIG. 10 a first communication protocol for advertisement distribution in a mobile advertising-enabled network is depicted.
- This exemplary figure illustrates a possible data flow during a multicast “push” of advertisements from an ad server.
- the User Profile Generation Agent in the Mobile Device (W-AT) 100 of FIG. 10 ) can retrieve advertisements, then and select one or more of the received the advertisements by internal filtering.
- a network system operator 280 may provide profile attribute processing rules to the profile attribute processor 270 .
- the profile attribute processor 270 may also receive a profile attribute process request from modules on the W-AT 100 and provide an appropriate response through modules on the W-AT 100 .
- multicast or broadcast advertisements may be received by the W-AT 100 .
- the W-AT 100 (or other Mobile Device) can be able to receive all advertisements and determine which advertisements are to be stored and presented to the user in accordance with the user profile generated at the W-AT 100 and the filter rules also received from an ad server, such as the multicast/broadcast distribution server 1010 of FIG. 10 .
- FIG. 11 depicts a second communication protocol for advertisement distribution in a mobile advertising-enabled network.
- a network system operator 280 may provide profile attribute processing rules to the profile attribute processor 270 , and the profile attribute processor 270 may also receive a profile attribute process request from modules on the W-AT 100 to provide an appropriate response through modules on the W-AT 100 .
- unicast advertisements may be requested by the W-AT 100 from the ad distribution server 1110 .
- the W-AT 100 may be able to receive all advertisements over a unicast communication link and determine which advertisements are to be stored and presented to the user in accordance with the user profile generated at the W-AT 100 and the filter rules also received from the ad server 1110 .
- FIG. 12 depicts a third communication protocol for advertisement distribution in a mobile advertising-enabled network.
- a network system operator 280 may provide profile attribute processing rules to the profile attribute processor 270 , and the profile attribute processor 270 may also receive a profile attribute process request from modules on the W-AT 100 to provide an appropriate response through modules on the W-AT 100 .
- the ad distribution server 1210 may receive user profile information provided by the W-AT 100 , process the received user profile information, and then provide the appropriate targeted ads to the W-AT 100 .
- FIG. 13 depicts a fourth communication protocol for advertisement distribution in a mobile advertising-enabled network. This example may work much the same as the previous examples with respect to the profile attribute processor side of operation. However, the ad retrieval over the unicast communication link is substantially different.
- the W-AT 100 may send a request for advertisements where after the W-AT 100 can receive a set of metadata representative of the various advertisements available in the ad distribution server 1310 .
- the W-AT 100 may then select a number of advertisements based on the metadata and on the filtering rules within the W-AT 100 , and provide the selection information to the ad distribution server 1310 . Accordingly, the selected advertisements can then be provided to the W-AT 100 and presented to the user in accordance with the user profile rules.
- the above approach keeps the user profile local on the W-AT while using optimal network bandwidth when delivering advertisements to the W-AT over the unicast communication link.
- FIG. 14 depicts a timeline for a first communication protocol for downloading advertising content according to “contact windows” (see exemplary windows 1410 - 1416 ) approach. This may be used to permit downloading of advertisements at an opportune time without burdening other functions of the W-AT.
- the W-AT may be able to adjust its sleep mode, if engaged, to the contact windows. In operation, a W-AT can be put into a sleep mode to optimize energy consumption on the platform during content message delivery. It is possible that in a sleep mode, the W-AT may be engaged in other useful operations.
- a W-AT may be able to be put into a sleep mode while various timing circuitry (not shown) may be programmed or otherwise manipulated to respond to the sleep mode and a contact window or other schedule by dis-engaging the sleep mode before/during the contact window, and possible re-engaging sleep mode subsequent to receiving targeted content messages or at the end of the relative contact window.
- FIG. 15 depicts an alternate timeline for a first communication protocol for downloading advertising or other targeted-content-message information according to a defined time schedule. See, exemplary windows 1510 - 1520 . This approach may be used to permit downloading of advertisements at an opportune time without burdening other functions of the W-AT.
- the defined time schedule permits the W-AT to remain in sleep mode except during the defined time schedule.
- various timing/clock circuitry may be employed to engage and dis-engage a W-AT to/from sleep mode.
- the W-AT when the W-AT wakes up to receive targeted-content-message information, it can receive targeting meta-data and reception times for future targeted-content-messages, which can then be used to determine whether to receive a future targeted-content-message based on the user profile and the targeting meta-data, and to schedule an appropriate wakeup time prior to the reception time for a future targeted-content-message.
- the techniques and modules described herein may be implemented by various means. For example, these techniques may be implemented in hardware, software, or a combination thereof.
- the processing units within an access point or an access terminal may be implemented within one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing W-ATs (DSPDs), programmable logic W-ATs (PLDs), field programmable gate arrays (FPGAs), processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described herein, or a combination thereof.
- ASICs application specific integrated circuits
- DSPs digital signal processors
- DSPDs digital signal processing W-ATs
- PLDs programmable logic W-ATs
- FPGAs field programmable gate arrays
- processors controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described herein, or a combination thereof.
- the techniques described herein may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein.
- the software codes may be stored in memory units and executed by processors or demodulators.
- the memory unit may be implemented within the processor or external to the processor, in which case it can be communicatively coupled to the processor via various means.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Game Theory and Decision Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Data Mining & Analysis (AREA)
- Medical Informatics (AREA)
- Tourism & Hospitality (AREA)
- Human Resources & Organizations (AREA)
- Primary Health Care (AREA)
- Information Transfer Between Computers (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Information transfer methods for exchange of information with a wireless access terminal (W-AT) includes receiving a first message from the W-AT, the first message including first information provided by the W-AT and an address of the W-AT capable of identifying the W-AT, converting the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), transmitting the anonymized message to a remote server, receiving a first response from the remote server, the first response having response information and the anonymized address information, converting the first response to a second response by replacing the transaction ID with the W-AT address, and transmitting the second response to the W-AT.
Description
- The present Application for Patent is a Continuation of U.S. Non-Provisional application Ser. No. 12/134,688, entitled “METHOD FOR TRANSFER OF INFORMATION RELATED TO TARGETED CONTENT MESSAGES THROUGH A PROXY SERVER”, filed on Jun. 6, 2008, which is assigned to the assignee hereof and hereby expressly incorporated by reference herein in its entirety, and which in turn claims priority to Provisional Application No. 60/948,450 entitled “USER PROFILE GENERATION ARCHITECTURE FOR MOBILE ADVERTISING” filed Jul. 7, 2007, and Provisional Application No. 60/948,451 entitled “USER PROFILE GENERATION ARCHITECTURE FOR MOBILE ADVERTISING USING SECURE EXTERNAL PROCESSES” filed Jul. 7, 2007, and Provisional Application No. 60/948,452 entitled “METHOD AND SYSTEM FOR PROVIDING TARGETED ADVERTISING BASED ON A USER IN A MOBILE ENVIRONMENT” filed Jul. 7, 2007, and Provisional Application No. 60/948,453 entitled “USER PROFILE GENERATION ARCHITECTURE FOR MOBILE ADVERTISING USING PROFILE ATTRIBUTES HAVING VARIABLE CONFIDENCE LEVELS” filed Jul. 7, 2007, and Provisional Application No. 60/948,455 entitled “METHOD AND SYSTEM FOR DELIVERY OF TARGETED ADVERTISING BASED ON A USER PROFILE IN A MOBILE COMMUNICATION DEVICE” filed Jul. 7, 2007, and Provisional Application No. 60/948,456 entitled “USER PROFILE GENERATION ARCHITECTURE FOR MOBILE ADVERTISING” filed Jul. 7, 2007, all of which are assigned to the assignee hereof and hereby expressly incorporated by reference herein in their entirety.
- This disclosure relates to wireless communications. In particular, the present disclosure relates to wireless communications systems usable for targeted content-message and related transactions.
- Mobile Targeted-Content-Message (TCM)-enabled systems can be described as systems capable of delivering targeted content information, such as local weather reports and advertisements targeted to a particular demographic, to wireless communication devices (WCDs), such as cellular telephones or other forms of wireless access terminals (W-ATs). Such systems may also provide a better user experience by presenting non-intrusive targeted-content-messages that are likely to be of interest to a user.
- An example of a mobile TCM-enabled system is a mobile advertising system capable of delivering advertisements to wireless communication devices (WCDs). Generally, a mobile advertising system can provide such things as an advertisement sales conduit for a cellular provider to provide advertisements on a W-AT, as well as some form of analytical interface to report back on the performance of various advertisement campaigns. A particular consumer benefit of mobile advertising is that it can provide alternate/additional revenue models for wireless services so as to allow more economical access to the wireless services to those consumers willing to accept advertisements. For example, the revenue generated through advertising may allow W-AT users to enjoy various services without paying the full subscription price usually associated with such services.
- In order to increase the effectiveness of TCMs on W-ATs, it can be beneficial to provide targeted information, i.e., TCMs which are deemed likely to be well received by, and/or of likely interest to, a particular person or a designated group of people.
- Targeted-Content-Message (TCM) information can be based on immediate needs or circumstances, such as a need to find emergency roadside service or the need for information about a travel route. Targeted-Content-Message information can also be based on specific products or services (e.g., games) for which a user has demonstrated past interest, and/or based on demographics, for example, a determination of an age and income group likely to be interested in a particular product. Targeted Advertisements are an example of TCMs.
- Targeted advertisements can provide a number of advantages (over general advertisements) including: (1) in an economic structure based on cost per view, an advertiser may be able to increase the value of his advertising budget by limiting paid advertising to a smaller set of prospects; and (2) as targeted advertisements are likely to represent areas of interest for a particular user, the likelihood that users will respond positively to targeted advertisements increases substantially.
- Unfortunately, the information that makes some forms of targeted advertising possible may be restricted due to government regulations and the desire of people to limit the dissemination of their personal information. For example, in the US, such government restrictions include the Graham-Leach-Bliley Act (GLBA), Title 47 of the United States Code, Section 222—“Privacy of Customer Information.” In comparison, the European Union has a policy of protecting “personal data” or “any information relating to an identified or identifiable natural person (‘data subject’); an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his physical, physiological, mental, economic, cultural or social identity.” Common carriers also may be restricted from using personal information about their subscribers for marketing purposes. For example, the GLBA prohibits access to individually identifiable customer information, as well as the disclosure of location information, without the express prior authorization of the customer.
- Thus, new technology for delivering targeted advertising in a wireless communication environment is desirable.
- In an exemplary embodiment, an information transfer method for exchange of information with a wireless access terminal (W-AT) includes receiving a first message from a W-AT, the first message including first information related to targeted-content-message information and/or user profile information provided by the W-AT and an address of the W-AT capable of identifying the W-AT, converting the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), transmitting the anonymized message to a remote server, receiving a first response from the remote server, the first response having response information and the anonymized address information, converting the first response to a second response by replacing the transaction ID with the W-AT address, and transmitting the second response to the W-AT.
- In another exemplary embodiment, a proxy server capable of transferring information to a wireless access terminal (W-AT) includes means for receiving a first message from a W-AT, the first message including first information related to targeted content message information and/or user profile information provided by the W-AT and an address of the W-AT capable of identifying the W-AT, means for converting the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), means for transmitting the anonymized message to a remote server, means for receiving a first response from the remote server, the first response having response information and the transaction ID, means for converting the first response to a second response by replacing the transaction ID with the W-AT address; and means for transmitting the second response to the W-AT by use of the W-AT address information.
- In another exemplary embodiment, a proxy server capable of transferring information to a wireless access terminal (W-AT) includes wireless receiving circuitry configured to receive a first message from a W-AT, the first message including first information related to targeted content message information and/or user profile information provided by the W-AT and an address of the W-AT capable of identifying the W-AT, first processing circuitry configured to convert the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), first transmitting circuitry configured to transmit the anonymized message to a remote server, first receiving circuitry configured to receive a first response from the remote server, the first response having response information and the transaction ID, second processing circuitry configured to convert the first response to a second response by replacing the transaction ID with the W-AT address, and wireless transmitting circuitry configured to transmit the second response to the W-AT by use of the W-AT address information.
- In another exemplary embodiment, a computer program product includes a computer-readable medium that includes a first set of instructions for receiving a first message from a W-AT, the first message including first information related to targeted content message information and/or user profile information provided by the W-AT and an address of the W-AT capable of identifying the W-AT, a second set of instructions for converting the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), a third set of instructions for transmitting the anonymized message to a remote server, a fourth set of instructions for receiving a first response from the remote server, the first response having response information and the anonymized address information, a fifth set of instructions for converting the first response to a second response by replacing the transaction ID with the W-AT address, and a sixth set of instructions for transmitting the second response to the W-AT.
- In another exemplary embodiment, one or more integrated circuits that together includes wireless receiving circuitry configured to receive a first message from a W-AT, the first message including first information provided by the W-AT and an address of the W-AT capable of identifying the W-AT, first processing circuitry configured to convert the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), first transmitting circuitry configured to transmit the anonymized message to a remote server, first receiving circuitry configured to receive a first response from the remote server, the first response having response information and the transaction ID, second processing circuitry configured to convert the first response to a second response by replacing the transaction ID with the W-AT address, and wireless transmitting circuitry configured to transmit the second response to the W-AT by use of the W-AT address information.
- In another exemplary embodiment, an apparatus includes processing circuitry; and a memory coupled to the processing circuitry that includes a first set of instructions for receiving a first message from a W-AT, the first message including first information related to targeted content messages provided by the W-AT and an address of the W-AT capable of identifying the W-AT, a second set of instructions for converting the first message to an anonymized message by replacing the W-AT address with a transaction identifier (ID), a third set of instructions for transmitting the anonymized message to a remote server, a fourth set of instructions for receiving a first response from the remote server, the first response having response information and the anonymized address information, a fifth set of instructions for converting the first response to a second response by replacing the transaction ID with the W-AT address, and a sixth set of instructions for transmitting the second response to the W-AT.
- The features and nature of the present disclosure will become more apparent from the detailed description set forth below when taken in conjunction with the drawings in which reference characters identify corresponding items and processes throughout.
-
FIG. 1 is a diagram showing the interaction between an exemplary wireless access terminal (W-AT) and a targeted-message-sending infrastructure. -
FIG. 2 is schematic block diagram showing the operation of an exemplary W-AT having an on-board user profile generation agent. -
FIG. 3 is a schematic block diagram showing an exemplary operation of a data transfer of a user profile generation agent. -
FIG. 4 is a schematic block diagram handling an exemplary request for profile data processing. -
FIG. 5 is a schematic block diagram showing an exemplary operation of a user profile generation agent. -
FIG. 6 is a flowchart outlining an exemplary operation for generating and using a user profile. -
FIG. 7 is a flowchart outlining another exemplary operation for generating and using a user profile. -
FIG. 8 is a diagram illustrating the use of a one-way hash function for client identity protection when identifiable data is transferred to a mobile targeted-message-sending server. A targeted-message-sending server is an example of mobile targeted-content-message processing server. -
FIG. 9 is a diagram illustrating data flow implemented by a proxy server for anonymizing identifiable data transferred to a mobile targeted-message-sending server. -
FIG. 10 depicts a communication protocol for content distribution in a mobile targeted-message-sending-enabled network. -
FIG. 11 depicts another communication protocol for content distribution in a mobile targeted-message-sending-enabled network. -
FIG. 12 depicts another communication protocol for content distribution in a mobile targeted-message-sending-enabled network. -
FIG. 13 depicts another communication protocol for content distribution in a mobile targeted-message-sending-enabled network. -
FIG. 14 depicts a timeline for a first communication protocol for downloading targeted-message-sending content according to “contact windows” approach. -
FIG. 15 depicts an alternate timeline for a communication protocol for downloading targeted-message-sending content according to a defined time schedule. - The terms and respective definitions/descriptions below are provided as a reference to the following disclosure. Note, however, that when applied to certain embodiments, some of the applied definitions/descriptions may be expanded or may otherwise differ with some of the specific language provided below as may be apparent to one of ordinary skill and in light of the particular circumstances.
- TCM—Targeted-Content-Message. An advertisement can be an example of a Targeted-Content-Message.
- M-TCM-PS—Mobile Targeted-Content-Message Processing System
- MAS—Mobile advertising system.
- UPG—User Profile Generation Agent
- M-TCM-EC—Mobile TCM-Enabled Client
- MAEC—Mobile advertising enabled client. This can be an example of a Mobile TCM-Enabled Client
- Mobile TCM Provider (M-TCM-P)—A person or an entity that may want to display a targeted-content-message through a targeted-content-message processing system.
- Advertiser—A person or an entity that may want to display advertisements through a mobile advertising system (MAS). An advertiser may provide the advertisement data along with respective targeting and playback rules, which may in some instances form advertisement metadata to a MAS. An advertiser is an example of a Mobile TCM Provider.
- TCM Metadata—A term used to identify data that can be used to provide additional information about a respective Targeted-Content-Message (TCM).
- Advertisement Metadata—A term used to identify data that may be used to provide additional information about a respective advertisement. This may include, but is not limited to, mime type, advertisement duration, advertisement viewing start time, advertisement viewing end time, etc. Respective advertisement targeting and playback rules provided by the advertiser may also get attached to an advertisement as metadata for the advertisement. Advertisement Metadata is an example of TCM metadata.
- Application Developer—A person who or an entity that develops an application for the mobile advertising enabled client (MAEC) that can feature advertisements.
- System Operator—A person who or entity that operates a MAS.
- Third Party Inference Rule Provider—A third party (other than a system operator) who may provide user profile inference rules to be used by a User Profile Generation Agent
- User Profile Generation Agent—A functional unit at the client that may receive various pertinent data, such as advertisement inference rules, user behavior from a metric collection agent, location data from a GPS, explicit user preferences entered by a user (if any) and/or user behavior from other client applications, then generate various user profile elements. A User Profile Generation Agent may continuously update a profile based upon information gathered that may be used to characterize user behavior.
- User Behavior Synthesizer—A functional device or agent within a User Profile Generation Agent that may be used to receive a variety of data, such as user behavior information, location information and user profile inference rules to generate synthesized profile attributes.
- Profile Element Refiner—A functional device or agent within a User Profile Generation Agent that may receive profile attributes generated by a user behavior synthesizer as well as a number of user profile inference rules. A Profile Element Refiner may refine profile attributes, process them through queries sent to a profile attribute processor, and generate user profile elements.
