INFORMATION PROVIDING SYSTEMS USING TRANSFER TYPE SCREEN SAVE FILE AND THEIR METHOD
TECHNICAL FIELD
The present invention relates to an information providing systems and their method for providing screen saver file or background screen when user does not use computer for a certain.
BACKGROUND ART
The most important function of screen saver is to prevent malfunction of fluorescent object resulted fromprojecting (bunch of electronic beam) onthe specificpoint whenuserdoes not process computer as long as computer is on. Other than the objective to protect screen, it is usedwidely lately as a method of promotion such as corporate advertisement, movie advertisement etc.
Internet is being growing faster than any other media including radio, TV, cable broadcast etc . as the number of internet user dramatically increases . Furthermore, it is evaluated to have a great potential to grow in future . The medium, internet network, has a potential to create the huge demand market and advertisement by internet has been increased as a result of it aside from existing conventional method.
Companies of whichobjective is to advertisemore effectively concentrate its budget on advertisement via computer communication and internet network and its effect is being enhanced enough to position itself on one of the serious mass media .
Features of advertisement via internet network are able to described by a few. They are interrelation, advertisement one for one, procurement of distribution channel as an advertisement, supply of accurate customer data and convenience in measuring
the effect etc. The strengths of internet are to do relevant marketing, easy access for customer, direct sales, ticket advertisement and immediate customer's response and evaluation is able to be processed in result. Advertisement via internet with above strengths is suggested as a sole method to overcome the limit of common mass media and it is forecast that it will position itself competitively as a factor of market competition as well as a factor to change conventional paradigm in future . Types of internet are banner type, protrusion type and transmission type. With regard to banner type, text in a form of bar or image are manifested on the part of web page . Concerning protrusion type, new window is created during download of web page and advertisement is able to be made by exclusive exposure. Advertisement is processed in the browser of advertisement window in terms of transmission type. Targeted advertisement is available and effect of animation or sound are also obtained.
As types of advertisement by use of internet, banner advertisement has a compact size whichhas been commonly accepted. But it still has a limitation of size and effect of animation or sound can not be achieved and further has to be dependent on the relevant web site. Concerning protrusion type, the limit of exposure is ambiguous and it is highly likelytobemisunderstood as obstacles. It also is greatly dependent on web site. Advertisement of banner type takes more than 50% among above types of advertisement up to now. Advertisement with transmission type has been increased since the effect of advertisement can be evaluated relatively easily in comparison with other advertisement and efficient. One of the existing technology of transmission type advertisement is patent in Korea Number 1999-78840. When user uses internet webbrowser, advertisement is beingprocessed. While internet traffic of user is checked, advertisement program is downloaded during time of no internet traffic from server. If
One of the objectives is to provide information supplying system and its method by automatic transfer of data or access to the server while user is not distracted while using computer.
There are different stages in order to achieve the above objective in terms of the method to provide data by download of screen saver program from server computer. They are (a) screen saver file and screen saver file DB which has features of above screen saver file are established. Data of user to identify user is inputted by connecting to above server computer and then data of user is converted into DB by above server computer. Finally program to transmit screen saver file is installed at the computer of user. This stage is called the step of environment establishment .
The second stage is called screen saver file request in which (b) computer is not used longer than a certain time (TI) and (c) 1) user is recognized and sign from request of screen saver file occurs by computer of user.
At the third stage, screen saver file is implemented to implement screen saver file chosen and transmitted for a period of T2. This stage is called as implementation stage of screen saver file.
The method of advertisement by use of the screen saver has a repetitive stage of screen saver file request to implementation stage of screen saver file as long as user operates the computer. In other words, the method information supplying is to utilize the time when screen saver file is implemented.
The above objective is also able to be achieved when computer is provided by multiple screen saver file, memory in which user data of client is supplied, communication port in order to communicated with computer of user and CPU which operates many processes. The server computer selects at least one of above multiple saver files and transfers to the user computer after
internet is activated by user (traffic relevant to internet occurs) , advertisement downloaded is displayed until contents of web site requested is displayed to the user. The weakness is that unnecessary time is wasted for display of advertisement if user requests new internet site or other data of identical site and it takes more time to gain an access to the site requested by user.
A technology which has been implemented by our list is ad bar advertisement operated by (nomoney communication, URL: ww. nomoney . co .kr) . Bar of a certain size is constantly displayed in the user system which makes user distracted during his work.