- Profile Attribute Processor—A server and/or resident agent of a server that may process profile attribute requests that may require data-intensive lookups, and then respond with refined profile attributes.
- TCM Filtering Agent—A client agent that may receiver a number of TCMs with their respective meta-data, TCM targeting rules and TCM filtering rules, then store some or all of the TCMs in a TCM-cache memory. The filtering agent may also take a user profile as input from the User Profile Generation Agent.
- Advertisement Filtering Agent—A client agent that may receive a number of advertisements with their respective metadata, advertisement targeting rules and advertisement filter rules, then store some or all of the received advertisements in an advertisement cache memory. The filtering agent may also take a user profile as input from the User Profile Generation Agent. An advertising filtering agent is an example of a TCM filtering agent.
- TCM Cache Manager—A client agent that can maintain a targeted content-message cache. A cache manager may take cached targeted content-messages from a filtering agent, and respond to content-message requests from other applications on the access terminal.
- Advertisement Cache Manager—A client agent that can maintain an advertisement cache. A cache manager may take cached advertisements from a filtering agent and respond to advertisement requests from other applications on the access terminal. An advertisement cache manager is an example of a TCM cache manager.
- User Profile Attributes—User behavior, interests, demographic information, and so on that may be synthesized by a user behavior synthesizer to form profile attributes, which may be viewed as intermediate pre-synthesized forms of data that may be further processed and refined by a profile element refiner into more refined user profile elements.
- User Profile Elements—Items of information used to maintain a user profile, which may include various types of data useful to categorize or define the user's interests, behavior, demographic etc.
- TCM Targeting Rules—These may include rules related to the presentation of a targeted-content-message specified by a Mobile TCM Provider.
- Advertisement Targeting Rules—These may include rules specified by advertisers to impose rules/restrictions on how advertisements may be displayed and/or rules to target an advertisement towards a particular segment of users. They may be specific to a number of criteria, such as an advertisement campaign or advertisement group. Advertisement Targeting Rules are an example of TCM Targeting Rules.
- TCM Playback Rules—These can include display rules specified by a client application while querying a TCM Cache Manager for TCMs to display in the context of their application.
- Advertisement Playback Rules—These can include display rules specified by a client application while querying an Advertisement Cache Manager for advertisements to display in the context of their application. Advertisement Playback Rules are an example of TCM Playback Rules.
- TCM Filter Rules—These can include rules upon which TCMs may be filtered. Typically, a system operator may specify these rules.
- Advertisement Filter Rules—These can include rules upon which advertisements may be filtered. Typically, a system operator may specify these rules. Advertisement Filter Rules are an example of TCM-Filter-Rules.
- User Profile Element Inference Rules—These can include rules, specified by a system operator (and/or a third party), that may be used to determine one or more processes usable to build a user profile from demographic and behavioral data.
- TCM Telescoping—A display or presentation function for a TCM whereby additional presentation material may presented to a user in response to a user request.
- Advertisement Telescoping—An advertisement display or presentation function whereby additional presentation material may presented to a user in response to a user request. Advertisement Telescoping is an example of TCM telescoping.
- As mentioned above, various regulations regarding telecommunications and privacy can make targeted advertising difficult. However, the present disclosure can provide a variety of solutions to deliver targeted advertising to wireless access terminals (W-ATs), e.g., cellular phones, while paying attention to privacy concerns.
- One of the many approaches of this disclosure used to alleviate privacy issues includes offloading a variety of processes onto a user's W-AT that may, in turn, be used to generate a set of information that likely characterizes the user, i.e., it can create a “user profile” of the user on the W-AT itself. Accordingly, targeted-content-messages, such as advertisements and other media, may be directed to the user's W-AT based on the user's profiles without exposing potentially sensitive customer information to the outside world.
- The various disclosed methods and systems may be used in a Mobile TCM Processing System (M-TCM-PS) (and, in particular, in a Mobile Advertising System (MAS)), which for the present disclosure may include an end-to-end communication system usable to deliver targeted-content-messages (or in particular, advertisements) to TCM-Enabled W-ATs (or in particular Mobile Advertising Enabled W-ATs). A MAS may also provide an analytical interface capable of reporting on the performance of a particular advertisement campaign. Accordingly, an appropriately constructed MAS may provide a better consumer experience by presenting only non-intrusive advertisements that are likely to be of interest to consumers.
- While the following examples are generally directed to content, such as commercial advertising, a broader scope of directed content is envisioned. For example, instead of directed advertisements, content such as stock reports, weather reports, religious information, news and sports information specific to a user's interests, and so on is envisioned within the bounds of this disclosure. For example, while directed content may be an advertisement, a score for a sports event and a weather report may just as easily be directed content. Accordingly, devices such as advertising servers may be viewed as more general content servers, and advertising-related agents and devices may be more generally thought of as content-related agents and servers. Information exchange between a TCM-enabled WAT and a content-related agent or server can be encrypted. All further discussion is provided in the context of advertisements as an example of a TCM (Targeted Content Message), and it should be noted that such discussion is applicable to Targeted-Content-Messages in general.
-
FIG. 1 is a diagram of some of the various functional elements of a MAS showing the interaction between an advertisement-enabled W-AT 100 with a communication network having an advertising infrastructure. As shown inFIG. 1 , the exemplary MAS includes the advertisement-enabled mobile client/W-AT 100, a radio-enabled network (RAN) 190 and anadvertising infrastructure 150 embedded in the network associated with the wireless WAN infrastructure (not shown inFIG. 1 ). For example, the advertising infrastructure could be available at a remote server not geographically co-located with a cellular base station in the wireless WAN. - As shown in
FIG. 1 , the W-AT can include aclient applications device 110, aclient advertisement interface 112, ametric collection agent 120, anad caching manager 122, anad filtering agent 124, ametric reporting agent 126, anadvertisement reception agent 120 and a dataservice layer device 130. Theadvertising infrastructure 150 can include anadvertisement sales agent 160, ananalytics agent 162, aserver advertisement interface 164, anadvertisement ingestion agent 170, anadvertisement bundling agent 174, anadvertisement distribution agent 176, ametric database 172, ametric collection agent 178, and having aproxy server 182. - In operation, the “client side” of the MAS can be handled by the W-AT 100 (depicted on the left-hand side of
FIG. 1 ). In addition to traditional applications associated with W-ATs, the present W-AT 100 may have advertisement-related applications at theapplications level 110, which in turn may be linked to the rest of the MAS via aclient advertisement interface 112. In various embodiments, theclient advertisement interface 112 may provide for metrics/data collection and management. Some of the collected metrics/data may be transferred to themetric reporting agent 126 and/or to the W-AT's data service layer 130 (via the metric collection agent 120), without exposing individually identifiable customer information, for further distribution to the rest of the MAS. - The transferred metrics/data may be provided through the
RAN 190 to the advertising infrastructure 150 (depicted on the right-hand side ofFIG. 1 ), which for the present example includes a variety of advertising-related and privacy-protecting servers. Theadvertising infrastructure 150 can receive the metrics/data at adata service layer 180, which in turn may communicate the received metrics/data to a number of metrics/data collection servers (here metric collection agent 178) and/or software modules. The metrics/data may be stored in themetric database 172, and provided to theadvertising server interface 164 where the stored metrics/data may be used for marketing purposes, e.g., advertising, sales and analytics. Note that information of interest may include, among other things, user selections at a W-AT and requests for advertisements executed by the W-AT in response to instructions provided by theadvertising infrastructure 150. - The
server advertisement interface 164 can provide a conduit for supplying advertisements (advertising ingestion), bundling advertisements, determining a distribution of advertisements and sending advertising through thedata service layer 180 of theadvertising infrastructure 150 to the rest of the MAS network. Theadvertising infrastructure 150 can provide the W-AT 100 with the advertisements, and metadata for advertisements. The W-AT 100 can be instructed by theadvertising infrastructure 150 to select advertisements based on any available advertisement metadata according to rules provided by the advertising infrastructure. - As mentioned above, the exemplary W-
AT 100 may be enabled to generate, in whole or in part, a user profile for the W-AT's user that, in turn, may be useful to enable the MAS to deliver targeted advertisements of likely interest to the user. This may result in better “click-through rates” for various advertisement campaigns. However, as mentioned above, generating a user profile may raise privacy concerns because of the potentially sensitive nature of data that may reside in the user profile. - Nevertheless, as will be shown below in the various MAS embodiments, privacy concerns may be alleviated by enabling a user's W-AT to generate a user profile while subsequently limiting the user profile to the confines of the user's W-AT except in very limited (and controlled) circumstances.
-
FIG. 2 is a block diagram showing operational details of the exemplary W-AT ofFIG. 1 configured to generate and use a user profile. As shown inFIG. 2 , the exemplary W-AT includes a processing system capable of processing a number of applications including a number of core client applications and a client advertising interface. Note that some components, such as thead reception agent 128 anddata service layer 130, are omitted fromFIG. 2 for simplicity of explanation for the functions relevant toFIG. 2 . The exemplary W-AT 100 ofFIG. 2 is shown having a platformspecific adaptation interface 111 between theclient advertisement interface 112 and theclient applications device 110, and anadvertisement filtering agent 124 having a userprofile generation agent 210 and a clientadvertisement filtering agent 220 responsive to the userprofile generation agent 210. Anadvertisement cache memory 240 is shown in communication with theadvertisement cache manager 122. External devices, e.g.,profile attribute processor 270, system operator (or 3rd party) 280 andadvertisement sales interface 164, are shown in communication with theadvertisement filtering agent 124.Devices - While the various components 110-240 of the W-
AT 100 are depicted as separate functional blocks, it should be appreciated that each of these functional blocks may take a variety of forms including separate pieces of dedicated logic, separate processors running separate pieces of software/firmware, collections of software/firmware residing in a memory and being operated upon by a single processor, and so on. - In operation, the
client applications device 110 may perform any number of functional applications useful for telecommunications (e.g., calls and text messaging) or other tasks (e.g., games) using the platformspecific adaptation interface 111 to interface with the client advertisement interface. Theclient advertisement interface 112, in turn, can be used to allow the W-AT 100 to perform a number of useful processes, such as monitor user behavior and pass user-related information to the userprofile generation agent 210. - In addition to receiving information directly from the client applications interface, the user
profile generation agent 210 may accrue user behavior information from themetrics collection agent 120, which itself may receive the same or different information from theclient advertisement interface 112. Examples of user behavior may include advertising-related responses, such as advertisement clicks and other metrics indicating types and frequency of usage. Other user behavior information may include direct user preferences or authorizations. - The
metrics collection agent 120 may provide metrics/data to themetrics reporting agent 126, which in turn may provide the metrics/data information to other components of MAS (discussed below) that may be internal or external to a W-AT. - The
profile attribute processor 270 can process incoming profile attribute processing requests from the W-AT 100 that require (or can otherwise benefit from) data-intensive lookups and respond with refined profile attributes to the userprofile generation agent 210. - One function of the user
profile generation agent 210 may include providing user profile information to the clientadvertisement filtering agent 220, which may determine advertisements that may be provided to the W-AT's user in accordance with relevant filter rules, as well as advertisement data and advertisement metadata from theadvertising sales interface 164. Theadvertisement filtering agent 220 may also provide filtered advertisements to theadvertisement cache manager 122, which in turn may store and later provide such advertisements (via advertisement cache memory 240) for presentation to the user. - A user profile generation agent can be any collection of hardware and/or software residing in a Mobile Advertising Enabled W-AT that can be used to collect user behavior information. Potential information sources may include, but are not limited to, applications residing on the user's W-AT, public information available in various accessible databases, previous user responses to advertisements, location data from a resident GPS radio and explicit user preferences entered by the user (if any). Any user profile information gathered may then be processed/synthesized to generate user profile attributes or elements, which may better characterize the user while using less memory resources.
- In various embodiments, user profile inference rules provided by a system operator (and/or a third party) may drive the particular actions of a W-AT's user profile generation agent. Note that these rules may be of a number of types, including: (1) Basic Rules, which include actions to be performed by a user profile generation agent on a pre-determined schedule associated with each action; and (2) Qualified Rules, which include “action(s)” that are qualified by a “condition”, where the “condition” may define a behavior that needs to be true, and the “action” may define an action taken by a rule engine of the user profile generation agent when the condition is detected to be true. Such rules may be useful in inferring information from specific user actions or behavior.
- For example, a simple rule for a user profile generation agent might be to store GPS derived location information for the user's W-AT every five minutes. An associated rule could be that the location most frequented within a 09:00-17:00 time range in the day be marked as the user's likely work location.
- By way of a second example, a rule qualified by a condition might be to add a “game” category to the user's list of interests if the user often spends more than 30 minutes a day in the gaming applications on his W-AT.
- Also note that the user profile generation agent may also take as input user preferences including user selection concerning express authorization of the user to derive a profile using location data, other authorizations made by the user and other specific information entered by the user. E.g. the user might input his preference to view travel related advertisements.
- Various rule-driven approaches incorporated in a user's W-AT usable to gather and refine/categorize behavior data may alleviate some of the privacy concerns users might have. For example, by mining data and synthesizing raw data into more meaningful/useful forms within the W-AT (as opposed to using an external server), sensitive or personal information can be developed and later used for targeted advertising without exposing this information to the rest of the W-AT's communication network.
- In various embodiments, particular aspects of a user's profile may control portions of the user's W-AT. For example, a user profile generation agent may utilize any retrieved W-AT information to tailor information content in a manner best suited for the W-AT, including the choice of menu layout, such as linear, hierarchical, animated, popup and softkeys.
- As mentioned above, while most profile generation rules can be interpreted by the W-AT's embedded user profile generation agent, there might be some rules that require large database lookups, e.g., government census data. Since memory on the W-AT may be too limited to accommodate large databases, it may be possible to further refine the already synthesized user behavior and demographic data by offloading the appropriate refinement tasks to a specially configured server at the W-AP side of the MAS network. For the present disclosure, any such external server capable of assisting in user profile generation may be referred to as a “profile attribute processor.” Additional discussion of profile attribute processors is provided below with respect to
FIG. 4 . -
FIG. 3 is a schematic block diagram of the previously presented userprofile generation agent 210 shown in the context of interacting withother devices - One of the features of a mobile phone is that it can be carried by a user wherever he/she goes. Utilizing the GPS capabilities of a W-AT, the W-AT can determine where the user is periodically or a-periodically spending some or most of his/her time. As there is often demographic data associated with locations, the use of GPS information and demographic data associated with locations that the user frequents may allow the development of at least some portions of a demographic profile associated with the user. Typical demographic profile elements associated with the user's profile using the location information may include, but are not limited to:
- Location ZIP code
- Gender
- Median age for the frequented location
- Age distribution and associated probability
- Mean travel time to work
- Household income or household income range
- Household size
- Family income or family income range
- Family size
- Marital status
- Probability of owning a house
- Probability of renting a house
- Life-stage group/classification
- Note that multiple demographic user profiles can be maintained at the W-AT for the user. For example, the Mobile Advertising Enabled Client might be configured by the network to maintain two demographic profiles for the user—one for his “home” location (most frequented location between, say, 21:00-06:00) and one for his “work” location (most frequented location between, say 09:00-17:00).
- In addition to general demographics, a user profile may be further developed using any of a W-AT's numerous applications. Which applications, e.g., games, a user tends to spend most of his time with or how he interacts with the various applications on the phone may provide an opportunity to build a profile for the user based on his behavior and preferences. Most of the data mining and user behavior profile determination of this sort can be done on the W-AT itself, being driven by user profile inference rules fed to the user
profile generation agent 210. Typical behavioral profile elements associated with a user may include, but are not limited to, the following: - Application ID and time spent in the application
- Interest categorization
- Favorite keywords
- Favorite websites
- Advertisements of interest
- Music album
- Games of interest
- Many profile elements (including demographics) can be inferred from behavior mined by adding hooks to observe application behavior through a native user interface application on a W-AT. It is through such applications that the user may launch other applications. Applications of interest to the user and time spent in these applications can be inferred by monitoring when the user launches and exits a particular application.
- Rules fed to the user
profile generation agent 210 can associate interest categories for a user based on the user's interactions with applications. Interest categories can also be assigned to the user profile using server assisted collaborative filtering on the behavior data collected at the W-AT. - Rules that may get downloaded to the user
profile generation agent 210 may allow a server to control the functioning of the userprofile generation agent 210 in a dynamic fashion. By mining raw data on the incumbent W-AT and synthesizing it into more meaningful information (profile attributes), particular sensitive user behavior information can be transformed into advertisement behavior categories and user profile elements versus maintaining data in raw form. - An exemplary W-AT can keep track of the advertisements of interest to the user and the keywords associated with such advertisements. Multiple clicks on the same advertisement may indicate to a user profile agent an interest level associated with the associated keywords and advertisement. On the same lines, games and music of interest to the user can be maintained at the W-AT. Server-assisted mode can also be used to associate user interest categories with the user's profile based on the user's music and game play-lists.
- As a user profile is developed and maintained, such a profile can take a variety of forms, e.g., synthesized profile attributes and elements.
- Note that some or all data attributes and elements in a user profile may have some confidence level associated with them. That is, because certain elements and attributes are based upon inferences and rules, their results may not be certain and have “fuzziness” associated with them. This fuzziness may be expressed as a confidence level associated with a user profile attribute and element.
- By way of example, noting that a user is sending more that five-hundred SMS messages per month, the profile generator might say that the user is likely to be in the age group from 15-24 with a confidence level of 60%. That means that if 100 users sending more than five-hundred SMS messages per month were to be polled for their age, about 60 of them are likely to fall within the age group of 15-24.
- Similarly, when a demographic profile is inferred for a user based on his/her home location, there may be a confidence level associated with the profile attributes. The confidence level here may indicate the number of times the profile attribute is expected to be accurate in a sample of one-hundred users with the same home location.
- The exemplary user
profile generation agent 210 can also be fed rules to combine confidence levels on the same profile attribute from multiple sources to come up with a unified confidence level for the attribute. For example, if the SMS usage rate indicates that the user is within the age group of 15-24 years with a 60% confidence level and demographic profile for the home location indicates that the user is in age group of 15-24 years with a 20% confidence level, then these two items can be combined with fuzzy logic rules to come up with a unified confidence level for the user lying in the same age group. - In contrast, if a user enters his interest preferences into the client, then such values might be given a confidence level of close to 100% since they are coming directly from the user. Similarly if the carrier specifies any user profile attributes/elements based on the user data it has (billing data or optional profile data collected from the user during service sign-up), then that too will have a higher confidence level associated with it.
- As more user behavior data is collected on a W-AT and inferences made based on that, subsequent confidence level, in the profile attribute and element values, is expected to increase.
-
FIG. 4 is a schematic block diagram for aprofile attribute processor 270 handling a request by a W-AT for profile attribute processing. As discussed above, while a W-AT may be able to handle most processing, there may be cases where huge database lookups are required to determine portions of a behavior or demographic profile. An example of such cases includes instances where census databases, which may require gigabytes of storage, are useful. Accordingly, a profile attribute processor (or other assisting server) may be used to process user information to provide more refined forms of user profile information. - Before a request is received by a
profile attribute processor 270, synthesized profile attributes may be gathered at the relevant W-AT, and sent to theprofile attribute processor 270 noting that the use of synthesized profile attributes can result in better use of bandwidth. Some of the user profile attributes, which require data-intensive lookups, can be processed by theprofile attribute processor 270 optionally by anonymously querying techniques to protect user identities. Theprofile attribute processor 270 may further refine any received attributes, and provide the refined data to the appropriate W-AT in what may be referred to as a set of refined user profile attributes. - When activated by a request from a W-AT, the
profile attribute processor 270 may process various types of specific and non-specific synthesized data regarding a user's behavior and demographics (e.g., profile attributes) and respond with the appropriate refined profile information. In order to maintain user privacy, some form of data scrambling, e.g., a hashing function and a number of other tools may be employed via a device, such as the one-wayhash function generator 810 ofFIG. 8 . In operation, it is possible to use a hash function at a W-AT to hide the user's identity from the rest of the MAS network. - In various operations, a hashing function employed in a W-AT can generate a predictable and unique, but anonymous, value associated with a particular user. Such an approach can enable the W-AT to query external servers without compromising on the privacy of the user. In various embodiments, a hashing function may be based on a primary identifier of the W-AT, e.g. a serial number associated with the W-AT, as well as. a random value, a pseudo-random value, and a time-based value. Further, the hashing function may be calculated to provide a low probability of collision with other generated values.
- The W-AT may use the same random number for subsequent queries to allow external servers to associate multiple queries from the same client. The use of the random number can help to prevent external servers (or unauthorized agents) from doing a reverse lookup on a subscriber base to determine a user's identity.
- Once a hashed value is generated, the hashed value may be used as an alternate user identifier for the W-AT and provided, along with geographic information or some or items of information from a user profile, and provided to a remote apparatus.
- Subsequently, one or more targeted content messages can be received from the remote apparatus based on the alternate user identifier and first advertisement-related information to the remote apparatus and/or other information capable of supplementing a user profile. Such information can be incorporated into the user profile of the W-AT.
- In order to further maintain user privacy, a proxy server at the wireless access point (W-AP) side (see, e.g.,
FIG. 1 ) may be used.FIG. 9 depicts a particular communication scheme employing a proxy server for securely communicating in a mobile advertising-enabled network. As shown inFIG. 9 , a W-AT 910 (the “Mobile Advertising-Enabled Client”) can send a request (or other message, such as a report or reply) related to a number of services, such as for refinement of user profile information or a request for advertising content, to a wireless application protocol (WAP)proxy 920. TheWAP proxy 920, in turn, can forward the request to asecure proxy server 930, which may then create a transaction ID, change out the header to remove the W-AT's identification information in favor of the transaction ID, and forward the request to amobile advertising server 940 while creating a look-up table containing that information, e.g., the W-AT's IP address, useful to relay a reply. - Once the
mobile advertising server 940 receives and replies to the request, theproxy server 930 may use the appropriate transaction ID to forward the mobile advertising server's reply. Later, theproxy server 930 may delete the look up table entry. - Note that the scheme depicted in
FIG. 9 can be employed to disallow themobile advertising server 940 access to the user's W-AT IP address. - In order to alleviate concerns of users that their location is possibly being tracked in real-time by their W-ATs, the W-ATs may elect not to query the server for refinement of location data in real-time. Note that such queries can be sent anonymously and sparsely over an extended period of time (e.g., once a month). A typical schedule could be, for example, to collect location information every 5 minutes for 72 hours. The most frequented location during this time frame or during specific time frames can be used to query the demographic profile of the user from the server at a randomly selected time between 30 and 40 days or by some other schedule specified by a the system operator.
- The above case is an example of a hybrid approach using both the rule driven operation of the user profile generation agent along with the server-assisted mode to generate profile elements for the user while maintaining the user's privacy.
-
FIG. 5 is a schematic block diagram shown depicting an exemplary operation of such a hybrid approach using a userprofile generation agent 210 having a user behavior synthesizer 522 and aprofile element refiner 524. While the majority of functionality of the various devices ofFIG. 5 has already been discussed above, further functionality will be described below with respect to the following flowcharts. -
FIG. 6 is a flowchart outlining an exemplary operation for generating and using a user profile. The operation starts instep 602 as a number of user profile inference rules (basic and/or qualified rules) can be received (and subsequently stored) by a W-AT from a system operator or other party. - As discussed above, basic rules may include pre-scheduled events, e.g., performing a query of the user at a specific time. Similarly, a respective qualified rule might require the same query to be preceded by a condition and/or event, such as physical status information or operational status information.
- Next, in
step 604, the received rules can be used to collect raw data, and instep 606 the raw data may be processed/synthesized into user profile elements or attributes noting that while all such processing/synthesizing may occur on board the W-AT, some refinement may occur using external devices, such as the profile attribute processors discussed above. That is, as discussed above raw data and/or synthesized data may be incorporated to form a user profile for the W-AT's user. For example, a rule relating to monitoring SMS messages may be used to change a dynamic property of a user profile when applied to collect raw data and synthesize profile attributes/elements regarding SMS messages. Static data, e.g., a user's birth date, may be likewise collected using a rule to query the user, and then applied as an element in a user profile. - Then, in
step 608, confidence levels for user profile data can be determined. Note that confidence levels can have a variety of forms, such as a range of numbers, variance statistic, or distribution profile. - In
step 610, various received rules plus raw data and synthesized data relating to various user profile elements and attributes, which may form all of a user profile, may be used to receive targeted advertisements. That is, as discussed above, in various embodiments a used/usable rule on a W-AT may be used to generate a user profile—along with collected raw data and synthesized data—to provide any number of static or dynamic properties of the user profile, and such information may be used to receive content, such as advertisements, sports scores, weather reports and news directed to subjects of likely interest. - Note that in various embodiments where user profile data can have confidence levels associated with them, rules may be applied to the confidence levels and targeted content messages may be received and displayed based on such confidence information.
- Continuing, control of the operation may jump back to step 602 where new/more rules may be received and used to collect data and modify the user's profile.
- Note that, as referenced above rules may be used based on physical configuration of an W-AT so as to utilize W-AT information to tailor content display in a manner suited for the W-AT to create suitable displays, such as menu layouts having linear, hierarchical, animated, popup and/or softkey attributes.
-
FIG. 7 is a flowchart outlining another exemplary operation for generating and using a user profile. The operation starts instep 702 as a number of user profile inference rules are received by a W-AT from a system operator or other party. Next, instep 704, the received rules can be used to collect raw data, and instep 706 the raw data may be processed/synthesized into user profile elements or attributes using onboard resources. Again note that any item of user profile information may have confidence level information processed and synthesized along with the basic data. - Continuing to step 710, a determination may be made as to whether further information or processing is required that may not be practical on a W-AT. For example, assuming that a W-AT has accrued a series of locations for which the W-AT regularly has visited using a GPS, a software agent on the W-AT using one or more rules may determine the need to query a large external database, such as a geographic information service or a national census database on a remote server, to determine a likely ethnicity (or other demographics) of the user. If further information or processing is required, control continues to step 712; otherwise, control of the operation may jump back to the
step 720 where profile attributes are used to generate/modify the user's profile. - For instances where further information or processing is required, a request may be made of an external device (step 712), such as by the profile attribute processor discussed above (optionally using hashing functions and/or proxy servers) to protect user information.
- Next, in
step 714, the external device can perform any number of refinement steps, such as query large databases, to produce refined user profile attributes. Then, instep 718, refined user profile attributes may then be provided to the appropriate W-AT, where (in step 720) they may be used to generate, modify or otherwise incorporated in a user profile. Note that when confidence levels are available for processing, unified confidence levels may be determined based on individual confidence levels. Control of the operation may then jump back to thestep 702 where new/more rules may be received and used to collect data and modify the user's profile. - Jumping forward to
FIG. 10 , a first communication protocol for advertisement distribution in a mobile advertising-enabled network is depicted. This exemplary figure illustrates a possible data flow during a multicast “push” of advertisements from an ad server. Note that the User Profile Generation Agent (in the Mobile Device (W-AT) 100 ofFIG. 10 ) can retrieve advertisements, then and select one or more of the received the advertisements by internal filtering. - In operation, a network system operator 280 (and/or a third party) may provide profile attribute processing rules to the
profile attribute processor 270. Theprofile attribute processor 270 may also receive a profile attribute process request from modules on the W-AT 100 and provide an appropriate response through modules on the W-AT 100. - Additionally, multicast or broadcast advertisements may be received by the W-
AT 100. In this configuration, the W-AT 100 (or other Mobile Device) can be able to receive all advertisements and determine which advertisements are to be stored and presented to the user in accordance with the user profile generated at the W-AT 100 and the filter rules also received from an ad server, such as the multicast/broadcast distribution server 1010 ofFIG. 10 . -
FIG. 11 depicts a second communication protocol for advertisement distribution in a mobile advertising-enabled network. As with the example ofFIG. 10 , a network system operator 280 (and/or a third party) may provide profile attribute processing rules to theprofile attribute processor 270, and theprofile attribute processor 270 may also receive a profile attribute process request from modules on the W-AT 100 to provide an appropriate response through modules on the W-AT 100. - However, in this embodiment unicast advertisements may be requested by the W-
AT 100 from thead distribution server 1110. The W-AT 100 may be able to receive all advertisements over a unicast communication link and determine which advertisements are to be stored and presented to the user in accordance with the user profile generated at the W-AT 100 and the filter rules also received from thead server 1110. -
FIG. 12 depicts a third communication protocol for advertisement distribution in a mobile advertising-enabled network. Again, as with the previous examples, a network system operator 280 (and/or a third party) may provide profile attribute processing rules to theprofile attribute processor 270, and theprofile attribute processor 270 may also receive a profile attribute process request from modules on the W-AT 100 to provide an appropriate response through modules on the W-AT 100. - However, in this embodiment, the
ad distribution server 1210 may receive user profile information provided by the W-AT 100, process the received user profile information, and then provide the appropriate targeted ads to the W-AT 100. -
FIG. 13 depicts a fourth communication protocol for advertisement distribution in a mobile advertising-enabled network. This example may work much the same as the previous examples with respect to the profile attribute processor side of operation. However, the ad retrieval over the unicast communication link is substantially different. - In operation, the W-
AT 100 may send a request for advertisements where after the W-AT 100 can receive a set of metadata representative of the various advertisements available in thead distribution server 1310. The W-AT 100 may then select a number of advertisements based on the metadata and on the filtering rules within the W-AT 100, and provide the selection information to thead distribution server 1310. Accordingly, the selected advertisements can then be provided to the W-AT 100 and presented to the user in accordance with the user profile rules. - The above approach keeps the user profile local on the W-AT while using optimal network bandwidth when delivering advertisements to the W-AT over the unicast communication link.
-
FIG. 14 depicts a timeline for a first communication protocol for downloading advertising content according to “contact windows” (see exemplary windows 1410-1416) approach. This may be used to permit downloading of advertisements at an opportune time without burdening other functions of the W-AT. In various embodiments, the W-AT may be able to adjust its sleep mode, if engaged, to the contact windows. In operation, a W-AT can be put into a sleep mode to optimize energy consumption on the platform during content message delivery. It is possible that in a sleep mode, the W-AT may be engaged in other useful operations. That is, a W-AT may be able to be put into a sleep mode while various timing circuitry (not shown) may be programmed or otherwise manipulated to respond to the sleep mode and a contact window or other schedule by dis-engaging the sleep mode before/during the contact window, and possible re-engaging sleep mode subsequent to receiving targeted content messages or at the end of the relative contact window. -
FIG. 15 depicts an alternate timeline for a first communication protocol for downloading advertising or other targeted-content-message information according to a defined time schedule. See, exemplary windows 1510-1520. This approach may be used to permit downloading of advertisements at an opportune time without burdening other functions of the W-AT. The defined time schedule permits the W-AT to remain in sleep mode except during the defined time schedule. Again, various timing/clock circuitry may be employed to engage and dis-engage a W-AT to/from sleep mode. Additionally, it is possible that when the W-AT wakes up to receive targeted-content-message information, it can receive targeting meta-data and reception times for future targeted-content-messages, which can then be used to determine whether to receive a future targeted-content-message based on the user profile and the targeting meta-data, and to schedule an appropriate wakeup time prior to the reception time for a future targeted-content-message. - The techniques and modules described herein may be implemented by various means. For example, these techniques may be implemented in hardware, software, or a combination thereof. For a hardware implementation, the processing units within an access point or an access terminal may be implemented within one or more application specific integrated circuits (ASICs), digital signal processors (DSPs), digital signal processing W-ATs (DSPDs), programmable logic W-ATs (PLDs), field programmable gate arrays (FPGAs), processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described herein, or a combination thereof.
- For a software implementation, the techniques described herein may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes may be stored in memory units and executed by processors or demodulators. The memory unit may be implemented within the processor or external to the processor, in which case it can be communicatively coupled to the processor via various means.
- The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the features, functions, operations, and embodiments disclosed herein. Various modifications to these embodiments may be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from their spirit or scope. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
Claims (31)
1. (canceled)
2. A method of securely generating a user profile on a wireless access terminal (W-AT), comprising:
locally collecting, by the W-AT, user behavioral data associated with a user of the W-AT;
locally synthesizing, by the W-AT, a set of profile attributes based on the locally collected user behavioral data;
determining, by the W-AT, to refine at least one profile attribute from the set of locally synthesized profile attributes via interaction with at least one external apparatus;
transmitting, by the W-AT, a request for the at least one external apparatus to refine the at least one profile attribute, wherein the transmitting transmits the request to a proxy server instead of directly to the at least one external apparatus to maintain anonymity for the W-AT with respect to the at least one external apparatus;
receiving, at the W-AT from the proxy server, a response to the request that includes at least one refined profile attribute that is refined from the at least one profile attribute by the at least one external apparatus; and
generating, by the W-AT, the user profile based at least in part upon the at least one refined profile attribute.
3. The method of claim 2 , further comprising:
receiving, by the W-AT from an advertisement system that is external to the W-AT, one or more multicast/broadcast content messages that are selected for download by the W-AT based on the user profile and a multicast/broadcast content message transmission schedule to avoid exposing, to the advertisement system, information by which the W-AT can be associated with the user profile.
4. The method of claim 3 , further comprising:
storing the received one or more multicast/broadcast content messages in a local cache memory on the W-AT; and
querying the local cache memory for one or more of the stored content messages for presentation on the W-AT.
5. The method of claim 1 ,
wherein the at least one profile attribute includes location information associated with the W-AT, and
wherein the at least one refined profile attributes includes demographic information that is based upon the location information.
6. The method of claim 5 , wherein the demographic information includes at least one demographic profile of the user.
7. The method of claim 6 , wherein the demographic information includes two or more demographic profiles that are associated with different locations identified by the location information.
8. The method of claim 5 , wherein the demographic information includes:
location ZIP code,
gender,
median age for the frequented location,
age distribution and associated probability,
mean travel time to work,
household income or household income range,
household size,
family income or family income range,
family size,
marital status,
probability of owning a house,
probability of renting a house,
life-stage group/classification, or
any combination thereof.
9. The method of claim 2 ,
wherein the at least one profile attribute includes location information associated with the W-AT, and
wherein the transmitting is scheduled so as to avoid real-time location tracking of the W-AT by the at least one external apparatus.
10. A wireless access terminal (W-AT) configured to securely generate a user profile, comprising:
means for locally collecting user behavioral data associated with a user of the W-AT;
means for locally synthesizing a set of profile attributes based on the locally collected user behavioral data;
means for determining to refine at least one profile attribute from the set of locally synthesized profile attributes via interaction with at least one external apparatus;
means for transmitting a request for the at least one external apparatus to refine the at least one profile attribute, wherein the means for transmitting transmits the request to a proxy server instead of directly to the at least one external apparatus to maintain anonymity for the W-AT with respect to the at least one external apparatus;
means for receiving, from the proxy server, a response to the request that includes at least one refined profile attribute that is refined from the at least one profile attribute by the at least one external apparatus; and
means for generating the user profile based at least in part upon the at least one refined profile attribute.
11. The W-AT of claim 10 , further comprising:
means for receiving, from an advertisement system that is external to the W-AT, one or more multicast/broadcast content messages that are selected for download by the W-AT based on the user profile and a multicast/broadcast content message transmission schedule to avoid exposing, to the advertisement system, information by which the W-AT can be associated with the user profile.
12. The W-AT of claim 11 , further comprising:
means for storing the received one or more multicast/broadcast content messages in a local cache memory on the W-AT; and
means for querying the local cache memory for one or more of the stored content messages for presentation on the W-AT.
13. The W-AT of claim 10 ,
wherein the at least one profile attribute includes location information associated with the W-AT, and
wherein the at least one refined profile attributes includes demographic information that is based upon the location information.
14. The W-AT of claim 13 , wherein the demographic information includes at least one demographic profile of the user.
15. The W-AT of claim 14 , wherein the demographic information includes two or more demographic profiles that are associated with different locations identified by the location information.
16. The W-AT of claim 13 , wherein the demographic information includes:
location ZIP code,
gender,
median age for the frequented location,
age distribution and associated probability,
mean travel time to work,
household income or household income range,
household size,
family income or family income range,
family size,
marital status,
probability of owning a house,
probability of renting a house,
life-stage group/classification, or
any combination thereof.
17. The W-AT of claim 10 ,
wherein the at least one profile attribute includes location information associated with the W-AT, and
wherein the means for transmitting schedules the transmission of the request as to avoid real-time location tracking of the W-AT by the at least one external apparatus.