Weakness of screen advertisement file is repetitive process . In other words, file requested by user is downloaded in order for user to install screen saver advertisement and it is installed to the environment. When new screen file is to be installed, screen saver advertisement has to be downloaded again.
DISCLOSURE OF INVENTION One of the objectives of the present invention is to solve the weakness of advertisement by use of above internet. Specifically, advertisement is downloaded only when user does not use computer and only time during the process of screen saver file is used in order not to decrease the speed of internet. Providing this information supplying system and the method to supply information are the objective of the present invention.
Advertisement is provided through screen protector or background screen only when computer is not used for a certain time by user in order not to distract user during his work and to transfer screen saver file or background screen automatically. Transmitting information supplying system and its method above are also the objective.
responding to the request of screen saver file of user computer. When computer is not used for a certain time, request of screen saver file occurs to request identity of user and screen saver file at the server computer . Then, screen saver file transmitted from above server computer is implemented by user computer which obtains the memory to implement that program. In other words, the objective is achieved by the information supplying method by use of time when screen saver file is processed.
Data is supplied only when user does not use computer by present invention so that speed of internet is not decreased.
Data is, therefore, providedbyuse of image file to be transmitted.
On top of that, user is not distracted during work since data is displayed to the user only when user does not use computer longer than certain time.
Fill screen is able to be provided which is larger than image size of existing internet advertisement and files, of which size is larger than music file to be transferred along with image, can be efficiently provided.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention will become more fully understood from the detaileddescription givenhere-in-below and the accompanying drawings which are given by way of illustration only, wherein like reference numerals designate corresponding parts in the various drawings, and wherein:
Fig.1 indicates the overall system of the present invention;
Fig .2 manifests the method to convert image file transmitted from many data providers into screen saver file; Fig. 3 is a flowchart which manifests how to supply data of screen saver for transmission as one example of the invention;
Fig. 4 is another example to manifest the flow to supply data of screen saver for transmission; and
Fig. 5 is a flowchart to manifest the process to provide data by use of background screen for transmission.
DETAILED DESCRIPTION OF THE INVENTION
More detailed description will be made along with enclosed figures. Fig. 1 is a system block which indicates the overall system of the present invention. The system is structured by two which are server computer (10) and user computer (200) . Server computer (10) is structuredbymemory (28) which saves program necessary for operation of computer and file and CPU (30) which functions identically with conventional computer and communication port (40) which is processed for communication with user computer.
Likewise, user computer (200) is structuredbydisplaydevice
(110) which displays screen saver file, communication port (130) to communicate with server computer, CPU (70) to operate multiple processes, the first memory (80), the second memory (90) and image memory (100) .
With regard to memory(20) of server computer (10), it is structured by user data DB(22) in which data of user who intends to use data of screen saver of the present invention is provided, image file DB(24) in which image file is saved to be provided to the requestor of data and screen saver file DB(26) in which screen saver file is created by classifying image file DB and saved.
Though user data DB(22) , image file DB(24) , screen saver file DB (26) and user set-up program (28) are saved in one memory, it is acceptable to be saved in one memory.
Subscribers for internet site records the data of use in user data DB, it is recommended to record identity of user, area of datawhich eachuser intend to receive , age of user andoccupation
etc. Targetedmarketingwhich is one of the strengths in internet marketing is available by use of data recorded in user data DB.. Image file transferred from many data requestors is saved in the image file DB and it is recommended to save image file by category. Screen saver file DB is to be provided to each user and is recommended to be saved by specific area of data.
The first memory(80) of user computer (200) is regarded the faster memory than the second memory such as RAM (Random Access Memory) . Image memory (100) is related with display device (110) and temporarily saves screen saver file to be displayed.
Fig.2 manifests the method to covert image file transmitted from many data requestors to screen saver file. Many data requestors provide diverse image files. Image file DB(22) is established by enclosing ID to identify each image file and data of image file.
Features of image file is to sort relevant image file out. For instance, it indicates where relevant image file is belong to among ocean, mountain or state-of-the-art electronic goods. What should be reminded is that multiple features are able to be given to one image file. In other words, it is possible to give the image that one image file is a state-of-the -art electronic goods and appropriate the preference of 10s at the same time to image file DB (22) . Screen saver file is manufactured by binding many image files which are appropriate to each features by use of image file DB(22) in features screen saver file maker (120) . Description of the process when screen saver file is manufactured by use of multiple image files is omitted since they exist in many computers commonly used.