18. A wireless access terminal (W-AT) configured to securely generate a user profile, comprising:
a memory; and
at least one processor coupled to the memory and configured to:
locally collect user behavioral data associated with a user of the W-AT;
locally synthesize a set of profile attributes based on the locally collected user behavioral data;
determine to refine at least one profile attribute from the set of locally synthesized profile attributes via interaction with at least one external apparatus;
transmit a request for the at least one external apparatus to refine the at least one profile attribute, wherein the at least one processor transmits the request to a proxy server instead of directly to the at least one external apparatus to maintain anonymity for the W-AT with respect to the at least one external apparatus;
receive, from the proxy server, a response to the request that includes at least one refined profile attribute that is refined from the at least one profile attribute by the at least one external apparatus; and
generate the user profile based at least in part upon the at least one refined profile attribute.
19. The W-AT of claim 18 , wherein the at least one processor is further configured to:
receive, from an advertisement system that is external to the W-AT, one or more multicast/broadcast content messages that are selected for download by the W-AT based on the user profile and a multicast/broadcast content message transmission schedule to avoid exposing, to the advertisement system, information by which the W-AT can be associated with the user profile.
20. The W-AT of claim 18 , wherein the at least one processor is further configured to:
store the received one or more multicast/broadcast content messages in a local cache memory on the W-AT; and
query the local cache memory for one or more of the stored content messages for presentation on the W-AT.
21. The W-AT of claim 18 ,
wherein the at least one profile attribute includes location information associated with the W-AT, and
wherein the at least one refined profile attributes includes demographic information that is based upon the location information.
22. The W-AT of claim 21 , wherein the demographic information includes at least one demographic profile of the user.
23. The W-AT of claim 22 , wherein the demographic information includes two or more demographic profiles that are associated with different locations identified by the location information.
24. The W-AT of claim 21 , wherein the demographic information includes:
location ZIP code,
gender,
median age for the frequented location,
age distribution and associated probability,
mean travel time to work,
household income or household income range,
household size,
family income or family income range,
family size,
marital status,
probability of owning a house,
probability of renting a house,
life-stage group/classification, or
any combination thereof.
25. The W-AT of claim 18 ,
wherein the at least one profile attribute includes location information associated with the W-AT, and
wherein the wherein the at least one processor is further configured to schedule the transmission of the request as to avoid real-time location tracking of the W-AT by the at least one external apparatus.
26. A non-transitory computer-readable medium containing instructions stored thereon, which, when executed by a wireless access terminal (W-AT) configured to securely generate a user profile, cause the W-AT to perform operations, the instructions comprising:
at least one instruction configured to cause the W-AT to locally collect user behavioral data associated with a user of the W-AT;
at least one instruction configured to cause the W-AT to locally synthesize a set of profile attributes based on the locally collected user behavioral data;
at least one instruction configured to cause the W-AT to determine to refine at least one profile attribute from the set of locally synthesized profile attributes via interaction with at least one external apparatus;
at least one instruction configured to cause the W-AT to transmit a request for the at least one external apparatus to refine the at least one profile attribute, wherein the at least one processor transmits the request to a proxy server instead of directly to the at least one external apparatus to maintain anonymity for the W-AT with respect to the at least one external apparatus;
at least one instruction configured to cause the W-AT to receive, from the proxy server, a response to the request that includes at least one refined profile attribute that is refined from the at least one profile attribute by the at least one external apparatus; and
at least one instruction configured to cause the W-AT to generate the user profile based at least in part upon the at least one refined profile attribute.
27. The non-transitory computer-readable medium of claim 26 , further comprising:
at least one instruction configured to cause the W-AT to receive, from an advertisement system that is external to the W-AT, one or more multicast/broadcast content messages that are selected for download by the W-AT based on the user profile and a multicast/broadcast content message transmission schedule to avoid exposing, to the advertisement system, information by which the W-AT can be associated with the user profile.
28. The non-transitory computer-readable medium of claim 27 , further comprising:
at least one instruction configured to cause the W-AT to store the received one or more multicast/broadcast content messages in a local cache memory on the W-AT; and
at least one instruction configured to cause the W-AT to query the local cache memory for one or more of the stored content messages for presentation on the W-AT.
29. The non-transitory computer-readable medium of claim 26 ,
wherein the at least one profile attribute includes location information associated with the W-AT, and
wherein the at least one refined profile attribute includes demographic information that is based upon the location information.
30. The non-transitory computer-readable medium of claim 29 , wherein the demographic information includes at least one demographic profile of the user.
31. The non-transitory computer-readable medium of claim 26 ,
wherein the at least one profile attribute includes location information associated with the W-AT, and
wherein the wherein the at least one instruction configured to cause the W-AT to transmit is further configured to schedule the transmission of the request as to avoid real-time location tracking of the W-AT by the at least one external apparatus.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/659,191 US20170324831A1 (en) | 2007-07-07 | 2017-07-25 | Method for transfer of information related to targeted content messages through a proxy server |
Applications Claiming Priority (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US94845207P | 2007-07-07 | 2007-07-07 | |
US94845007P | 2007-07-07 | 2007-07-07 | |
US94845307P | 2007-07-07 | 2007-07-07 | |
US94845107P | 2007-07-07 | 2007-07-07 | |
US94845507P | 2007-07-07 | 2007-07-07 | |
US94845607P | 2007-07-07 | 2007-07-07 | |
US12/134,688 US20090013051A1 (en) | 2007-07-07 | 2008-06-06 | Method for transfer of information related to targeted content messages through a proxy server |
US15/659,191 US20170324831A1 (en) | 2007-07-07 | 2017-07-25 | Method for transfer of information related to targeted content messages through a proxy server |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/134,688 Continuation US20090013051A1 (en) | 2007-07-07 | 2008-06-06 | Method for transfer of information related to targeted content messages through a proxy server |
Publications (1)
Publication Number | Publication Date |
---|---|
US20170324831A1 true US20170324831A1 (en) | 2017-11-09 |
Family
ID=40221842
Family Applications (6)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/134,675 Active 2031-08-25 US9398113B2 (en) | 2007-07-07 | 2008-06-06 | Methods and systems for providing targeted information using identity masking in a wireless communications device |
US12/134,688 Abandoned US20090013051A1 (en) | 2007-07-07 | 2008-06-06 | Method for transfer of information related to targeted content messages through a proxy server |
US12/134,659 Active 2033-03-04 US9596317B2 (en) | 2007-07-07 | 2008-06-06 | Method and system for delivery of targeted information based on a user profile in a mobile communication device |
US12/134,891 Active 2033-02-12 US9485322B2 (en) | 2007-07-07 | 2008-06-06 | Method and system for providing targeted information using profile attributes with variable confidence levels in a mobile environment |
US12/134,631 Active 2032-01-16 US9497286B2 (en) | 2007-07-07 | 2008-06-06 | Method and system for providing targeted information based on a user profile in a mobile environment |
US15/659,191 Abandoned US20170324831A1 (en) | 2007-07-07 | 2017-07-25 | Method for transfer of information related to targeted content messages through a proxy server |
Family Applications Before (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/134,675 Active 2031-08-25 US9398113B2 (en) | 2007-07-07 | 2008-06-06 | Methods and systems for providing targeted information using identity masking in a wireless communications device |
US12/134,688 Abandoned US20090013051A1 (en) | 2007-07-07 | 2008-06-06 | Method for transfer of information related to targeted content messages through a proxy server |
US12/134,659 Active 2033-03-04 US9596317B2 (en) | 2007-07-07 | 2008-06-06 | Method and system for delivery of targeted information based on a user profile in a mobile communication device |
US12/134,891 Active 2033-02-12 US9485322B2 (en) | 2007-07-07 | 2008-06-06 | Method and system for providing targeted information using profile attributes with variable confidence levels in a mobile environment |
US12/134,631 Active 2032-01-16 US9497286B2 (en) | 2007-07-07 | 2008-06-06 | Method and system for providing targeted information based on a user profile in a mobile environment |
Country Status (6)
Country | Link |
---|---|
US (6) | US9398113B2 (en) |
EP (5) | EP2171980A2 (en) |
JP (10) | JP5442606B2 (en) |
KR (8) | KR101285713B1 (en) |
CN (6) | CN101690110B (en) |
WO (5) | WO2009009507A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170223134A1 (en) * | 2007-03-10 | 2017-08-03 | Bridge And Post, Inc. | Method and apparatus for tagging network traffic using extensible fields in message headers |
US20170323334A1 (en) * | 2016-05-06 | 2017-11-09 | Adp, Llc | Segmented User Profiles |
US20220182363A1 (en) * | 2020-12-09 | 2022-06-09 | International Business Machines Corporation | Private cloud user insight privacy |
Families Citing this family (129)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6947772B2 (en) | 2002-01-31 | 2005-09-20 | Qualcomm Incorporated | System and method for providing messages on a wireless device connecting to an application server |
US7039398B2 (en) | 2002-08-30 | 2006-05-02 | Qualcomm Incorporated | Server processing of interactive screens for a wireless device |
US6996394B2 (en) * | 2002-08-30 | 2006-02-07 | Qualcomm Incorporated | Server processing in providing messages for a wireless device connecting to a server |
US10410237B1 (en) | 2006-06-26 | 2019-09-10 | Sprint Communications Company L.P. | Inventory management integrating subscriber and targeting data |
GB2435565B (en) | 2006-08-09 | 2008-02-20 | Cvon Services Oy | Messaging system |
EP2095313A4 (en) | 2006-10-27 | 2011-11-02 | Cvon Innovations Ltd | Method and device for managing subscriber connection |
GB2435730B (en) | 2006-11-02 | 2008-02-20 | Cvon Innovations Ltd | Interactive communications system |
US10664851B1 (en) | 2006-11-08 | 2020-05-26 | Sprint Communications Company, L.P. | Behavioral analysis engine for profiling wireless subscribers |
US10068261B1 (en) | 2006-11-09 | 2018-09-04 | Sprint Communications Company L.P. | In-flight campaign optimization |
GB2436412A (en) | 2006-11-27 | 2007-09-26 | Cvon Innovations Ltd | Authentication of network usage for use with message modifying apparatus |
GB2440990B (en) | 2007-01-09 | 2008-08-06 | Cvon Innovations Ltd | Message scheduling system |
GB2445630B (en) | 2007-03-12 | 2008-11-12 | Cvon Innovations Ltd | Dynamic message allocation system and method |
US8935718B2 (en) | 2007-05-22 | 2015-01-13 | Apple Inc. | Advertising management method and system |
GB2450144A (en) | 2007-06-14 | 2008-12-17 | Cvon Innovations Ltd | System for managing the delivery of messages |
US20090048977A1 (en) * | 2007-07-07 | 2009-02-19 | Qualcomm Incorporated | User profile generation architecture for targeted content distribution using external processes |
US9398113B2 (en) * | 2007-07-07 | 2016-07-19 | Qualcomm Incorporated | Methods and systems for providing targeted information using identity masking in a wireless communications device |
US9392074B2 (en) * | 2007-07-07 | 2016-07-12 | Qualcomm Incorporated | User profile generation architecture for mobile content-message targeting |
GB2452789A (en) | 2007-09-05 | 2009-03-18 | Cvon Innovations Ltd | Selecting information content for transmission by identifying a keyword in a previous message |
US20090076914A1 (en) * | 2007-09-19 | 2009-03-19 | Philippe Coueignoux | Providing compensation to suppliers of information |
US20090094093A1 (en) * | 2007-10-05 | 2009-04-09 | Yahoo! Inc. | System for selecting advertisements |
GB2453810A (en) | 2007-10-15 | 2009-04-22 | Cvon Innovations Ltd | System, Method and Computer Program for Modifying Communications by Insertion of a Targeted Media Content or Advertisement |
CN107196851A (en) * | 2007-11-14 | 2017-09-22 | 高通股份有限公司 | There is the method and system of the suitability of the content-message of target for determination |
US20090124241A1 (en) * | 2007-11-14 | 2009-05-14 | Qualcomm Incorporated | Method and system for user profile match indication in a mobile environment |
US9391789B2 (en) * | 2007-12-14 | 2016-07-12 | Qualcomm Incorporated | Method and system for multi-level distribution information cache management in a mobile environment |
US20090197582A1 (en) * | 2008-02-01 | 2009-08-06 | Lewis Robert C | Platform for mobile advertising and microtargeting of promotions |
US9959547B2 (en) * | 2008-02-01 | 2018-05-01 | Qualcomm Incorporated | Platform for mobile advertising and persistent microtargeting of promotions |
US20090198579A1 (en) * | 2008-02-01 | 2009-08-06 | Lewis Robert C | Keyword tracking for microtargeting of mobile advertising |
US9111286B2 (en) * | 2008-02-01 | 2015-08-18 | Qualcomm, Incorporated | Multiple actions and icons for mobile advertising |
US20090197616A1 (en) * | 2008-02-01 | 2009-08-06 | Lewis Robert C | Critical mass billboard |
WO2009100402A1 (en) * | 2008-02-06 | 2009-08-13 | Medio Systems, Inc. | Operator cloud for mobile internet services |
US11017436B1 (en) * | 2008-03-04 | 2021-05-25 | Conviva Inc. | Advertising engine |
BRPI0800633A2 (en) * | 2008-03-13 | 2009-10-27 | Coppe Ufrj | method for forming spontaneous virtual communities based on common interests using ranges of interest |
MX2010014299A (en) * | 2008-06-20 | 2011-02-21 | Nagravision Sa | Method for controlling the use of a conditional access content and multimedia unit for implementing said method. |
US10567823B2 (en) | 2008-11-26 | 2020-02-18 | Free Stream Media Corp. | Relevant advertisement generation based on a user operating a client device communicatively coupled with a networked media device |
US9386356B2 (en) | 2008-11-26 | 2016-07-05 | Free Stream Media Corp. | Targeting with television audience data across multiple screens |
US9961388B2 (en) | 2008-11-26 | 2018-05-01 | David Harrison | Exposure of public internet protocol addresses in an advertising exchange server to improve relevancy of advertisements |
US9986279B2 (en) | 2008-11-26 | 2018-05-29 | Free Stream Media Corp. | Discovery, access control, and communication with networked services |
US10334324B2 (en) | 2008-11-26 | 2019-06-25 | Free Stream Media Corp. | Relevant advertisement generation based on a user operating a client device communicatively coupled with a networked media device |
US8180891B1 (en) | 2008-11-26 | 2012-05-15 | Free Stream Media Corp. | Discovery, access control, and communication with networked services from within a security sandbox |
US10631068B2 (en) | 2008-11-26 | 2020-04-21 | Free Stream Media Corp. | Content exposure attribution based on renderings of related content across multiple devices |
US10880340B2 (en) | 2008-11-26 | 2020-12-29 | Free Stream Media Corp. | Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device |
US10419541B2 (en) | 2008-11-26 | 2019-09-17 | Free Stream Media Corp. | Remotely control devices over a network without authentication or registration |
US9154942B2 (en) | 2008-11-26 | 2015-10-06 | Free Stream Media Corp. | Zero configuration communication between a browser and a networked media device |
US10977693B2 (en) | 2008-11-26 | 2021-04-13 | Free Stream Media Corp. | Association of content identifier of audio-visual data with additional data through capture infrastructure |
US9519772B2 (en) | 2008-11-26 | 2016-12-13 | Free Stream Media Corp. | Relevancy improvement through targeting of information based on data gathered from a networked device associated with a security sandbox of a client device |
EP2384573A1 (en) * | 2008-12-30 | 2011-11-09 | Nokia Siemens Networks OY | User-dependent content delivery |
KR20110108396A (en) * | 2009-01-23 | 2011-10-05 | 엠포메이션 테크놀로지즈 아이엔시. | A system and method for retrieving the dynamic state of a mobile communication device |
US8942680B2 (en) * | 2009-01-23 | 2015-01-27 | Mformation Software Technologies Llc | System and method for retrieving the dynamic state of a mobile communication device |
US20100223638A1 (en) * | 2009-02-27 | 2010-09-02 | Hubbard Robert B | System and method for optimizing the scheduling of multimedia content |
US20100228773A1 (en) * | 2009-03-09 | 2010-09-09 | Sony Corporation And Sony Electronics Inc. | System and method for effectively utilizing a transport operator in an electronic network |
US8667109B2 (en) | 2009-04-30 | 2014-03-04 | Empire Technology Development Llc | User profile-based wireless device system level management |
SG175917A1 (en) * | 2009-05-08 | 2011-12-29 | Zokem Oy | System and method for behavioural and contextual data analytics |
US10977723B2 (en) * | 2009-05-29 | 2021-04-13 | Google Llc | Matching content providers and interested content users |
US8321527B2 (en) * | 2009-09-10 | 2012-11-27 | Tribal Brands | System and method for tracking user location and associated activity and responsively providing mobile device updates |
US8558693B2 (en) * | 2009-09-10 | 2013-10-15 | Tribal Technologies, Inc. | System and method for location-based reminders on a mobile device |
US8903940B2 (en) * | 2009-09-10 | 2014-12-02 | Tribal Technologies, Inc. | System and method for intelligently distributing content to a mobile device based on a detected location of the mobile device and context data defining characteristics of the location at a particular date and time |
US8255453B2 (en) * | 2009-09-14 | 2012-08-28 | International Business Machines Corporation | Public BOT management in private networks |
US20110162074A1 (en) * | 2009-12-31 | 2011-06-30 | Sap Portals Israel Ltd | Apparatus and method for remote processing while securing classified data |
US8520552B2 (en) | 2010-01-05 | 2013-08-27 | Qualcomm Incorporated | Method for determining mutual and transitive correlation over a wireless channel to form links and deliver targeted content messages |
US20110238496A1 (en) * | 2010-02-23 | 2011-09-29 | Vishal Gurbuxani | Systems and Methods for Generating Data from Mobile Applications and Dynamically Delivering Advertising Based on Generated Data |
US20110295721A1 (en) * | 2010-03-01 | 2011-12-01 | Apple Inc. | User information and distribution system |
US8898217B2 (en) | 2010-05-06 | 2014-11-25 | Apple Inc. | Content delivery based on user terminal events |
US8504419B2 (en) | 2010-05-28 | 2013-08-06 | Apple Inc. | Network-based targeted content delivery based on queue adjustment factors calculated using the weighted combination of overall rank, context, and covariance scores for an invitational content item |
US8099236B2 (en) | 2010-06-18 | 2012-01-17 | Olson Dwight C | GPS navigator |
US20130110601A1 (en) * | 2010-06-29 | 2013-05-02 | Rakuten, Inc. | Information processing device, information processing method, information processing program, and recording medium having information processing program recorded thereon |
US8983978B2 (en) | 2010-08-31 | 2015-03-17 | Apple Inc. | Location-intention context for content delivery |
US8510309B2 (en) | 2010-08-31 | 2013-08-13 | Apple Inc. | Selection and delivery of invitational content based on prediction of user interest |
US8447269B2 (en) * | 2010-12-01 | 2013-05-21 | International Business Machines Corporation | Systems and methods for joint analytics on user level and network level data of a communications network |
US9134137B2 (en) | 2010-12-17 | 2015-09-15 | Microsoft Technology Licensing, Llc | Mobile search based on predicted location |
GB2487181A (en) * | 2010-12-29 | 2012-07-18 | Nec Casio Mobile Comm Ltd | System for user profiling |
WO2012118870A1 (en) | 2011-02-28 | 2012-09-07 | Visa International Service Association | Secure anonymous transaction apparatuses, methods and systems |
US20120246009A1 (en) * | 2011-03-21 | 2012-09-27 | Viacom International, Inc. | Cross Marketing Tool Using a Customer Profile |
US20120272156A1 (en) * | 2011-04-22 | 2012-10-25 | Kerger Kameron N | Leveraging context to present content on a communication device |
US20130006754A1 (en) * | 2011-06-30 | 2013-01-03 | Microsoft Corporation | Multi-step impression campaigns |
AU2012279539B2 (en) * | 2011-07-05 | 2015-07-30 | Shl Medical Ag | Needle sheath remover assembly |
US8498627B2 (en) | 2011-09-15 | 2013-07-30 | Digimarc Corporation | Intuitive computing methods and systems |
JP2014532239A (en) * | 2011-10-04 | 2014-12-04 | アブシオ コーポレイションAbsio Corporation | Method and apparatus for precise interest matching with locally stored content |
US9253282B2 (en) | 2011-10-18 | 2016-02-02 | Qualcomm Incorporated | Method and apparatus for generating, using, or updating an enriched user profile |
KR101888123B1 (en) * | 2011-12-30 | 2018-08-13 | 네이버 주식회사 | System and method for targeting advertisement using mobile application information |
US10223710B2 (en) | 2013-01-04 | 2019-03-05 | Visa International Service Association | Wearable intelligent vision device apparatuses, methods and systems |
US9171068B2 (en) | 2012-03-07 | 2015-10-27 | Ut-Battelle, Llc | Recommending personally interested contents by text mining, filtering, and interfaces |
WO2013142429A1 (en) | 2012-03-19 | 2013-09-26 | Farver Brandon | System and method for mode-based social networking |
US8978158B2 (en) | 2012-04-27 | 2015-03-10 | Google Inc. | Privacy management across multiple devices |
US9514446B1 (en) * | 2012-04-27 | 2016-12-06 | Google Inc. | Remarketing content to a user associated with multiple devices |
US9881301B2 (en) | 2012-04-27 | 2018-01-30 | Google Llc | Conversion tracking of a user across multiple devices |
US9525587B2 (en) | 2012-05-17 | 2016-12-20 | International Business Machines Corporation | Updating web resources |
EP2672418A1 (en) * | 2012-06-06 | 2013-12-11 | Gemalto SA | Anonymisation method |
US9141504B2 (en) | 2012-06-28 | 2015-09-22 | Apple Inc. | Presenting status data received from multiple devices |
JP5596758B2 (en) | 2012-09-14 | 2014-09-24 | 本田技研工業株式会社 | Fuel cell system and control method thereof |
US20140089068A1 (en) * | 2012-09-25 | 2014-03-27 | Jirbo, Inc. | Videos for In Application Purchases and Rewards for Sharing Same through Social Media and Video Advertising for Reengagement |
WO2014142830A1 (en) | 2013-03-13 | 2014-09-18 | Unify Gmbh & Co. Kg | Method, device, and system for communicating a changeability attribute |
US10356461B2 (en) | 2013-03-15 | 2019-07-16 | adRise, Inc. | Adaptive multi-device content generation based on associated internet protocol addressing |
US10594763B2 (en) | 2013-03-15 | 2020-03-17 | adRise, Inc. | Platform-independent content generation for thin client applications |
US10887421B2 (en) * | 2013-03-15 | 2021-01-05 | Tubi, Inc. | Relevant secondary-device content generation based on associated internet protocol addressing |
EP2989586A4 (en) * | 2013-04-25 | 2016-11-09 | Hewlett Packard Development Co | Multi-tier storage based on data anonymization |
US20140379521A1 (en) * | 2013-06-21 | 2014-12-25 | Microsoft Corporation | Activity-based personal profile inference |
US9767487B2 (en) * | 2013-09-23 | 2017-09-19 | Facebook, Inc. | Targeting advertisements to customized groups of users of an online system |
CN103686198A (en) * | 2013-12-30 | 2014-03-26 | 优视科技有限公司 | Video data processing method, device and system |
US10516636B2 (en) | 2014-01-01 | 2019-12-24 | SlamAd.com, Inc. | Real-time messaging platform with enhanced privacy |
US9734515B1 (en) * | 2014-01-09 | 2017-08-15 | Sprint Communications Company L.P. | Ad management using ads cached on a mobile electronic device |
CN104850489B (en) * | 2014-02-13 | 2017-11-28 | 富士通株式会社 | Mobile solution test system |
EP3111403B8 (en) | 2014-02-26 | 2021-12-29 | Blazer And Flip Flops, Inc. Dba The Experience Engine, Inc. | Live branded dynamic mapping |
US20170011348A1 (en) | 2014-02-26 | 2017-01-12 | Blazer and Flip Flops, Inc. dba The Experience Engine | Venue notifications |
WO2015130971A1 (en) | 2014-02-26 | 2015-09-03 | Blazer And Flip Flops, Inc. Dba The Experience Engine, Inc. | Increasing customer monetization |
WO2015130983A1 (en) * | 2014-02-26 | 2015-09-03 | Vertical Computer Systems, Inc. | System and method for distributed advertising |
GB2528640A (en) * | 2014-06-26 | 2016-02-03 | Piksel Inc | Delivering content |
EP3195559A1 (en) * | 2014-09-16 | 2017-07-26 | Wittos Ltd. | A method and system for delivering context-relevant content to portable devices |
JP6565213B2 (en) * | 2015-02-25 | 2019-08-28 | コニカミノルタ株式会社 | Information distribution system and image forming apparatus |
US9825962B2 (en) * | 2015-03-27 | 2017-11-21 | Accenture Global Services Limited | Configurable sharing of user information |
EP3286942A4 (en) * | 2015-04-23 | 2018-12-05 | Blazer and Flip Flops, Inc. DBA The Experience Engine | Targeted venue message distribution |
EP3289449A4 (en) | 2015-04-28 | 2018-12-05 | Blazer and Flip Flops, Inc. dba The Experience Engine | Intelligent prediction of queue wait times |
WO2016179098A1 (en) | 2015-05-01 | 2016-11-10 | Blazer and Flip Flops, Inc. dba The Experience Engine | Map based beacon management |
US20170149716A1 (en) * | 2015-11-23 | 2017-05-25 | International Business Machines Corporation | Prioritizing delivery of messages in communication systems |
US10129728B2 (en) | 2015-12-07 | 2018-11-13 | Blazer and Flip Flops, Inc. | Wearable device |
EP3214406A1 (en) * | 2016-03-04 | 2017-09-06 | Volvo Car Corporation | Method and system for utilizing a trip history |
US11087360B2 (en) | 2016-06-03 | 2021-08-10 | At&T Intellectual Property I, L.P. | Securely bridging advertising identifiers for targeted advertising |
US10200355B2 (en) * | 2016-08-29 | 2019-02-05 | Insurify, Inc. | Methods and systems for generating a user profile |
US10534925B2 (en) * | 2016-10-05 | 2020-01-14 | Microsoft Technology Licensing, Llc | Detection of compromised devices via user states |
US10510088B2 (en) * | 2016-10-07 | 2019-12-17 | Bank Of America Corporation | Leveraging an artificial intelligence engine to generate customer-specific user experiences based on real-time analysis of customer responses to recommendations |
US10476974B2 (en) | 2016-10-07 | 2019-11-12 | Bank Of America Corporation | System for automatically establishing operative communication channel with third party computing systems for subscription regulation |
IL252041B (en) * | 2017-04-30 | 2020-09-30 | Verint Systems Ltd | System and method for tracking users of computer applications |
EP3499843A1 (en) * | 2017-12-15 | 2019-06-19 | Thomson Licensing | Devices, systems, and methods for detecting usage of applications on a device |
US11243669B2 (en) * | 2018-02-27 | 2022-02-08 | Verizon Media Inc. | Transmitting response content items |
US10511681B2 (en) * | 2018-03-02 | 2019-12-17 | Adobe Inc. | Establishing and utilizing behavioral data thresholds for deep learning and other models to identify users across digital space |
US20210004481A1 (en) * | 2019-07-05 | 2021-01-07 | Google Llc | Systems and methods for privacy preserving determination of intersections of sets of user identifiers |
US20240040180A1 (en) * | 2019-10-18 | 2024-02-01 | Novi Digital Entertainment Private Limited | System and method for real-time delivery of a target content in a streaming content |
WO2021156861A1 (en) * | 2020-02-03 | 2021-08-12 | Anagog Ltd. | Distributed content serving |
US12022138B2 (en) | 2021-06-21 | 2024-06-25 | Tubi, Inc. | Model serving for advanced frequency management |
US11949592B1 (en) * | 2023-02-14 | 2024-04-02 | Perfecta Federal, Llc | Software-defined traffic routing mesh network |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US651279A (en) * | 1899-11-10 | 1900-06-05 | Lewis E Talmage | Corn or cane harvesting machine. |
US6345264B1 (en) * | 1998-01-22 | 2002-02-05 | Microsoft Corporation | Methods and apparatus, using expansion attributes having default, values, for matching entities and predicting an attribute of an entity |
US6519465B2 (en) * | 1999-01-08 | 2003-02-11 | Trueposition, Inc. | Modified transmission method for improving accuracy for E-911 calls |
US20030080997A1 (en) * | 2001-10-23 | 2003-05-01 | Marcel Fuehren | Anonymous network-access method and client |
US20070178919A1 (en) * | 2006-02-02 | 2007-08-02 | Airwide Solutions, Inc. | Apparatus and method for improving short message service dependability |
US20080098420A1 (en) * | 2006-10-19 | 2008-04-24 | Roundbox, Inc. | Distribution and display of advertising for devices in a network |
Family Cites Families (383)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US645701A (en) | 1900-01-23 | 1900-03-20 | Jean Louis Ancelle | Spring-wheel for vehicles. |
US2175937A (en) | 1936-08-17 | 1939-10-10 | Nielsen A C Co | Recorder |
DE2037580A1 (en) | 1970-07-29 | 1972-02-03 | J. Hengstler Kg, 7207 Aldingen | Device for controlling a self-operated goods dispensing device by means of identification data carriers |
JPH0350932A (en) | 1989-07-18 | 1991-03-05 | Nec Corp | Store and forward system |
JPH0350820A (en) | 1989-07-19 | 1991-03-05 | Nec Corp | Charged beam exposing method |
JPH0369626A (en) | 1989-08-04 | 1991-03-26 | Koji Nakazawa | Figure-making loom |
JPH03196305A (en) | 1989-12-26 | 1991-08-27 | Fanuc Ltd | X axis retracting system for hobbing machine |
JPH03196128A (en) | 1989-12-26 | 1991-08-27 | Konica Corp | Film integral type camera |
JP2819715B2 (en) | 1990-01-09 | 1998-11-05 | 日本電気株式会社 | Tunnel junction and its formation method |
JPH03283652A (en) | 1990-03-30 | 1991-12-13 | Nec Corp | Manufacture of cmos semiconductor device |
WO1991017530A1 (en) | 1990-05-01 | 1991-11-14 | Environmental Products Corporation | A method of transferring display and print data |
US5664126A (en) | 1992-07-24 | 1997-09-02 | Kabushiki Kaisha Toshiba | Human interface system for communicating networked users |
JP3140621B2 (en) | 1993-09-28 | 2001-03-05 | 株式会社日立製作所 | Distributed file system |
US6202058B1 (en) | 1994-04-25 | 2001-03-13 | Apple Computer, Inc. | System for ranking the relevance of information objects accessed by computer users |
US5758257A (en) | 1994-11-29 | 1998-05-26 | Herz; Frederick | System and method for scheduling broadcast of and access to video programs and other data using customer profiles |
US6571279B1 (en) | 1997-12-05 | 2003-05-27 | Pinpoint Incorporated | Location enhanced information delivery system |
US6460036B1 (en) | 1994-11-29 | 2002-10-01 | Pinpoint Incorporated | System and method for providing customized electronic newspapers and target advertisements |
US5778436A (en) | 1995-03-06 | 1998-07-07 | Duke University | Predictive caching system and method based on memory access which previously followed a cache miss |
US6112186A (en) | 1995-06-30 | 2000-08-29 | Microsoft Corporation | Distributed system for facilitating exchange of user information and opinion using automated collaborative filtering |
JP3360495B2 (en) * | 1995-08-09 | 2002-12-24 | 株式会社日立製作所 | Mobile terminal |
DE69630973T2 (en) | 1995-11-06 | 2004-05-27 | Motorola, Inc., Schaumburg | MESSAGE STORAGE IN A SELECTIVE RECEIVER |
AU1566597A (en) | 1995-12-27 | 1997-08-11 | Gary B. Robinson | Automated collaborative filtering in world wide web advertising |
JPH09212397A (en) | 1996-01-31 | 1997-08-15 | Toshiba Corp | File reading method |
US20020086671A1 (en) * | 1996-02-05 | 2002-07-04 | Umesh J. Amin | Roaming authorization system |
US5848397A (en) | 1996-04-19 | 1998-12-08 | Juno Online Services, L.P. | Method and apparatus for scheduling the presentation of messages to computer users |
CA2261262C (en) | 1996-07-22 | 2007-08-21 | Cyva Research Corporation | Personal information security and exchange tool |
US6601103B1 (en) | 1996-08-22 | 2003-07-29 | Intel Corporation | Method and apparatus for providing personalized supplemental programming |
JPH1063618A (en) | 1996-08-23 | 1998-03-06 | Nippon Telegr & Teleph Corp <Ntt> | Information providing system |
US7327711B2 (en) | 1996-09-05 | 2008-02-05 | Symbol Technologies, Inc. | System for digital radio communication between a wireless LAN and a PBX |
US6185427B1 (en) * | 1996-09-06 | 2001-02-06 | Snaptrack, Inc. | Distributed satellite position system processing and application network |
US20030093790A1 (en) | 2000-03-28 | 2003-05-15 | Logan James D. | Audio and video program recording, editing and playback systems using metadata |
CA2188845A1 (en) | 1996-10-25 | 1998-04-25 | Stephen Ross Todd | Diversity Antenna Selection |
US5948061A (en) | 1996-10-29 | 1999-09-07 | Double Click, Inc. | Method of delivery, targeting, and measuring advertising over networks |
US6177931B1 (en) * | 1996-12-19 | 2001-01-23 | Index Systems, Inc. | Systems and methods for displaying and recording control interface with television programs, video, advertising information and program scheduling information |
US6873834B1 (en) | 1996-12-20 | 2005-03-29 | Nortel Networks Limited | Wireless terminal diversity scheme |
US5961593A (en) | 1997-01-22 | 1999-10-05 | Lucent Technologies, Inc. | System and method for providing anonymous personalized browsing by a proxy system in a network |
JPH10294676A (en) | 1997-04-17 | 1998-11-04 | Yozan:Kk | Standby circuit |
US6105028A (en) * | 1997-06-26 | 2000-08-15 | Digital Equipment Corporation | Method and apparatus for accessing copies of documents using a web browser request interceptor |
CN1941863B (en) | 1997-07-21 | 2011-06-29 | 骏升发展(美国)有限公司 | Method for displaying target advertisement to user in electronic program guide system |
US6119098A (en) | 1997-10-14 | 2000-09-12 | Patrice D. Guyot | System and method for targeting and distributing advertisements over a distributed network |
JPH11136365A (en) | 1997-10-31 | 1999-05-21 | Hitachi Ltd | Information distribution system |
JP3122770B2 (en) | 1997-12-12 | 2001-01-09 | 大日精化工業株式会社 | Coloring composition for image recording |
US6738678B1 (en) | 1998-01-15 | 2004-05-18 | Krishna Asur Bharat | Method for ranking hyperlinked pages using content and connectivity analysis |