Features of each screen saver file is categorized and then screen saver file DB(26) is established by screen saver file structured. Many features are able to be given to one screen
saver file in screen saver file DB(26) by a similar method of image file DB (24) . it is possible to give the image that one screen saver file is a state-of-the -art electronic goods and appropriate the preference of 20s at the same time to screen saver file DB (22) . Fig. 2 indicates when image file is provided by data requestors but it is also possible for requestor of data supplies screen saver file on his own. As a strength, screen saver file DB(26) is bale to be set on his own after data to indicate the features of screen saver file provided is added in this case, Fig. 3 manifest the flowchart of information supplying by use of screen saver file for transmission as one of the cases by the present invention. The process is processed by four different stages. First stage (SI stage), is called as environment establishment stage by which basic environment is set, the second stage (S2 stage) is stage of suspending usage of computer when computer is not used for certain time by user. The third stage (S3 stage) is called data of screen saver file supplying stage by use of screen saver file. The forth stage (S4 stage) is when it is escaped from screen saver mode.
Stepl : Establishment of environment toprovide information.
First of all , screen saver file DB is established as mentioned inFig.2. Then, user registers byaccessing to the server computer and selects advertisement category wanted and input features of user such as age etc .
After completion of input of user, program to be transmitted for screen saver file is transferred from server computer and installed at user computer, program to be installed is able to be transferred either only by CD installation of communication program of screen saver file or by one screen saver file communication program and more than one screen saver file as well . Method CD will be described by Fig. 3 first and then, method (2) by Fig. 4
Step 2: Stage when computer is unused by user.
With regard to screen protector in MS window currently used, status of user computer is checked by system program and implementation file (screen saver file) structured by expander is processed when user does not use computer for a selectable certain period (TI) . User is able to designate one of many files as basic screen saver file through control panel of MS window. The general feature of expander is to suspend implementation of screen saver file when user clicks with mouse or keyboard during implementation. These days, however, new type, which does not make screen saver file suspend by move of mouse or by click during process, is being developed. In order to check the unused computer longer than certain time (TI) in this system of invention, CD operation system provided by operator such as MS window is used or (2)part of program for screen saver file transmission is actualized as internal permanent RAM program.
The reason why φ can be used is because screen saver file of MS window is mere one of the process files. That is to say, when user does not use computer for a certain time by use of internal RAM program of MS window, expander implementation file designated is processed according to principle in implementing screen saver file of current MS window. In order to achieve the objective of the present invention, screen saver implementation file to process many stages suggested at S3 stage must be designated as basic screen saver file in operation system.
With regard to method © in which separate RAM consistent program is used, RAM program in installed in order to check if user does not use computer for a certain time. If user does not use computer longer than certain time, screen saver file for transmission which processes many stages at S3 can be processed. In conclusion, additional RAM program must be installed in order to use method © unlike method φ.
To process screen saver advertisement in both two methods mentioned above, use is not allowed to use computer for a certain period (TI) for advertisement of screen saver.
Step 3 : Stage when data of screen saver file to be transmitted is provided.
Data if supplied by use of practical screen saver file to be transmitted at this stage. Screen saver process file for transmission of user computer transmits user ID and file request of screen saver file to the server computer. Server computer receives user ID and searches user data DB, selects data requested by relevant user among many data and then, transmits selected screen saver file to the user computer.
User computer is able to be provided by requested screen saver data by implementing screen saver file which is activated by screen saver mode transmitted fromuser computer . Since screen saver file in general is structured by many image files, image file which forms screen saver file transmitted is recommended to be displayed once during display time (T2) .
Stage S4 : Entrance of user mode
Conversion from screen saver mode into mode of general computer use is processed by move of mouse cursor, clicking of mouse button or input by key board in general . Concerning screen saver file manufactured for specific purpose, conversion is processed only by key input of key board rather than move of mouse cursor or clicking button of mouse . If screen saver which is operated by key of key board is adopted, address of web site can be given to the screen saver advertisement file. If web site is clicked at requested screen saver mode, screen saver mode is immediately terminated and web browser starts to be connected to the web site which has been clicked by user. This process enhances the effect of advertisement.
At the stage of S4, screen saver advertisement mode of S3 stage is converted into the general usage mode of computer . When computer is used by user, user can terminates screen saver mode through computer. If user intends to continue computer process, the method to convert screen saver data supplying mode into the user mode varies by features of screen saver. Whatever method of information supplying by use of screen saver file is adopted, it can be converted to the user mode by use of appropriate method i.e. key in of key board. Fig. 4 manifests the flowchart how to supply data by use of screen saver file to be transmitted as an example. The difference from Fig. 3 is when user completes the data input and receives programof screen saver file tobe transmitted from server computer, screen saver file communication program as well as more than one screen saver file are simultaneously transmitted.