GB2333379A (en) | 1998-01-16 | 1999-07-21 | Ibm | Client/server computing |
US6647257B2 (en) * | 1998-01-21 | 2003-11-11 | Leap Wireless International, Inc. | System and method for providing targeted messages based on wireless mobile location |
AU769336B2 (en) | 1998-02-27 | 2004-01-22 | Beh Investments Llc | System and method for building user profiles |
GB2336006A (en) | 1998-03-31 | 1999-10-06 | Ibm | Client/server computing with client selectable location of transaction objects |
US6112203A (en) | 1998-04-09 | 2000-08-29 | Altavista Company | Method for ranking documents in a hyperlinked environment using connectivity and selective content analysis |
JPH11312190A (en) | 1998-04-28 | 1999-11-09 | Hitachi Ltd | Method for displaying commodity information |
EP1076871A1 (en) | 1998-05-15 | 2001-02-21 | Unicast Communications Corporation | A technique for implementing browser-initiated network-distributed advertising and for interstitially displaying an advertisement |
US7240022B1 (en) * | 1998-05-19 | 2007-07-03 | Mypoints.Com Inc. | Demographic information gathering and incentive award system and method |
US6256633B1 (en) | 1998-06-25 | 2001-07-03 | U.S. Philips Corporation | Context-based and user-profile driven information retrieval |
US6157945A (en) | 1998-07-01 | 2000-12-05 | Ricoh Company, Ltd. | Digital communication device and method including a routing function |
JP3328589B2 (en) | 1998-07-23 | 2002-09-24 | 株式会社リクルート | Terminal device, data stream generation device, data stream processing method, data stream generation method, and recording medium |
JP2947280B1 (en) * | 1998-07-28 | 1999-09-13 | 日本電気株式会社 | Location registration control method |
US6654813B1 (en) | 1998-08-17 | 2003-11-25 | Alta Vista Company | Dynamically categorizing entity information |
US6317722B1 (en) * | 1998-09-18 | 2001-11-13 | Amazon.Com, Inc. | Use of electronic shopping carts to generate personal recommendations |
US6356879B2 (en) | 1998-10-09 | 2002-03-12 | International Business Machines Corporation | Content based method for product-peer filtering |
FR2784846B1 (en) | 1998-10-15 | 2000-12-15 | Cit Alcatel | METHOD AND SYSTEM FOR MOBILE TELEPHONY USING SIGNALING MESSAGES WITH PRIORITY LEVELS |
JP4465560B2 (en) | 1998-11-20 | 2010-05-19 | ソニー株式会社 | Information display control device and information display control method for information display control device |
CA2352302A1 (en) | 1998-11-30 | 2000-06-08 | Index Systems, Inc. | Smart agent based on habit, statistical inference and psycho-demographic profiling |
US6216129B1 (en) | 1998-12-03 | 2001-04-10 | Expanse Networks, Inc. | Advertisement selection system supporting discretionary target market characteristics |
EP1450284A3 (en) | 1998-12-03 | 2004-09-15 | Samsung Electronics Co., Ltd. | Advertisement monitoring system |
US20020123928A1 (en) * | 2001-01-11 | 2002-09-05 | Eldering Charles A. | Targeting ads to subscribers based on privacy-protected subscriber profiles |
US8290351B2 (en) * | 2001-04-03 | 2012-10-16 | Prime Research Alliance E., Inc. | Alternative advertising in prerecorded media |
US7328448B2 (en) | 2000-08-31 | 2008-02-05 | Prime Research Alliance E, Inc. | Advertisement distribution system for distributing targeted advertisements in television systems |
US6457010B1 (en) * | 1998-12-03 | 2002-09-24 | Expanse Networks, Inc. | Client-server based subscriber characterization system |
US7150030B1 (en) | 1998-12-03 | 2006-12-12 | Prime Research Alliance, Inc. | Subscriber characterization system |
MXPA01005819A (en) | 1998-12-10 | 2005-09-08 | Leap Wireless Int Inc | System and method for providing targeted messages based on wireless mobile location. |
US6611684B1 (en) | 1998-12-10 | 2003-08-26 | Nortel Networks Limited | Method and apparatus for implementing customer group functionality in a wireless environment |
US6792412B1 (en) | 1999-02-02 | 2004-09-14 | Alan Sullivan | Neural network system and method for controlling information output based on user feedback |
US6564261B1 (en) * | 1999-05-10 | 2003-05-13 | Telefonaktiebolaget Lm Ericsson (Publ) | Distributed system to intelligently establish sessions between anonymous users over various networks |
US6668378B2 (en) | 1999-06-30 | 2003-12-23 | Webtv Networks, Inc. | Interactive television triggers having connected content/disconnected content attribute |
JP3788111B2 (en) | 1999-06-30 | 2006-06-21 | 株式会社デンソー | Information service system |
US8108245B1 (en) | 1999-09-17 | 2012-01-31 | Cox Communications, Inc. | Method and system for web user profiling and selective content delivery |
US20020046084A1 (en) | 1999-10-08 | 2002-04-18 | Scott A. Steele | Remotely configurable multimedia entertainment and information system with location based advertising |
FI107863B (en) | 1999-10-11 | 2001-10-15 | Sonera Oyj | Procedures and systems for protecting a user identification |
JP2001117977A (en) | 1999-10-15 | 2001-04-27 | Fuji Xerox Co Ltd | Workflow system |
US20030182567A1 (en) | 1999-10-20 | 2003-09-25 | Tivo Inc. | Client-side multimedia content targeting system |
JP2001128097A (en) | 1999-10-28 | 2001-05-11 | Nec Corp | Information storing device for traveling object |
US6230199B1 (en) | 1999-10-29 | 2001-05-08 | Mcafee.Com, Inc. | Active marketing based on client computer configurations |
WO2001035291A2 (en) | 1999-11-10 | 2001-05-17 | Amazon.Com, Inc. | Method and system for allocating display space |
US6834294B1 (en) | 1999-11-10 | 2004-12-21 | Screenboard Technologies Inc. | Methods and systems for providing and displaying information on a keyboard |
US7159232B1 (en) | 1999-11-16 | 2007-01-02 | Microsoft Corporation | Scheduling the recording of television programs |
US7031932B1 (en) | 1999-11-22 | 2006-04-18 | Aquantive, Inc. | Dynamically optimizing the presentation of advertising messages |
AU4309701A (en) | 1999-12-02 | 2001-06-12 | Zedo, Inc. | Data processing system for targeted content |
US7213005B2 (en) * | 1999-12-09 | 2007-05-01 | International Business Machines Corporation | Digital content distribution using web broadcasting services |
US6421673B1 (en) | 1999-12-13 | 2002-07-16 | Novient, Inc. | Method for mapping applications and or attributes in a distributed network environment |
JP2001175672A (en) | 1999-12-17 | 2001-06-29 | Ricoh Co Ltd | Information filtering system and its method, and computer-readable recording medium with recorded program for implementing same method |
US6981040B1 (en) | 1999-12-28 | 2005-12-27 | Utopy, Inc. | Automatic, personalized online information and product services |
US6566537B2 (en) * | 1999-12-30 | 2003-05-20 | Pharmacia Ab | Process and intermediates |
US6847959B1 (en) | 2000-01-05 | 2005-01-25 | Apple Computer, Inc. | Universal interface for retrieval of information in a computer system |
JP2001203811A (en) | 2000-01-19 | 2001-07-27 | Index:Kk | Communication system for mobile object |
AU2001233147A1 (en) * | 2000-01-28 | 2001-08-07 | Buzzsaw.Com | E-commerce bid and project management system and method for the construction industry |
US6868525B1 (en) * | 2000-02-01 | 2005-03-15 | Alberti Anemometer Llc | Computer graphic display visualization system and method |
CA2298194A1 (en) * | 2000-02-07 | 2001-08-07 | Profilium Inc. | Method and system for delivering and targeting advertisements over wireless networks |
JP2001222491A (en) | 2000-02-09 | 2001-08-17 | Nec Corp | Information providing system, its method and client |
JP3545666B2 (en) | 2000-02-14 | 2004-07-21 | 株式会社東芝 | Service providing system for mobile terminals |
US6484148B1 (en) | 2000-02-19 | 2002-11-19 | John E. Boyd | Electronic advertising device and method of using the same |
JP2001238192A (en) | 2000-02-21 | 2001-08-31 | Nippon Telegr & Teleph Corp <Ntt> | Information distribution system, information distribution method and terminal |
US7330824B1 (en) | 2000-02-25 | 2008-02-12 | Navic Systems, Inc. | Method and system for content profiling and activation |
US8458286B2 (en) | 2000-02-29 | 2013-06-04 | Hewlett-Packard Development Company, L.P. | Flexible wireless advertisement integration in wireless software applications |
JP2001251576A (en) | 2000-03-03 | 2001-09-14 | Matsushita Electric Ind Co Ltd | Program reception device and accumulation broadcast charging device |
GB0005727D0 (en) | 2000-03-10 | 2000-05-03 | Koninkl Philips Electronics Nv | Television |
JP4414554B2 (en) | 2000-03-22 | 2010-02-10 | シャープ株式会社 | Customer management system |
JP2001273298A (en) | 2000-03-23 | 2001-10-05 | Hitachi Ltd | Digital contents distribution system |
US6499029B1 (en) | 2000-03-29 | 2002-12-24 | Koninklijke Philips Electronics N.V. | User interface providing automatic organization and filtering of search criteria |
US6912398B1 (en) | 2000-04-10 | 2005-06-28 | David Domnitz | Apparatus and method for delivering information to an individual based on location and/or time |
US20020003162A1 (en) | 2000-04-17 | 2002-01-10 | Ferber John B. | Apparatus and method for delivery of targeted marketing to automated service machines |
JP4620830B2 (en) | 2000-04-26 | 2011-01-26 | 株式会社 ボルテージ | Advertisement delivery decision method and delivery optimization system |
US20030110080A1 (en) | 2000-04-26 | 2003-06-12 | Yuzi Tsutani | Advertisement distribution determining/optimizing method |
US8843590B2 (en) | 2000-05-31 | 2014-09-23 | Ebm/Ip, Llc | Systems, methods and computer program products for facilitating display of content within application programs executing on electronic devices |
MXPA02012137A (en) | 2000-06-07 | 2003-07-14 | Hewlett Packard Co | A system and related methods for dynamically selecting publication content. |
US6738808B1 (en) | 2000-06-30 | 2004-05-18 | Bell South Intellectual Property Corporation | Anonymous location service for wireless networks |
AU2001281294A1 (en) | 2000-07-06 | 2002-01-21 | Protigen, Inc. | System and method for anonymous transaction in a data network and classificationof individuals without knowing their real identity |
KR20020030112A (en) | 2000-07-13 | 2002-04-22 | 요트.게.아. 롤페즈 | Auditing system for E-commerce via consumer appliance |
US6647261B1 (en) | 2000-07-20 | 2003-11-11 | Koninklijke Philips Electronics N.V. | Idle handoff method taking into account critical system jobs |
US20020032771A1 (en) | 2000-07-20 | 2002-03-14 | Trond Gledje | Event-based advertisements |
US6671732B1 (en) | 2000-07-24 | 2003-12-30 | Comverse Ltd. | Method and apparatus for control of content based rich media streaming |
US6567660B1 (en) * | 2000-08-01 | 2003-05-20 | Command Audio Corporation | On-demand information service using wireless cellular communications system |
US20070037610A1 (en) | 2000-08-29 | 2007-02-15 | Logan James D | Methods and apparatus for conserving battery power in a cellular or portable telephone |
US7689510B2 (en) | 2000-09-07 | 2010-03-30 | Sonic Solutions | Methods and system for use in network management of content |
US20020062251A1 (en) | 2000-09-29 | 2002-05-23 | Rajan Anandan | System and method for wireless consumer communications |
US20070022375A1 (en) | 2000-10-19 | 2007-01-25 | David Walker | Apparatus, system, and method for an electronic payment system |
JP4479087B2 (en) | 2000-10-19 | 2010-06-09 | ソニー株式会社 | Broadcast system |
AU2002226879A1 (en) | 2000-10-24 | 2002-05-06 | Doubleclick Inc. | Method and system for sharing anonymous user information |
US7403980B2 (en) | 2000-11-08 | 2008-07-22 | Sri International | Methods and apparatus for scalable, distributed management of virtual private networks |
DE60103085T2 (en) | 2000-11-20 | 2004-11-25 | British Telecommunications P.L.C. | METHOD FOR MANAGING RESOURCES |
US7370073B2 (en) * | 2000-11-28 | 2008-05-06 | Navic Systems, Inc. | Using viewership profiles for targeted promotion deployment |
JP2002197342A (en) | 2000-12-25 | 2002-07-12 | Hitachi Ltd | Multiple dwelling house common site system and operation method therefor |
JP2002197356A (en) | 2000-12-26 | 2002-07-12 | Toshiba Corp | Commercial message providing method and system and storage medium |
US9613483B2 (en) | 2000-12-27 | 2017-04-04 | Proxense, Llc | Personal digital key and receiver/decoder circuit system and method |
JP2002199460A (en) | 2000-12-27 | 2002-07-12 | Hitachi Ltd | Information service system and information providing method |
US20020087401A1 (en) | 2000-12-29 | 2002-07-04 | Gateway, Inc. | System and method for targeted advertising |
US20020091568A1 (en) * | 2001-01-10 | 2002-07-11 | International Business Machines Corporation | Personalized profile based advertising system and method with integration of physical location using GPS |
US7356530B2 (en) * | 2001-01-10 | 2008-04-08 | Looksmart, Ltd. | Systems and methods of retrieving relevant information |
US6526440B1 (en) | 2001-01-30 | 2003-02-25 | Google, Inc. | Ranking search results by reranking the results based on local inter-connectivity |
US7669212B2 (en) | 2001-02-02 | 2010-02-23 | Opentv, Inc. | Service platform suite management system |
US20020138331A1 (en) | 2001-02-05 | 2002-09-26 | Hosea Devin F. | Method and system for web page personalization |
US20030222134A1 (en) * | 2001-02-17 | 2003-12-04 | Boyd John E | Electronic advertising device and method of using the same |
US7222101B2 (en) | 2001-02-26 | 2007-05-22 | American Express Travel Related Services Company, Inc. | System and method for securing data through a PDA portal |
US7298734B2 (en) | 2001-03-05 | 2007-11-20 | Qwest Communications International, Inc. | Method and system communication system message processing based on classification criteria |
JP2002271855A (en) | 2001-03-08 | 2002-09-20 | Ntt Software Corp | Advertisement providing system |
US6889054B2 (en) | 2001-03-29 | 2005-05-03 | International Business Machines Corporation | Method and system for schedule based advertising on a mobile phone |
US20020152117A1 (en) * | 2001-04-12 | 2002-10-17 | Mike Cristofalo | System and method for targeting object oriented audio and video content to users |
JP2005513584A (en) * | 2001-04-16 | 2005-05-12 | ビーイーエイ システムズ, インコーポレイテッド | Web-based marketing and campaign management system and method |
JP2003208381A (en) | 2001-04-20 | 2003-07-25 | Nippon Telegr & Teleph Corp <Ntt> | Token type contents presentation system, token type contents presentation method and portable user terminal |
US6635015B2 (en) | 2001-04-20 | 2003-10-21 | The Procter & Gamble Company | Body weight management system |
US20040139204A1 (en) | 2001-04-23 | 2004-07-15 | Siegried Ergezinger | Architecture for providing services in the internet |
US6968178B2 (en) | 2001-04-27 | 2005-11-22 | Hewlett-Packard Development Company, L.P. | Profiles for information acquisition by devices in a wireless network |
JP2002334248A (en) | 2001-05-07 | 2002-11-22 | Honda Motor Co Ltd | Computer system judging customer type in real time |
JP2002333853A (en) | 2001-05-08 | 2002-11-22 | Hitachi Ltd | System and method for distributing advertisement, and portable terminal equipment |
US6889224B2 (en) | 2001-05-16 | 2005-05-03 | International Business Machines Corporation | Method for storing, accessing embedded web pages during manufacturing phase on personal digital device |
JP2002351915A (en) * | 2001-05-29 | 2002-12-06 | Noritz Corp | Method and system for information distribution, receiving terminal device, information selection processing program and storage medium |
JP2002366819A (en) | 2001-05-31 | 2002-12-20 | Hewlett Packard Co <Hp> | Distribution system for electronic coupon based upon identifier |
US6507279B2 (en) * | 2001-06-06 | 2003-01-14 | Sensormatic Electronics Corporation | Complete integrated self-checkout system and method |
US8131585B2 (en) | 2001-06-14 | 2012-03-06 | Nicholas Frank C | Method and system for providing network based target advertising |
US7099952B2 (en) * | 2001-06-28 | 2006-08-29 | Microsoft Corporation | Transportable identifier and system and method to facilitate access to broadcast data |
US7149704B2 (en) | 2001-06-29 | 2006-12-12 | Claria Corporation | System, method and computer program product for collecting information about a network user |
US6798358B2 (en) * | 2001-07-03 | 2004-09-28 | Nortel Networks Limited | Location-based content delivery |
US6937976B2 (en) | 2001-07-09 | 2005-08-30 | Hewlett-Packard Development Company, L.P. | Method and system for temporary network identity |
CA2394503A1 (en) | 2001-07-23 | 2003-01-23 | Research In Motion Limited | System and method for pushing information to a mobile device |
JP2003050932A (en) | 2001-08-06 | 2003-02-21 | Fuji Bolt Seisakusho:Kk | Method and device for communication data relaying, and method and device for substitutional purchase by relaying of communication data |
JP2003050820A (en) | 2001-08-07 | 2003-02-21 | Casio Comput Co Ltd | Service information providing system, service information providing device and method therefor |
JP3875051B2 (en) | 2001-08-28 | 2007-01-31 | 株式会社エヌ・ティ・ティ・ドコモ | COMMUNICATION SYSTEM, COMMUNICATION METHOD, AND COMMUNICATION CONTROL DEVICE |
JP3612562B2 (en) | 2001-08-28 | 2005-01-19 | 独立行政法人情報通信研究機構 | Digital data retrieval information presentation system |
US20050210243A1 (en) | 2001-09-28 | 2005-09-22 | Archard Paul L | System and method for improving client response times using an integrated security and packet optimization framework |
US20030130887A1 (en) | 2001-10-03 | 2003-07-10 | Thurston Nathaniel | Non-deterministic method and system for the optimization of a targeted content delivery |
US6947910B2 (en) | 2001-10-09 | 2005-09-20 | E-Cast, Inc. | Secure ticketing |
US7274684B2 (en) | 2001-10-10 | 2007-09-25 | Bruce Fitzgerald Young | Method and system for implementing and managing a multimedia access network device |
US7756520B2 (en) | 2001-10-17 | 2010-07-13 | Nortel Networks Limited | Packet communication system with dual candidate sets for independent management of uplink and downlink transmissions |
US6985811B2 (en) | 2001-10-30 | 2006-01-10 | Sirf Technology, Inc. | Method and apparatus for real time clock (RTC) brownout detection |
US7162522B2 (en) * | 2001-11-02 | 2007-01-09 | Xerox Corporation | User profile classification by web usage analysis |
US7136871B2 (en) * | 2001-11-21 | 2006-11-14 | Microsoft Corporation | Methods and systems for selectively displaying advertisements |
GB2383494B (en) | 2001-12-19 | 2006-01-25 | Qualcomm | A method of and apparatus for handling messages in a mobile communications environment |
JP2003196128A (en) | 2001-12-26 | 2003-07-11 | Hitachi Ltd | Portable information terminal, external storage device and information communication system |
JP2003196305A (en) | 2001-12-28 | 2003-07-11 | Pfu Ltd | Information distribution program, information distribution method and information distribution device |
CA2475363A1 (en) | 2002-02-07 | 2003-08-14 | Paul Jefferson Reilly | Method and apparatus for providing content to a mobile terminal |
JP4658439B2 (en) | 2002-02-20 | 2011-03-23 | 株式会社電通 | Information providing device, control device, and program |
US20040203630A1 (en) | 2002-03-15 | 2004-10-14 | Wang Charles Chuanming | Method and apparatus for targeting service delivery to mobile devices |
JP2003283652A (en) | 2002-03-25 | 2003-10-03 | Nippon Telegr & Teleph Corp <Ntt> | Voice advertisement distribution system using packet network |
WO2003083714A1 (en) | 2002-03-28 | 2003-10-09 | Nokia Corporation | Providing information for mobile users |
US7346606B2 (en) | 2003-06-30 | 2008-03-18 | Google, Inc. | Rendering advertisements with documents having one or more topics using user topic interest |
US7716161B2 (en) * | 2002-09-24 | 2010-05-11 | Google, Inc, | Methods and apparatus for serving relevant advertisements |
US9235849B2 (en) | 2003-12-31 | 2016-01-12 | Google Inc. | Generating user information for use in targeted advertising |
JP2003316742A (en) | 2002-04-24 | 2003-11-07 | Nippon Telegr & Teleph Corp <Ntt> | Anonymous communication method and device having single sign-on function |
US8046787B2 (en) | 2002-05-31 | 2011-10-25 | Opentv, Inc. | Method and system for the storage, viewing management, and delivery of targeted advertising |
JP2004005080A (en) | 2002-05-31 | 2004-01-08 | Sanyo Electric Co Ltd | Information providing system and information providing method |
JP2004013426A (en) | 2002-06-05 | 2004-01-15 | Nippon Telegr & Teleph Corp <Ntt> | Multimedia information providing system and method thereof, and multimedia information providing program and recording medium thereof |
US7069259B2 (en) | 2002-06-28 | 2006-06-27 | Microsoft Corporation | Multi-attribute specification of preferences about people, priorities and privacy for guiding messaging and communications |
US20040002995A1 (en) * | 2002-06-28 | 2004-01-01 | Koninklijke Philips Electronics N.V. | Context and time sensitive profile builder |
GB0216650D0 (en) | 2002-07-18 | 2002-08-28 | Univ Bristol | Detection of disease by analysis of emissions |
WO2004010682A2 (en) | 2002-07-19 | 2004-01-29 | Intellisign, Ltd | Methods and apparatus for an interactive media display |
US7254643B1 (en) | 2002-08-08 | 2007-08-07 | At&T Corp. | System and method for providing multi-media services to communication devices over a communications network |
KR20040032260A (en) | 2002-10-08 | 2004-04-17 | 전자부품연구원 | Advertisements display apparatus using metadata and its service method |
JP2004086560A (en) | 2002-08-27 | 2004-03-18 | Yamaha Corp | Information distribution system and method, as well as information distribution control device, method and program |
GB2392518B (en) | 2002-09-02 | 2004-09-22 | 3Com Corp | Computer network and method of operating same to preload content of selected web pages |
AU2003275550A1 (en) | 2002-10-10 | 2004-05-04 | Matsushita Electric Industrial Co., Ltd. | Information acquisition method, information providing method, and information acquisition device |
JP2007263972A (en) | 2002-10-10 | 2007-10-11 | Matsushita Electric Ind Co Ltd | Information presenting method and device |
JP2004138692A (en) | 2002-10-16 | 2004-05-13 | Hitachi Eng Co Ltd | Internet advertisement information providing system |
KR20040040779A (en) | 2002-11-08 | 2004-05-13 | 주식회사 비즈모델라인 | System and Method for Management a Record of Expenditure by Using Smart Card(IC Card) |
KR100453674B1 (en) | 2002-11-08 | 2004-10-20 | 지에스티 주식회사 | A trigonal prism turning display device for advertisement |
US20040093418A1 (en) | 2002-11-13 | 2004-05-13 | Jukka Tuomi | Update of subscriber profiles in a communication system |
DE60322575D1 (en) | 2002-12-03 | 2008-09-11 | Research In Motion Ltd | PROCEDURE, SYSTEM AND COMPUTER SOFTWARE PRODUCT FOR PREFERRED FOLDER FOR ONE MESSAGE |
US7512403B2 (en) | 2002-12-20 | 2009-03-31 | Samsung Electronics Co., Ltd. | Apparatus and method for performing an interfrequency handoff in a wireless network |
US20040128347A1 (en) | 2002-12-31 | 2004-07-01 | Jeffrey Mason | System and method for providing content access at remote portal environments |
KR20050107618A (en) | 2003-03-10 | 2005-11-14 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | Content exchange between portable device and network |
JP2004294264A (en) | 2003-03-27 | 2004-10-21 | Mazda Motor Corp | Navigation system |
US7577732B2 (en) | 2003-03-28 | 2009-08-18 | Fujitsu Limited | Information distribution service providing system |
JP2004320153A (en) | 2003-04-11 | 2004-11-11 | Sony Corp | Radio communication system and power control method thereof |
WO2004100033A2 (en) | 2003-05-12 | 2004-11-18 | Koninklijke Philips Electronics N.V. | Apparatus and method for performing profile based collaborative filtering |
US20040243482A1 (en) | 2003-05-28 | 2004-12-02 | Steven Laut | Method and apparatus for multi-way jukebox system |
JP2004355555A (en) * | 2003-05-30 | 2004-12-16 | Ntt Docomo Inc | Communication terminal and data receiving program |
JP2006527960A (en) | 2003-06-18 | 2006-12-07 | 松下電器産業株式会社 | Network recording system, recording server, terminal device |
US7027463B2 (en) | 2003-07-11 | 2006-04-11 | Sonolink Communications Systems, Llc | System and method for multi-tiered rule filtering |
JP2005070889A (en) | 2003-08-28 | 2005-03-17 | Shunji Sugaya | Attribute judgment system, method, and computer program |
JP2005107728A (en) | 2003-09-29 | 2005-04-21 | Hitachi Software Eng Co Ltd | Advertisement display system and advertisement display method in cellphone terminal |
US20050128995A1 (en) | 2003-09-29 | 2005-06-16 | Ott Maximilian A. | Method and apparatus for using wireless hotspots and semantic routing to provide broadband mobile serveices |
US8527346B2 (en) | 2003-09-29 | 2013-09-03 | Yahoo! Inc. | Method and system for scheduling electronic advertising |
AU2003265197A1 (en) | 2003-09-30 | 2005-04-14 | Telefonaktiebolaget Lm Ericsson (Publ) | Means and method for generating a unique user's identity for use between different domains |
US7693827B2 (en) | 2003-09-30 | 2010-04-06 | Google Inc. | Personalization of placed content ordering in search results |
US8321278B2 (en) | 2003-09-30 | 2012-11-27 | Google Inc. | Targeted advertisements based on user profiles and page profile |
US20050222989A1 (en) | 2003-09-30 | 2005-10-06 | Taher Haveliwala | Results based personalization of advertisements in a search engine |
US20050071328A1 (en) | 2003-09-30 | 2005-03-31 | Lawrence Stephen R. | Personalization of web search |
FI116808B (en) | 2003-10-06 | 2006-02-28 | Leiki Oy | An arrangement and method for providing information to a user |
US20050120003A1 (en) | 2003-10-08 | 2005-06-02 | Drury William J. | Method for maintaining a record of searches and results |
WO2005062066A2 (en) | 2003-10-22 | 2005-07-07 | Awarepoint Corporation | Wireless position location and tracking system |
US7552433B2 (en) * | 2003-11-12 | 2009-06-23 | Hewlett-Packard Development Company, L.P. | Non-platform-specific unique indentifier generation |
US7594244B2 (en) * | 2003-11-12 | 2009-09-22 | Koninklijke Philips Electronics N.V. | Program recommendation system |
JP4285225B2 (en) | 2003-12-11 | 2009-06-24 | 沖電気工業株式会社 | Relay device, network system, network access method, and program |
US20050216823A1 (en) | 2003-12-30 | 2005-09-29 | Microsoft Corporation | Assigning textual ads based on article history |
US7216205B2 (en) | 2004-01-12 | 2007-05-08 | Hewlett-Packard Development Company, L.P. | Cache line ownership transfer in multi-processor computer systems |
EP1577819A1 (en) | 2004-01-26 | 2005-09-21 | Quad/Graphics, Inc. | Advertising management system and method of operation |
US7523112B2 (en) | 2004-02-19 | 2009-04-21 | Research In Motion Limited | System and method for searching a remote database |
US7599991B2 (en) | 2004-03-10 | 2009-10-06 | Microsoft Corporation | Rules interface for implementing message rules on a mobile computing device |
US20050215238A1 (en) | 2004-03-24 | 2005-09-29 | Macaluso Anthony G | Advertising on mobile devices |
US20050262246A1 (en) | 2004-04-19 | 2005-11-24 | Satish Menon | Systems and methods for load balancing storage and streaming media requests in a scalable, cluster-based architecture for real-time streaming |
US7616613B2 (en) | 2004-05-05 | 2009-11-10 | Cisco Technology, Inc. | Internet protocol authentication in layer-3 multipoint tunneling for wireless access points |
JP2005332265A (en) | 2004-05-20 | 2005-12-02 | Sony Corp | Information processing system and method, information processor and method, and program |
US20060031368A1 (en) | 2004-06-16 | 2006-02-09 | Decone Ian D | Presence management in a push to talk system |
US7502344B2 (en) | 2004-06-25 | 2009-03-10 | Fujifilm Corporation | Communications terminal, server, playback control method and program |
US7716219B2 (en) | 2004-07-08 | 2010-05-11 | Yahoo ! Inc. | Database search system and method of determining a value of a keyword in a search |
JP2006031204A (en) | 2004-07-14 | 2006-02-02 | Recruit Co Ltd | Information matching apparatus |
US8141118B2 (en) * | 2004-07-26 | 2012-03-20 | Microsoft Corporation | Data broadcasting receiver power management |
JP2006053767A (en) | 2004-08-12 | 2006-02-23 | Ntt Comware Corp | Content distribution system and method, content distribution server, client terminal, and computer program |
US7860922B2 (en) | 2004-08-18 | 2010-12-28 | Time Warner, Inc. | Method and device for the wireless exchange of media content between mobile devices based on content preferences |
US7860923B2 (en) * | 2004-08-18 | 2010-12-28 | Time Warner Inc. | Method and device for the wireless exchange of media content between mobile devices based on user information |
US8135803B2 (en) * | 2004-08-23 | 2012-03-13 | Ianywhere Solutions, Inc. | Method, system, and computer program product for offline advertisement servicing and cycling |
US20060041472A1 (en) * | 2004-08-23 | 2006-02-23 | Lukose Rajan M | Systems and methods of interfacing an advertisement with a message presentation client |
KR20060017990A (en) | 2004-08-23 | 2006-02-28 | 남기열 | Information (advertising/coupon) sending service model through handy phone(mobile phone) with credit card transaction |
US20060064346A1 (en) | 2004-08-31 | 2006-03-23 | Qualcomm Incorporated | Location based service (LBS) system and method for targeted advertising |
US20060059183A1 (en) | 2004-09-16 | 2006-03-16 | Pearson Malcolm E | Securely publishing user profile information across a public insecure infrastructure |
US20060064386A1 (en) | 2004-09-20 | 2006-03-23 | Aaron Marking | Media on demand via peering |
US7707167B2 (en) | 2004-09-20 | 2010-04-27 | Microsoft Corporation | Method, system, and apparatus for creating a knowledge interchange profile |
JP4880962B2 (en) | 2004-09-27 | 2012-02-22 | ヤフー株式会社 | Advertisement content distribution ratio calculation program, advertisement content distribution ratio calculation method, advertisement content distribution ratio calculation system, content distribution control system, advertisement content distribution control system, advertisement content distribution control method, and advertisement content distribution control program |
US20070011155A1 (en) | 2004-09-29 | 2007-01-11 | Sarkar Pte. Ltd. | System for communication and collaboration |
KR20090128582A (en) * | 2004-10-19 | 2009-12-15 | 야후! 인크. | System and method for location based social networking |
US11283885B2 (en) | 2004-10-19 | 2022-03-22 | Verizon Patent And Licensing Inc. | System and method for location based matching and promotion |
US7224970B2 (en) * | 2004-10-26 | 2007-05-29 | Motorola, Inc. | Method of scanning for beacon transmissions in a WLAN |
US20060165005A1 (en) | 2004-11-15 | 2006-07-27 | Microsoft Corporation | Business method for pay-as-you-go computer and dynamic differential pricing |
FR2878670B1 (en) | 2004-11-26 | 2007-04-20 | Himanshu Sekhar | METHOD OF ENHANCING ERGONOMICS AND SPEED OF ACCESS TO INFORMATION |
US20060129931A1 (en) | 2004-12-10 | 2006-06-15 | Microsoft Corporation | Integrated client help viewer for internet-based and local help content |
US7869453B2 (en) | 2004-12-17 | 2011-01-11 | Lantiq Deutschland Gmbh | Apparatus and method for data transfer |
EP1878221A2 (en) | 2004-12-23 | 2008-01-16 | Koninklijke Philips Electronics N.V. | Method and apparatus for recommending contents |
JP4331101B2 (en) | 2004-12-27 | 2009-09-16 | 株式会社東芝 | Cache control device, cache control method, and cache control program |
US7460857B2 (en) * | 2005-01-21 | 2008-12-02 | Roach Jr Peter O | Method and apparatus for providing information in response to a delayed grant of subscriber permission |
JP2006203593A (en) | 2005-01-21 | 2006-08-03 | Hitachi Ltd | System and method for televiewing tv broadcast |
US20070168461A1 (en) | 2005-02-01 | 2007-07-19 | Moore James F | Syndicating surgical data in a healthcare environment |
US20080270417A1 (en) | 2005-02-07 | 2008-10-30 | Robert Roker | Method and System of Targeting Content |
JP2006215956A (en) | 2005-02-07 | 2006-08-17 | Nomura Research Institute Ltd | Online advertising system and online advertising method |
US20060194569A1 (en) | 2005-02-25 | 2006-08-31 | Leapfrog Technologies, Inc. | Wireless electronic coupon delivery system for use by mobile communication devices |
US8768766B2 (en) | 2005-03-07 | 2014-07-01 | Turn Inc. | Enhanced online advertising system |
JP4650037B2 (en) | 2005-03-11 | 2011-03-16 | 日本電気株式会社 | Data management apparatus, mobile phone, data management method, program, recording medium |
JP2006261956A (en) | 2005-03-16 | 2006-09-28 | Hochiki Corp | Notice broadcast system |
US9288538B2 (en) | 2005-04-07 | 2016-03-15 | Qualcomm Incorporated | Methods and apparatus for conveying a delivery schedule to mobile terminals |
US7610280B2 (en) | 2005-05-05 | 2009-10-27 | Cisco Technology, Inc. | Method and system for dynamically pre-positioning content in a network based detecting or predicting user presence |
US7653627B2 (en) | 2005-05-13 | 2010-01-26 | Microsoft Corporation | System and method for utilizing the content of an online conversation to select advertising content and/or other relevant information for display |
US20060271425A1 (en) | 2005-05-27 | 2006-11-30 | Microsoft Corporation | Advertising in application programs |
US20060277098A1 (en) | 2005-06-06 | 2006-12-07 | Chung Tze D | Media playing system and method for delivering multimedia content with up-to-date and targeted marketing messages over a communication network |
US20060277271A1 (en) | 2005-06-07 | 2006-12-07 | Yahoo! Inc. | Prefetching content based on a mobile user profile |
US20060282312A1 (en) | 2005-06-10 | 2006-12-14 | Microsoft Corporation | Advertisements in an alert interface |
US20060293065A1 (en) * | 2005-06-27 | 2006-12-28 | Lucent Technologies Inc. | Dynamic information on demand |
KR20080043764A (en) | 2005-06-28 | 2008-05-19 | 초이스스트림, 인코포레이티드 | Methods and apparatus for a statistical system for targeting advertisements |
US20070005419A1 (en) * | 2005-06-30 | 2007-01-04 | Microsoft Corporation | Recommending location and services via geospatial collaborative filtering |
JP2007017841A (en) | 2005-07-11 | 2007-01-25 | Seiji Wada | Electronic mail advertisement delivery system |
JP2007089131A (en) | 2005-07-25 | 2007-04-05 | Sony Corp | Information processor and method, program, and recording medium |
US20070022098A1 (en) * | 2005-07-25 | 2007-01-25 | Dale Malik | Systems and methods for automatically updating annotations and marked content of an information search |
WO2007015183A1 (en) | 2005-08-01 | 2007-02-08 | Koninklijke Philips Electronics N.V. | Organizing content using a dynamic profile |
JP4398916B2 (en) | 2005-08-12 | 2010-01-13 | 株式会社東芝 | Probabilistic model generation apparatus and program |
US8195133B2 (en) | 2005-09-14 | 2012-06-05 | Jumptap, Inc. | Mobile dynamic advertisement creation and placement |
US20070060114A1 (en) | 2005-09-14 | 2007-03-15 | Jorey Ramer | Predictive text completion for a mobile communication facility |
US20080215623A1 (en) | 2005-09-14 | 2008-09-04 | Jorey Ramer | Mobile communication facility usage and social network creation |
US20080214153A1 (en) | 2005-09-14 | 2008-09-04 | Jorey Ramer | Mobile User Profile Creation based on User Browse Behaviors |
US7979509B1 (en) | 2005-09-15 | 2011-07-12 | Juniper Networks, Inc. | Clustered network acceleration devices having shared cache |
US7761075B2 (en) | 2005-09-21 | 2010-07-20 | Samsung Electronics Co., Ltd. | Apparatus and method for interference cancellation in wireless mobile stations operating concurrently on two or more air interfaces |
GB2430524A (en) | 2005-09-23 | 2007-03-28 | Avantone Oy | Mobile information processing system |