Another example manifested by Fig. 4 indicates that differences from Fig. 3 are found at the stage 1, environment establishment of data supply and stage 3, data supply of screen saver file to be transmitted. At least one screen saver file transmitted from server exists at the stage 3, screen saver file is to be implemented most of all . Time of implementation of screen saver file is recommended to be when image file, which contains transmitted screen saver file, is displayed at least once (T2) as mentioned above. Identical functions are implemented as mentioned in Fig. 3 at other stages .
Total hour when computer is processedbyuser computer during activation of screen saver and the frequency when screen saver file is downloadedby gaining an access to server etc . are recorded in the computer by the present invention. It is useful data in terms of calculation of advertisement cost from data requestor.
The invention is also able to be applied to the advertisement through background screen of window (wall paper) as well as that
of screen saver file . Case of inventionbyuse of windowbackground will be described by Fig. 5.
Stage 1 (SI) : Establishment of environment of data supply Image file DB is established as mentioned in Fig. 5. Then, user gains access to server computer to register. User at this stage selects data requested and input the features such as age of user etc.
When user completes data input, program to transmit back ground screen file is received from server computer to be installed to the user computer . Program for installment can be transmitted eitherbyφ programof background file communicationor © program of background file communication and at least one background screen image file as well communication are transmitted.
Stage 2 (S2) : Computer is unused by user As identical of cases in Fig. 3 and Fig. 4 in terms of data supplying method by use of background screen, in order to check if user does not use computer longer than certain time (TI) , following two methods can be used. They are φ operation system such as MS window is used or © part of program of background file to be transmitted is actualized as internal RAM program. Background screen implementation file which processed many stages and is suggested at the stage 3 S3 is designated as existing screen saver file in the operation system in order to achieve the objective of the invention.
With regard to the method © by which separate RAM program is used, RAM program is installed to check the status when user does not use computer for a certain time. If user does not use computer longer than certain time, background screen implementation file which processes many stages and suggested at the stage 3 can be processed. Therefore, separate RAM program must be installed in case of method © unlike method φ .
In order to supply data by use of background screen in terms of both methods mentioned above, user must wait for certain time(Tl) not using computer.
Stage 3 (S3) : Data of background screen file to be transmitted is provided.
Practical background screen data to be transmitted is processed at this stage. Background screen implementation file of user computer transfers user ID and background screen file request which requires background image file to server computer. User data DB is searched by server computer after receiving user ID . Then, one background screen is selected among advertisements wanted from relevant users . Finally selected background screen file is transmitted to user computer from server computer. Background screen is able to be provided by user computer since background screen file, which has been transmitted, is used to activate as background screen mode. In general, it is recommended to display background screen for at least certain time (T2) to achieve the effect of data supply. T2 period is long enough to display said selected image file at least one time.
Stage 4 (S4) : Entrance of user mode
Background screen advertisement is processed by installing image file as a background file of computer and consequently special event is not needed to escape data supply mode unlike data supply mode by use of screen saver file. User is able to process computer at any time when he intends to use computer.
Another examples by use of background screen to be transmitted is when program to be facilitated is transmitted from server, at least one background screen is accompanied in order to be installed as background screen of user computer . It is similar
to that of Fig. 3 and Fig. 4 in terms of implementation stage of SI and S3.
The difference of SI is identical to mentioned above. At S3, since background to be transmitted already exists, process is as below. 1) background screen data to be displayed during certain time (T2) is provided 2) stage of image file request which request of user ID and image file is signaled at above server computer.3) selection of image file inwhich it responds to request and select image file by use of user ID.4) designation of basic background screen file which selected image file is transferred and designated as background screen.
Also the stage is included by the present invention. It records the total hours of data process by use of background screen or frequency whichbackground screen file is downloaded by gaining an access to the server at the server computer. It is helpful data which data requestor can calculate advertisement cost.
Cases manifested by figures are mere exemplary. Therefore, those who obtain the common ground of technical area of the present invention must understand that various modification and other examples are available. Consequently, the genuine scope of protection of the invention must depend on the technical specification enclosed.
For instance, the invention is described based on the computer but it can be applied to other digital data transmission device. Basic specification of the invention are able to be easily applied to STB (set top box, device which converts TV into personal computer) , personal mobile phone (PDA) , personal communication terminal (PCS) and digital DV as well as computer.