JP2007094560A (en) | 2005-09-27 | 2007-04-12 | Nec Corp | Service providing method, service providing system, service providing device, service providing terminal and service providing program |
US20090150238A1 (en) | 2005-10-12 | 2009-06-11 | Adam Marsh | System and method for the reversible leasing of anonymous user data in exchange for personalized content including targeted advertisements |
US20070088603A1 (en) * | 2005-10-13 | 2007-04-19 | Jouppi Norman P | Method and system for targeted data delivery using weight-based scoring |
US20070088801A1 (en) | 2005-10-17 | 2007-04-19 | Zohar Levkovitz | Device, system and method of delivering targeted advertisements using wireless application protocol |
WO2007045257A1 (en) | 2005-10-18 | 2007-04-26 | Telecom Italia S.P.A. | A method for controlling access to file systems, related system, sim card and computer program product for use therein |
US20070111726A1 (en) | 2005-11-15 | 2007-05-17 | Sony Ericsson Mobile Communications Ab | User profiles for mobile terminals |
JP4635855B2 (en) * | 2005-12-13 | 2011-02-23 | 株式会社日立製作所 | Data communication method and system |
US20070136742A1 (en) * | 2005-12-13 | 2007-06-14 | General Instrument Corporation | Method, apparatus and system for replacing advertisements in recorded video content |
US7805129B1 (en) | 2005-12-27 | 2010-09-28 | Qurio Holdings, Inc. | Using device content information to influence operation of another device |
US8255640B2 (en) | 2006-01-03 | 2012-08-28 | Apple Inc. | Media device with intelligent cache utilization |
US7706740B2 (en) | 2006-01-06 | 2010-04-27 | Qualcomm Incorporated | Apparatus and methods of selective collection and selective presentation of content |
WO2007082190A2 (en) | 2006-01-06 | 2007-07-19 | Qualcomm Incorporated | Apparatus and methods of selective collection and selective presentation of content |
US7657522B1 (en) | 2006-01-12 | 2010-02-02 | Recommind, Inc. | System and method for providing information navigation and filtration |
US7668922B2 (en) | 2006-01-19 | 2010-02-23 | International Business Machines Corporation | Identifying and displaying relevant shared entities in an instant messaging system |
US7756922B2 (en) | 2006-01-27 | 2010-07-13 | Oracle International Corporation | Schema annotations for managing cached document fragments |
US20070201468A1 (en) * | 2006-02-28 | 2007-08-30 | Jari Jokela | Multicast group address signaling using MAC header for power save delivery in a wireless network |
US7903817B2 (en) | 2006-03-02 | 2011-03-08 | Cisco Technology, Inc. | System and method for wireless network profile provisioning |
US20070208728A1 (en) | 2006-03-03 | 2007-09-06 | Microsoft Corporation | Predicting demographic attributes based on online behavior |
JP2007241921A (en) | 2006-03-13 | 2007-09-20 | Keiji Ariyama | Advertisement distributing system and advertisement distributing method |
JP2007264764A (en) | 2006-03-27 | 2007-10-11 | Denso It Laboratory Inc | Content sorting method |
US7535884B2 (en) * | 2006-04-18 | 2009-05-19 | Cisco Technology, Inc. | Battery-efficient generic advertising service for wireless mobile devices |
US7711004B2 (en) * | 2006-04-18 | 2010-05-04 | Cisco Technology, Inc. | Multiple broadcast channels for wireless networks |
US10803468B2 (en) * | 2006-04-18 | 2020-10-13 | At&T Intellectual Property I, L.P. | Method and apparatus for selecting advertising |
US7901288B2 (en) | 2006-04-20 | 2011-03-08 | International Business Machines Corporation | Embedded advertising enhancements in interactive computer game environments |
US20070260597A1 (en) | 2006-05-02 | 2007-11-08 | Mark Cramer | Dynamic search engine results employing user behavior |
US8259623B2 (en) | 2006-05-04 | 2012-09-04 | Bridgewater Systems Corp. | Content capability clearing house systems and methods |
EP2021955A1 (en) * | 2006-05-24 | 2009-02-11 | Icom Limited | Content engine |
US8571580B2 (en) * | 2006-06-01 | 2013-10-29 | Loopt Llc. | Displaying the location of individuals on an interactive map display on a mobile communication device |
US7814112B2 (en) | 2006-06-09 | 2010-10-12 | Ebay Inc. | Determining relevancy and desirability of terms |
US8175645B2 (en) | 2006-06-12 | 2012-05-08 | Qurio Holdings, Inc. | System and method for modifying a device profile |
US7997485B2 (en) | 2006-06-29 | 2011-08-16 | Microsoft Corporation | Content presentation based on user preferences |
US9135626B2 (en) | 2006-06-30 | 2015-09-15 | Nokia Technologies Oy | Advertising middleware |
US8059646B2 (en) | 2006-07-11 | 2011-11-15 | Napo Enterprises, Llc | System and method for identifying music content in a P2P real time recommendation network |
US7657639B2 (en) | 2006-07-21 | 2010-02-02 | International Business Machines Corporation | Method and system for identity provider migration using federated single-sign-on operation |
US20080082417A1 (en) * | 2006-07-31 | 2008-04-03 | Publicover Mark W | Advertising and fulfillment system |
US8121915B1 (en) | 2006-08-16 | 2012-02-21 | Resource Consortium Limited | Generating financial plans using a personal information aggregator |
CN101502110B (en) | 2006-08-31 | 2011-05-18 | 国际商业机器公司 | Method and system for playing personalized advertising in mobile television |
US20080133327A1 (en) * | 2006-09-14 | 2008-06-05 | Shah Ullah | Methods and systems for securing content played on mobile devices |
JP4240094B2 (en) | 2006-09-19 | 2009-03-18 | 船井電機株式会社 | Content receiving system |
JP5016880B2 (en) | 2006-09-21 | 2012-09-05 | 富士通株式会社 | Memory management method and apparatus according to priority class |
WO2008042243A2 (en) * | 2006-09-29 | 2008-04-10 | Audible | Methods and apparatus for customized content delivery |
WO2008042302A2 (en) | 2006-09-29 | 2008-04-10 | Narian Technologies Corp. | Apparatus and method using near field communications |
US8566874B2 (en) | 2006-10-03 | 2013-10-22 | Verizon Patent And Licensing Inc. | Control tools for media content access systems and methods |
WO2008055172A2 (en) | 2006-10-30 | 2008-05-08 | Maxlinear, Inc. | Targeted advertisement in the digital television environment |
US7895121B2 (en) | 2006-10-31 | 2011-02-22 | Hewlett-Packard Development Company, L.P. | Method and system for tracking conversions in a system for targeted data delivery |
GB2446199A (en) | 2006-12-01 | 2008-08-06 | David Irvine | Secure, decentralised and anonymous peer-to-peer network |
US8036632B1 (en) | 2007-02-02 | 2011-10-11 | Resource Consortium Limited | Access of information using a situational network |
US8646016B2 (en) | 2006-12-06 | 2014-02-04 | Verizon Patent And Licensing Inc. | Content storage and delivery systems and associated methods |
US20080140941A1 (en) | 2006-12-07 | 2008-06-12 | Dasgupta Gargi B | Method and System for Hoarding Content on Mobile Clients |
US20080140667A1 (en) | 2006-12-07 | 2008-06-12 | Sony Ericsson Mobile Communications Ab | Device and method for creating a transaction log of data exchanges between a portable mobile communications device and other wireless devices |
US7840685B2 (en) | 2007-01-07 | 2010-11-23 | Apple Inc. | Handheld computer having dynamic network transport selection according to a media type of a request |
US9524355B2 (en) * | 2007-01-22 | 2016-12-20 | Mozy, Inc. | Methods for delivering task-related digital content based on task-oriented user activity |
US10007895B2 (en) * | 2007-01-30 | 2018-06-26 | Jonathan Brian Vanasco | System and method for indexing, correlating, managing, referencing and syndicating identities and relationships across systems |
US8850473B2 (en) | 2007-02-01 | 2014-09-30 | Invidi Technologies Corporation | Targeting content based on location |
JP4686491B2 (en) | 2007-03-02 | 2011-05-25 | 株式会社シリウステクノロジーズ | Advertisement information display method, advertisement information display system, and advertisement information transmission program |
US20080215348A1 (en) | 2007-03-02 | 2008-09-04 | Marc Guldimann | System and methods for advertisement and event promotion |
US7702620B2 (en) | 2007-03-29 | 2010-04-20 | International Business Machines Corporation | System and method for ranked keyword search on graphs |
US20080249987A1 (en) | 2007-04-06 | 2008-10-09 | Gemini Mobile Technologies, Inc. | System And Method For Content Selection Based On User Profile Data |
US20080276266A1 (en) | 2007-04-18 | 2008-11-06 | Google Inc. | Characterizing content for identification of advertising |
US20080290987A1 (en) | 2007-04-22 | 2008-11-27 | Lehmann Li | Methods and apparatus related to content sharing between devices |
US8055664B2 (en) * | 2007-05-01 | 2011-11-08 | Google Inc. | Inferring user interests |
US20080281940A1 (en) | 2007-05-11 | 2008-11-13 | Sony Ericsson Mobile Communications Ab | Advertising on a portable communication device |
US8073423B2 (en) | 2007-05-25 | 2011-12-06 | At&T Mobility Ii Llc | Intelligent information control repository |
US8027954B2 (en) | 2007-05-31 | 2011-09-27 | Red Hat, Inc. | Portable media player recommendation system |
US8249922B2 (en) * | 2007-06-15 | 2012-08-21 | Alcatel Lucent | Method and apparatus for advertisement delivery in wireless networks |
US9483769B2 (en) | 2007-06-20 | 2016-11-01 | Qualcomm Incorporated | Dynamic electronic coupon for a mobile environment |
US20090006183A1 (en) | 2007-06-29 | 2009-01-01 | The Western Union Company | Methods and systems for customized coupon generation |
US9398113B2 (en) | 2007-07-07 | 2016-07-19 | Qualcomm Incorporated | Methods and systems for providing targeted information using identity masking in a wireless communications device |
US20090048977A1 (en) | 2007-07-07 | 2009-02-19 | Qualcomm Incorporated | User profile generation architecture for targeted content distribution using external processes |
US9392074B2 (en) | 2007-07-07 | 2016-07-12 | Qualcomm Incorporated | User profile generation architecture for mobile content-message targeting |
US20090049090A1 (en) | 2007-08-13 | 2009-02-19 | Research In Motion Limited | System and method for facilitating targeted mobile advertisement |
US20090070700A1 (en) | 2007-09-07 | 2009-03-12 | Yahoo! Inc. | Ranking content based on social network connection strengths |
JPWO2009034624A1 (en) | 2007-09-12 | 2010-12-16 | パナソニック株式会社 | Wireless terminal device, wireless connection method, and program |
US20090076882A1 (en) * | 2007-09-14 | 2009-03-19 | Microsoft Corporation | Multi-modal relevancy matching |
US20090083147A1 (en) | 2007-09-21 | 2009-03-26 | Toni Paila | Separation of advertising content and control |
US9071859B2 (en) | 2007-09-26 | 2015-06-30 | Time Warner Cable Enterprises Llc | Methods and apparatus for user-based targeted content delivery |
US20090089352A1 (en) | 2007-09-28 | 2009-04-02 | Yahoo!, Inc. | Distributed live multimedia switching mechanism and network |
US20090094248A1 (en) | 2007-10-03 | 2009-04-09 | Concert Technology Corporation | System and method of prioritizing the downloading of media items in a media item recommendation network |
US20090124241A1 (en) | 2007-11-14 | 2009-05-14 | Qualcomm Incorporated | Method and system for user profile match indication in a mobile environment |
CN107196851A (en) * | 2007-11-14 | 2017-09-22 | 高通股份有限公司 | There is the method and system of the suitability of the content-message of target for determination |
US9391789B2 (en) * | 2007-12-14 | 2016-07-12 | Qualcomm Incorporated | Method and system for multi-level distribution information cache management in a mobile environment |
US8234159B2 (en) | 2008-03-17 | 2012-07-31 | Segmint Inc. | Method and system for targeted content placement |
US9846049B2 (en) * | 2008-07-09 | 2017-12-19 | Microsoft Technology Licensing, Llc | Route prediction |
US8966001B2 (en) | 2008-09-02 | 2015-02-24 | Qualcomm Incorporated | Deployment and distribution model for improved content delivery system |
US20100057924A1 (en) | 2008-09-02 | 2010-03-04 | Qualcomm Incorporated | Access point for improved content delivery system |
US9152411B2 (en) | 2010-05-12 | 2015-10-06 | Microsoft Technology Licensing, Llc | Edge computing platform for delivery of rich internet applications |
US20110282964A1 (en) | 2010-05-13 | 2011-11-17 | Qualcomm Incorporated | Delivery of targeted content related to a learned and predicted future behavior based on spatial, temporal, and user attributes and behavioral constraints |
-
2008
- 2008-06-06 US US12/134,675 patent/US9398113B2/en active Active
- 2008-06-06 US US12/134,688 patent/US20090013051A1/en not_active Abandoned
- 2008-06-06 US US12/134,659 patent/US9596317B2/en active Active
- 2008-06-06 US US12/134,891 patent/US9485322B2/en active Active
- 2008-06-06 US US12/134,631 patent/US9497286B2/en active Active
- 2008-07-07 EP EP08772445A patent/EP2171980A2/en not_active Withdrawn
- 2008-07-07 KR KR1020107002820A patent/KR101285713B1/en not_active IP Right Cessation
- 2008-07-07 KR KR1020107002825A patent/KR101160411B1/en active IP Right Grant
- 2008-07-07 WO PCT/US2008/069372 patent/WO2009009507A1/en active Application Filing
- 2008-07-07 KR KR1020107002814A patent/KR101195642B1/en not_active IP Right Cessation
- 2008-07-07 JP JP2010516187A patent/JP5442606B2/en not_active Expired - Fee Related
- 2008-07-07 CN CN2008800235404A patent/CN101690110B/en not_active Expired - Fee Related
- 2008-07-07 JP JP2010516185A patent/JP5968589B2/en not_active Expired - Fee Related
- 2008-07-07 JP JP2010516188A patent/JP5670186B2/en not_active Expired - Fee Related
- 2008-07-07 WO PCT/US2008/069376 patent/WO2009009510A2/en active Application Filing
- 2008-07-07 KR KR1020107002805A patent/KR101196053B1/en not_active IP Right Cessation
- 2008-07-07 WO PCT/US2008/069374 patent/WO2009009508A2/en active Application Filing
- 2008-07-07 KR KR1020127003423A patent/KR20120034782A/en not_active Application Discontinuation
- 2008-07-07 KR KR1020107002817A patent/KR101195681B1/en not_active IP Right Cessation
- 2008-07-07 KR KR1020137014253A patent/KR20130083926A/en not_active Application Discontinuation
- 2008-07-07 EP EP08781471A patent/EP2168349A2/en not_active Withdrawn
- 2008-07-07 CN CN200880023480A patent/CN101690107A/en active Pending
- 2008-07-07 JP JP2010516186A patent/JP5535907B2/en not_active Expired - Fee Related
- 2008-07-07 CN CN200880023460.9A patent/CN101690106B/en not_active Expired - Fee Related
- 2008-07-07 CN CN201610459622.XA patent/CN105939386A/en active Pending
- 2008-07-07 EP EP08781468A patent/EP2171963A1/en not_active Withdrawn
- 2008-07-07 EP EP08772446A patent/EP2168346A2/en not_active Withdrawn
- 2008-07-07 EP EP08781470A patent/EP2171964A1/en not_active Withdrawn
- 2008-07-07 WO PCT/US2008/069371 patent/WO2009009506A2/en active Application Filing
- 2008-07-07 CN CN200880023440.1A patent/CN101690105B/en not_active Expired - Fee Related
- 2008-07-07 WO PCT/US2008/069375 patent/WO2009009509A1/en active Application Filing
- 2008-07-07 CN CN200880023520.7A patent/CN101690108B/en not_active Expired - Fee Related
- 2008-07-07 JP JP2010516189A patent/JP5670187B2/en not_active Expired - Fee Related
- 2008-07-07 KR KR1020127011661A patent/KR20120068961A/en not_active Application Discontinuation
-
2013
- 2013-05-22 JP JP2013108171A patent/JP6067479B2/en not_active Expired - Fee Related
- 2013-06-12 JP JP2013123806A patent/JP2013242877A/en not_active Withdrawn
-
2014
- 2014-02-17 JP JP2014027816A patent/JP2014146341A/en not_active Withdrawn
- 2014-02-17 JP JP2014027824A patent/JP2014142941A/en active Pending
-
2015
- 2015-07-17 JP JP2015143272A patent/JP6193314B2/en not_active Expired - Fee Related
-
2017
- 2017-07-25 US US15/659,191 patent/US20170324831A1/en not_active Abandoned
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US651279A (en) * | 1899-11-10 | 1900-06-05 | Lewis E Talmage | Corn or cane harvesting machine. |
US6345264B1 (en) * | 1998-01-22 | 2002-02-05 | Microsoft Corporation | Methods and apparatus, using expansion attributes having default, values, for matching entities and predicting an attribute of an entity |
US6519465B2 (en) * | 1999-01-08 | 2003-02-11 | Trueposition, Inc. | Modified transmission method for improving accuracy for E-911 calls |
US20030080997A1 (en) * | 2001-10-23 | 2003-05-01 | Marcel Fuehren | Anonymous network-access method and client |
US20070178919A1 (en) * | 2006-02-02 | 2007-08-02 | Airwide Solutions, Inc. | Apparatus and method for improving short message service dependability |
US20080098420A1 (en) * | 2006-10-19 | 2008-04-24 | Roundbox, Inc. | Distribution and display of advertising for devices in a network |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170223134A1 (en) * | 2007-03-10 | 2017-08-03 | Bridge And Post, Inc. | Method and apparatus for tagging network traffic using extensible fields in message headers |
US20170323334A1 (en) * | 2016-05-06 | 2017-11-09 | Adp, Llc | Segmented User Profiles |
US11030651B2 (en) * | 2016-05-06 | 2021-06-08 | Adp, Llc | Segmented user profiles |
US20220182363A1 (en) * | 2020-12-09 | 2022-06-09 | International Business Machines Corporation | Private cloud user insight privacy |
US11750569B2 (en) * | 2020-12-09 | 2023-09-05 | International Business Machines Corporation | Private cloud user insight privacy |
Also Published As
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20170324831A1 (en) | Method for transfer of information related to targeted content messages through a proxy server | |
US9392074B2 (en) | User profile generation architecture for mobile content-message targeting | |
EP2171979B1 (en) | User profile generation architecture for targeted content distribution using external processes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: QUALCOMM INCORPORATED, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:RENSCHLER, MARTIN;AGGARWAL, POOJA;KRISHNASWAMY, DILIP;AND OTHERS;REEL/FRAME:043093/0618 Effective date: 20080605 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |