The present application is related to co-owned, co-pending U.S. patent application Ser. No. 13/600,064 filed on Aug. 30, 2014 and entitled “APPARATUS AND METHODS FOR ENABLING LOCATION-BASED SERVICES WITHIN A PREMISES”, which is incorporated herein by reference in its entirety.
A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever.
1. Technological Field
The disclosure relates generally to the field of data and content distribution and delivery. In one exemplary aspect, the disclosure relates to enabling presence-based and/or use-based services.
2. Description of Related Technology
Content distribution networks (such as e.g., Cable Television (CATV), satellite, or hybrid fiber/copper (HFCu) systems) provide content from various content sources at a network headend to a plurality of users (e.g., subscriber) devices. In a typical “managed” network, a network operator (e.g., multiple systems operator or MSO) provides access to content via the network. Generally, the MSO provides audio/video content to subscribers from the network headend via the distribution network. Unmanaged networks such as the Internet may also distribute content to a plurality of users via user devices.
Recent advances in digital information processing and technology have made a wide range of additional services and functions available for delivery to consumers at various types of devices for very reasonable prices or subscription fees. These services and functions include delivery of digital content or programming (movies, etc.), digital video-on-demand (VOD) services, personal video recorder (PVR) and networked PVR (nPVR) services, Internet Protocol television (IPTV), digital media playback and recording, as well high speed Internet access (including so-called “Internet TV”, where television programming is delivered over the Internet), IP-based telephony (e.g., VoIP), and access to client applications via mobile devices. Other services available to network users include without limitation access to, and recording of, digital music (e.g., MP3 files), and submission of “organic” media (e.g., home-grown Youtube™ videos, etc.).
Currently, many of these services are provided to users via a wide variety of different equipment environments and delivery paradigms including, inter alia, cable or satellite modems or QAMs, HFCu (i.e., Hybrid Fiber-copper distribution via indigenous POST/PSTN and/or coaxial wiring in a premises), cellular networks such as LTE/LTE-A and 3G, optical fiber such as FTTC, FTTH, etc., Wi-Fi™ hubs, Ethernet hubs, gateways, switches, and routers, and to a plurality of user equipment types (e.g., set-top boxes, personal (desktop) computers, laptop computers, other mini-computers such as so-called “netbooks” and mini-notebook computers, and/or other devices). Recent advances in consumer electronics have also led to the widespread introduction of a variety of portable media devices (PMDs) such as, inter alia, portable digital music devices such as so-called “MP3 players”, cellular telephones/smartphones, handheld computers, tablets such as the Kindle™ and Nook™ and personal digital assistants (PDA), which allow users to store and playback audio and video files.
Various device applications provide or incorporate services which vary based on a location of a portable media device (or user thereof) within a given premises. For example, certain applications may have modified volume, brightness, etc. settings based on what room a person is in. Additionally, power-saving systems rely on a location of a person within the home. For example, if it can be determined that no one is in e.g., the family room, power to a rendering or other device in that room may be cut. These systems, however, require a user to manually enter a location via a user interface or otherwise require advanced detection technologies (e.g., infrared or motion detectors) to be installed within a premises.
Moreover, well known systems are used to target particular subscriber demographics. However, such systems are unable to track a particular user across multiple platforms and locations in order to derive a more unique and specific user profile and/or use a more unique and specific user profile for making content insertion decisions.
Hence, methods and apparatus are needed which, inter alia, enable presence-based and/or use-based services to function independent of manual entry of information relating to location and/or use, and using services and functions of devices currently existing within a network. Such methods and apparatus would in one implementation ideally be provided across multiple client devices within a premises such as a household or business.
The present disclosure provides, inter alia, apparatus and methods for enabling presence-based and/or use-based services.
In a first aspect of the invention, a method of enabling presence-based services to a plurality of client devices in a content based network is disclosed. In one embodiment, the method includes: associating each of the plurality of client devices to a specific user profile within a particular subscriber household; receiving raw data relating to a location of at least one of the plurality of client devices; evaluating the raw data to determine a precise location of the at least one of the plurality of client devices; and storing the raw data and/or a result of the evaluation.
In a second aspect of the invention, a method of enabling use-based services to a plurality of client devices in a content based network is disclosed. In one embodiment, the method includes: enabling a plurality of content providers in a non-managed network to register content in a managed network; collecting a plurality of data relating to an interaction of the plurality of client devices with the registered content; and associating individual ones of the plurality of collected data to respective particular ones of a plurality of users in the content based network.
In a fourth aspect of the invention, a presence evaluation apparatus is disclosed. In one embodiment, the apparatus comprises: at least one interface configured to communicate with a content based network; at least one interface configured to communicate within a premises network; a processor configured to run at least one computer program thereon, and a storage apparatus in data communication with the processor and the at least one interface and having the at least one computer program stored thereon. In one variant, the at least one program comprises a plurality of instructions which are configured to, when executed by the processor: (i) generate a device profile for each of a plurality of devices associated to the consumer premises, (ii) collect and evaluate information relating to a location of a particular device, and (iii) associate the collected data with individual ones of the plurality of devices. In another variant, the at least one program comprises a plurality of instructions which are configured to, when executed by the processor: (i) evaluate a plurality of information to determine one or more patterns therein, (ii) utilize the patterns to determine one or more preferred device settings and/or provide predicted or targeted content to one or more devices.
In a fifth aspect of the invention, a mobile user wireless device configured for location-specific operation is disclosed. In one embodiment, the device includes: a processor; a wireless transceiver in data communication with the processor; and a storage device in data communication with the processor and having a computer program disposed thereon. In one variant, the program is configured to, when executed: provide a plurality of information to a presence evaluation entity.
In a sixth aspect of the invention, a system configured for enabling presence-specific and/or use-specific services at one or more client or user devices is disclosed.
In a seventh aspect of the invention, a computer readable apparatus having at least one program disposed thereon is disclosed. In one embodiment, the at least one program is configured for enabling presence-specific and/or use-specific services at one or more client or user devices.
These and other aspects of the disclosure shall become apparent when considered in light of the disclosure provided herein.
All Figures © Copyright 2014 Time Warner Cable Enterprises LLC. All rights reserved.
Reference is now made to the drawings wherein like numerals refer to like parts throughout.
As used herein, the term “application” refers generally and without limitation to a unit of executable software that implements a certain functionality or theme. The themes of applications vary broadly across any number of disciplines and functions (such as on-demand content management, e-commerce transactions, brokerage transactions, home entertainment, calculator etc.), and one application may have more than one theme. The unit of executable software generally runs in a predetermined environment; for example, the unit could comprise a downloadable Java Xlet™ that runs within the JavaTV™ environment.
As used herein, the terms “client device” and “end user device” include, but are not limited to, set-top boxes (e.g., DSTBs), gateways, modems, personal computers (PCs), and minicomputers, whether desktop, laptop, or otherwise, and mobile devices such as handheld computers, PDAs, personal media devices (PMDs), tablets, and smartphones.
As used herein, the term “codec” refers to a video, audio, or other data coding and/or decoding algorithm, process or apparatus including, without limitation, those of the MPEG (e.g., MPEG-1, MPEG-2, MPEG-4/H.264, etc.), Real (RealVideo, etc.), AC-3 (audio), DiVX, XViD/ViDX, Windows Media Video (e.g., WMV 7, 8, 9, 10, or 11), ATI Video codec, or VC-1 (SMPTE standard 421 M) families.
As used herein, the term “computer program” or “software” is meant to include any sequence or human or machine cognizable steps which perform a function. Such program may be rendered in virtually any programming language or environment including, for example, C/C++, Fortran, COBOL, PASCAL, assembly language, markup languages (e.g., HTML, SGML, XML, VoXML), and the like, as well as object-oriented environments such as the Common Object Request Broker Architecture (CORBA), Java™ (including J2ME, Java Beans, etc.), Binary Runtime Environment (e.g., BREW), and the like.
The term “consumer premises equipment (CPE)” refers without limitation to any type of electronic equipment located within a consumer's or user's premises and connected to a network. The term “host device” includes terminal devices that have access to digital television content via a satellite, cable, or terrestrial network. The host device functionality may be integrated into a digital television (DTV) set. The term “consumer premises equipment” (CPE) includes such electronic equipment such as set-top boxes, televisions, Digital Video Recorders (DVR), gateway storage devices (Furnace), and ITV Personal Computers.
As used herein, the term “DOCSIS” refers to any of the existing or planned variants of the Data Over Cable Services Interface Specification, including for example DOCSIS versions 1.0, 1.1, 2.0 and 3.0.
As used herein, the term “gateway” includes, without limitation, devices configured to interface with a network, and pass signals to or exchange signals with, another device in communication therewith. Various exemplary gateways are described in, inter alia, co-owned U.S. Pat. No. 7,954,131 issued on May 31, 2011 entitled “PREMISES GATEWAY APPARATUS AND METHODS FOR USE IN A CONTENT-BASED NETWORK”, U.S. patent application Ser. No. 12/582,619 filed on Oct. 20, 2009, entitled “GATEWAY APPARATUS AND METHODS FOR DIGITAL CONTENT DELIVERY IN A NETWORK”, and issued as U.S. Pat. No. 9,027,062 on May 5, 2015, and U.S. patent application Ser. No. 12/480,597 filed on Jun. 8, 2009, entitled “MEDIA BRIDGE APPARATUS AND METHODS”, and issued as U.S. Pat. No. 9,602,864 on Mar. 21, 2017, each of the foregoing being incorporated herein by reference in its entirety.
As used herein, the term “headend” refers generally to a networked system controlled by an operator (e.g., an MSO or multiple systems operator) that distributes programming to MSO clientele using client devices. Such programming may include literally any information source/receiver including, inter alia, free-to-air TV channels, pay TV channels, interactive TV, and the Internet.
As used herein, the terms “Internet” and “internet” are used interchangeably to refer to inter-networks including, without limitation, the Internet.
As used herein, the terms “microprocessor” and “digital processor” are meant generally to include all types of digital processing devices including, without limitation, digital signal processors (DSPs), reduced instruction set computers (RISC), general-purpose (CISC) processors, microprocessors, gate arrays (e.g., FPGAs), PLDs, reconfigurable computer fabrics (RCFs), array processors, secure microprocessors, and application-specific integrated circuits (ASICs). Such digital processors may be contained on a single unitary IC die, or distributed across multiple components.
As used herein, the terms “MSO” or “multiple systems operator” refer without limitation to a cable, fiber to the home (FTTH), fiber to the curb (FTTC), satellite, Hybrid Fiber Copper (HFCu), or terrestrial network provider having infrastructure required to deliver services including programming and data over those mediums.
As used herein, the terms “network”, “managed network”, and “bearer network” refer generally to any type of telecommunications or data network including, without limitation, hybrid fiber coax (HFC) networks, HFCu networks, satellite networks, telco networks, and data networks (including MANs, WANs, LANs, WLANs, internets, and intranets). Such networks or portions thereof may utilize any one or more different topologies (e.g., ring, bus, star, loop, etc.), transmission media (e.g., wired/RF cable, RF wireless, millimeter wave, optical, etc.) and/or communications or networking protocols.
As used herein, the term “network interface” refers to any signal, data, or software interface with a component, network or process including, without limitation, those of the FireWire (e.g., FW400, FW800, etc.), USB (e.g., USB2), Ethernet (e.g., 10/100, 10/100/1000 (Gigabit Ethernet), 10-Gig-E, etc.), MoCA, Coaxsys (e.g., TVnet™), radio frequency tuner (e.g., in-band or OOB, cable modem, etc.), Wi-Fi (802.11), WiMAX (802.16), PAN (e.g., 802.15), cellular (e.g., 3G, LTE/LTE-A/TD-LTE, GSM, etc.) or IrDA families.
As used herein, the term “QAM” refers to modulation schemes used for sending signals over cable networks. Such modulation scheme might use any constellation level (e.g. QPSK, 16-QAM, 64-QAM, 256-QAM, etc.) depending on details of a cable network. A QAM may also refer to a physical channel modulated according to the schemes.
As used herein, the term “server” refers to any computerized component, system or entity regardless of form which is adapted to provide data, files, applications, content, or other services to one or more other devices or entities on a computer system or network.
As used herein, the term “service”, “content”, “program” and “stream” are sometimes used synonymously to refer to a sequence of packetized data that is provided in what a subscriber may perceive as a service. A “service” (or “content”, or “stream”) in the former, specialized sense may correspond to different types of services in the latter, non-technical sense. For example, a “service” in the specialized sense may correspond to, among others, video broadcast, audio-only broadcast, pay-per-view, or video-on-demand. The perceivable content provided on such a “service” may be live, pre-recorded, delimited in time, undelimited in time, or of other descriptions. In some cases, a “service” in the specialized sense may correspond to what a subscriber would perceive as a “channel” in traditional broadcast television.
As used herein, the term “Wi-Fi” refers to, without limitation, any of the variants of IEEE-Std. 802.11 or related standards including 802.11 a/b/g/n/s/v/ac or 802.11-2012.
As used herein, the term “wireless” means any wireless signal, data, communication, or other interface including without limitation Wi-Fi, Bluetooth, 3G (3GPP/3GPP2), HSDPA/HSUPA, TDMA, CDMA (e.g., IS-95A, WCDMA, etc.), FHSS, DSSS, GSM, PAN/802.15, WiMAX (802.16), 802.20, narrowband/FDMA, OFDM, PCS/DCS, LTE/LTE-A/TD-LTE, analog cellular, CDPD, satellite systems, millimeter wave or microwave systems, acoustic, and infrared (i.e., IrDA).
Overview
In one salient aspect, the present disclosure provides methods and apparatus for enabling presence-based and/or use-based services. In one exemplary embodiment, a presence database and an evaluation entity collect information relating to a device's location and use or activity. The presence database is created to collect location-based data points to build anonymized user profiles to, for example, better target messages across a network such as an unwired delivery network. The information is utilized to estimate a physical location (such as a particular store, premises, etc.) of the device. The device location can then be used for providing targeted content thereto, and/or can be added to a profile relating to the activity of the user.
The user profiles are in one variant stored at e.g., the presence data base and/or evaluation entity which may be located at a user premises, or at a headend network/cloud.
Additionally, signals are collected from utility and entertainment appliances (in a home or other premises) to create personal, shared, and family environmental settings which are instantiated when a user enters the premises. Data is collected through mobile device opt-in mode and propensity scored to customize utility and entertainment environments. The collected data may be further utilized to identify targeted content across a delivery network.
Method and apparatus to collect browsing behavior across desktop and mobile devices on third party sites (including web browsing, social networking, and e-commerce) which are represented by the managed network are also provided. In one embodiment, data is fused with other collected information in the aforementioned profiles to aid in powering advertisement insertion and/or content engines including but not limited to Online Interconnect, QAM Video, IPTV, Mobile, Web Exchanges, Social, and Demand-Side Platforms.
Exemplary embodiments of the apparatus and methods of the present disclosure are now described in detail. While these exemplary embodiments are described in the context of the aforementioned hybrid fiber/coax (HFC) cable system architecture having a multiple systems operator (MSO), digital networking capability, IP delivery capability, and plurality of client devices/CPE, the general principles and advantages of the disclosure may be extended to other types of networks and architectures, whether broadband, narrowband, wired or wireless, managed or unmanaged, or otherwise, the following therefore being merely exemplary in nature. For example, the disclosure may be practiced over a fiber-to-the-home (FTTH) or fiber-to-the-curb (FTTC) system, HFCu networks, or over satellite or millimeter wave-based networks.
It will also be appreciated that while described generally in the context of a consumer (i.e., residential) end user domain, the present disclosure may be readily adapted to other types of environments (e.g., commercial/enterprise, government/military, etc.) as well. Myriad other applications are possible.
Other features and advantages of the present disclosure will immediately be recognized by persons of ordinary skill in the art with reference to the attached drawings and detailed description of exemplary embodiments as given below.
Network—
The data/application origination point 102 comprises any medium that allows data and/or applications (such as a VOD-based or “Watch TV” application) to be transferred to a distribution server 104. This can include for example a third party data source, application vendor website, CD-ROM, external network interface, mass storage device (e.g., RAID system), etc. Such transference may be automatic, initiated upon the occurrence of one or more specified events (such as the receipt of a request packet or ACK), performed manually, or accomplished in any number of other modes readily recognized by those of ordinary skill.
The application distribution server 104 comprises a computer system where such applications can enter the network system. Distribution servers are well known in the networking arts, and accordingly not described further herein.
The VOD server 105 comprises a computer system where on-demand content can be received from one or more of the aforementioned data sources 102 and enter the network system. These servers may generate the content locally, or alternatively act as a gateway or intermediary from a distant source.
A separate content server (not shown) may also be provided for delivery of broadcast and other non-VOD content.
The CPE 106 includes any equipment in the “customers' premises” (or other locations, whether local or remote to the distribution server 104) that can be accessed by a distribution server 104.
In addition to “broadcast” content (e.g., video programming), the network 100 of
While the foregoing network is discussed as carrying packetized content (e.g., IP over MPEG for high-speed data or Internet TV, MPEG2 packet content over QAM for MPTS, etc.), the network is often not optimized for such delivery. Hence, in accordance with another embodiment of the present disclosure, a “packet optimized” delivery network is used for carriage of the packetized content (e.g., IPTV content).
Exemplary Network Architecture—
Referring now to
As illustrated, the network 200 generally comprises a client device 106 in communication with a premises network 206 and an unmanaged network 111 (such as e.g., the Internet). As shown, the premises network 206 is further in communication with a managed network 101 (such as that discussed above with respect to
As noted above, the managed network 101 may comprise a headend 150 from which content is delivered from a content server 107 thereat, to the premises network 206. The premises network 206 is further in communication with a plurality of client devices (not shown) to which the content is ultimately distributed. In the illustrated embodiment, for example, this may occur via the premises device 109 which acts as a gateway of sorts for other client devices 106 in communication therewith. Although only a single client device 106 is illustrated, it is appreciated that any number of devices 106 may be in communication with a particular premises device 109 and/or unmanaged network 111.
A headend 150 located presence database 202 and evaluation entity 204 cooperate to provide presence-based and/or use-based services to the mobile client devices 106 and/or the fixed premises device 109. It is further appreciated that the evaluation entity 204 and the presence database 202 may comprise a single entity and/or may exist across one or more distributed applications (i.e., where a portion of the described functionality exists at the headend 150 and a remaining portion is distributed to a remote entity, such as an entity of the non-managed network or the premises 206).
Specifically, in one embodiment, the presence database 202 is configured to generate a plurality of user profiles, each profile uniquely associated with a particular subscriber. As discussed in greater detail below, the profiles comprise a plurality of information relating to presence and/or use by the subscriber. In one specific example, the presence database 202 enables each user to register his/her device to the network. This may occur such as via an opt in/out mechanism, or may be related to the establishment of a subscriber account with the managed network 101.
Once a user profile is established for a particular subscriber, the presence database 202 collects information relating to the geographic locations at which the particular subscriber's device is located, as well as data relating to the activities and status of the device (i.e., activity records). The collected data/records are stored at the presence database 202 for utilization by the evaluation entity 204. It is further noted that the presence database 202 is configured to when new data or records are received, utilize information contained in the data and/or contained in metadata to identify the particular device and/or subscriber to which the records are associated and further update the appropriate profile.
The evaluation entity 204 communicates with the presence database 202 to provide and/or enable specific presence-based and/or use-based services to the client devices 106. As will be discussed in greater detail below, the evaluation entity 204 is configured to analyze or evaluate the data collected at the presence database 202. For example, the evaluation entity 204 may utilize the collected data to identify patterns therein. The identified patterns may be further used to group one or more profiles, such as by household, demographic, geographic area, common interests, etc. In addition, the patterns may be used for targeted content insertion and/or fraud detection (as discussed in greater detail below). Identified patterns may also be used, as described herein, to determine so-called “important” locations to the subscriber. Locations which are deemed as important may be further utilized for demographic or common interest groupings as well as for targeted content insertion. Still further, the data collected and maintained at the presence database 202 may be utilized by the evaluation entity 204 to determine a subscriber's preferred settings, then implement these settings upon a particular event (either events determined by the user or by the network).
The herein described data collection and record retention may, in one exemplary embodiment occur while advantageously maintaining subscriber anonymity. For example, the apparatus and methods disclosed in co-owned, co-pending U.S. patent application Ser. No. 14/304,709 filed on Jun. 13, 2014 and entitled “METHODS AND APPARATUS FOR AUDIENCE DATA COLLECTION AND ANALYSIS IN A CONTENT DELIVERY NETWORK”, which is incorporated herein by reference in its entirety, may be utilized to ensure collected data records preserve subscriber privacy. For example, collected data records may be associated to a particular device using e.g., a MAC address, IP address, or other unique identifier associated to the device. Prior to transmission of the data records, the device 106 itself, or other intermediary device such as e.g., the gateway 109, anonymizes the portion of the data which identifies the specific device 106 from which the data was obtained. In one embodiment, the data is anonymized by inter alia, the use of a cryptographic hash coupled with an optional “opaque” variable which carries information relating to the CPE of the hash with which it is associated. The hash and opaque variable frustrate de-encryption or reverse-engineering of the individual subscriber's identity or specific location. Alternative methods of providing anonymization may also be utilized consistent with the present disclosure.
In another embodiment, data may be collected utilizing the methods and apparatus of co-owned U.S. patent application Ser. No. 13/936,055 filed on Jul. 5, 2013, entitled “APPARATUS AND METHODS FOR DATA COLLECTION, ANALYSIS AND VALIDATION INCLUDING ERROR CORRECTION IN A CONTENT DELIVERY NETWORK”, and issued as U.S. Pat. No. 9,003,436 on Apr. 7, 2015, which is incorporated herein by reference in its entirety. As discussed therein, data relating to user interaction with content is collected, validated, analyzed and error correction is automatically performed. For example, audience information may be obtained directly from customer's premises equipment (i.e., set top boxes, cable modems, PCs, PMDs, IP devices, etc.), for each individual device, or even on a per-user basis where possible, thereby allowing a content provider or other analytical entity to gather specific information in large quantities across a broad geographical area, or demographic/psychographic slice. Advantageously, multiple sources of content to which viewership behavior relates can be simultaneously monitored, and subscriber anonymity or privacy maintained (i.e., no use is made of personally identifiable information). The aforementioned systems and methods also may optionally be configured to “predict” tuning behavior for groups as well as individual users.
In one embodiment, statistical methods (e.g., linear regression, log linear regression) are used to arrive at an expected value for one or more of the various fields and records of the collected data. Collected data is compared to the derived (e.g., average, median) or expected value, and if the data meets one or more prescribed criteria (e.g., is a given number of standard deviations away from the expected value or more) indicating that the data quality may be unacceptable, an error message is generated and the data optionally excluded. The criteria used to judge the data (e.g., number of standard deviations which the data is permitted to vary from the expected value) may be determined by the network operator, or an algorithm/computer program. Hence, the present disclosure advantageously enables monitoring of an entire system proactively using a statistical or other method to alert the network operator only in the instance erroneous data meeting the test(s) of significance is received. The present disclosure improves over prior methods by, among other things, enabling a network operator to assess a large volume of data (in a comparatively contracted period of time) without requiring manual monitoring and/or error correction.
In addition, data may be collected, validated and analyzed across multiple platforms. That is, data regarding a user's interaction with content may be collected and utilized regardless of the device on which the content is received or requested, the source of the content, the type of content (e.g., linear, VOD, DVR, high-speed data, etc.), etc. While the exemplary systems and methods operate utilizing two-way capable user devices such as those used in cable or fiber optic (FTTC, FTTH, etc.) networks, non-two way capable devices (such as for example are used in some satellite-based implementations) can leverage various backhauls (e.g., broadband, DSL/dial-up or “over the top” backhaul) from the target premises to transmit tuning or other useful information to a third party (e.g., third party website). A third party, the presence database 202, and/or the evaluation entity 204 collects the data and sends the data back to the satellite MSO (or caches the data first, and sends it up to the MSO at a later time). Pre-processing or “enrichment” of the data may also be conducted if desired.
The apparatus and methods of the present disclosure may be used to collect, validate and analyze a heretofore unprecedented volume of data. Evaluation criteria are set such that the network operator is not flooded with alerts of erroneous data. Instead, a multi-tier approach is utilized to allow for e.g., some processing, no processing, minimal processing, total evaluation, etc. This is accomplished by enabling the administrator to define the statistical parameters (e.g., of the regression); the administrator may “tune” these parameters over time based on experience in the field and other inputs.
The presence database 202 receives the anonymized data and utilizes information stored at the database 202 to unmask the identity of the device, then associates the device to a previously generated profile. The unmasked identity in one embodiment is only used in this context (e.g. from the operators perspective, it remains opaque unless subscriber has opted-in). If no profile exists, a new profile may be created. Alternatively, the herein described functionality may occur in whole or in part at the subscriber's premises, thereby obviating a need for all or any device specific data to be transmitted across the network.
The specific presence-based and/or use-based services which are provided via the presence database 202 and evaluation entity 204 of
Exemplary Presence-Based Services Methods—
As shown, the method generally comprises at step 302 an association of a plurality of devices 106. In one embodiment, each subscriber device 106 is associated to a household. For example, a Wi-Fi and/or LAN connection within household may be used to make an initial association such as when a device 106 is used for e.g., browsing, email, etc. via the household cable modem. A unique identifier of the device 106 (e.g. MAC Address, etc.) is stored and utilized for association purposes. Additionally, each device 106 may be associated to a specific user profile. The user profiles are generated based on data obtained from the one or more devices 106 associated to that profile.
In one variant, established usage patterns (whether purchased or learned through panel watching) are used to infer an identity to which a device 106 is associated. For example, when the device 106 is primarily located at a school on weekdays between 8 am and 4 pm, and the usage patterns indicate a relatively high number of tweets, status updates to social networking sites, and/or text patterns, it may be inferred that the device 106 is associated to a teenager's profile.
In one embodiment, the derivation of patterns from received data may occur at e.g., the presence database 202 while generating the user profiles, or the evaluation entity 204 during evaluation of the collected records (as discussed elsewhere herein). One or more of these entities may include a pre-populated list of “rules” which link categories of activities to a numerical value indicative of a tendency of a user to fall within a particular demographic if that category of activity is detected. For example, the list may indicate an 80% likelihood that when data records indicate that a user (i.e., the user device 106) is at a school within a given time frame (e.g., weekdays between 8 am and 4 pm), that person is a school-age child. Further, the age range may be narrowed based on the identity of the school itself (e.g., high school, junior high school, etc.) as determined by geographic coordinates (discussed herein). Additionally, the list may indicate a certain number or frequency of status updates to social network sites and/or picture or short video uploads thereto, directly correlates to an age group. Hence, when data is received it may be compared against the foregoing “rules” to predict a demographic to which the device 106 belongs. Next, the predicted demographic is compared to information about the subscriber household to determine a particular profile to which the device 106 and collected data relate (e.g., mom, dad, teenage daughter, etc.) In yet another embodiment, the devices 106 may be manually registered to a particular profile by the user thereof. In this embodiment, a user interface may be provided via any one of the client's devices 106 which enables the user to enter a device name or other identifier for each device 106 and place each device 106 within a particular user profile.
In this manner, each subscriber household may be comprised of a plurality of devices 106 and a plurality of user profiles (such as one for each family member).
Next, at step 304, a location of the device 106 is identified. The device location may be determined using e.g., global positioning system (GPS) or other device-inherent mechanisms for capturing latitude/longitude/elevation data.
Additionally, within a multi-location premises, a specific room, apartment, store, etc., location or presence may be determined using e.g., spatial evaluation techniques, such as by utilizing beamforming technology as set forth in IEEE standard 802.11ac™ entitled “Very High Throughput 5 GHz”. Beamforming is a signal processing technology that is used to direct the reception or transmission (the signal energy) on a transducer array in a chosen angular direction (i.e., directional signal transmission or reception). Beamforming concentrates the array to signals coming from only one particular direction to listen to signals in one direction and ignore signals in other directions, such as by combining elements in the array in such a way that signals at particular angles experience constructive interference while others experience destructive interference, akin to the well-known “phased array”. Devices leveraging beamforming technology are therefore able to focus wireless signals directly to a particular device 106, as opposed to wireless hotspots, which “radiate” wireless signals indiscriminately. In other words, beamforming technologies enable a wireless access point (as may be found in the gateway 107) to recognize devices 106 that need wireless access and focus the wireless signals directly to the device or devices 106 which need them. By utilizing beamforming technologies, a device located at the multi-room or multi-location premises (such as e.g., the gateway 109) is able to beam signals around corners and through walls.
In another embodiment, the exemplary gateway device 109 takes advantage of the multiple transmit antennas available in a multiple-input multiple-output (MIMO) system. Signals are sent between multiple antennas of the gateway device 109 and client devices 106; the signals are coordinated to combine constructively at the device receiving the signal (either the gateway device 109 or client devices 106). Specifically, using beamforming technology, for each client device 106, the phases of the transmit signals are manipulated to improve directivity thereto. Efficient steering of individual streams in such a system provides overall signal gain. This can be achieved through knowledge of the channel between the transmitter and receiver. Information may be extracted during this process to identify a location of the device 106 within the premises. For example, various data relating to the signal quality and amplification needed to transmit signals to and/or receive signals from individual ones of the devices 106 is collected. The data may include e.g., Wi-Fi channel state, RF power, delay, signal phase, signal quality, amplification, etc. The data is then used to estimate a location of a device 106 (such as based on comparison to previously gathered data and/or standard or reference data).
In another embodiment, in addition to or as an alternative to the beamforming technologies, presence or location-based services are provided by leveraging infrared (IR) ports or other short-range wireless technology on a set-top box (STB). According to this embodiment, IR signals are broadcast from the client devices 106 to the STB; the STB or gateway 109 then correlates the signals to a location within the premises (i.e., the known location of the STB). In other words, the location of the STB is known by the gateway device 109. Thus, when a signal is broadcast from the client device 106 to the STB and is re-broadcast to the gateway 109, the gateway 109 is able to associate the device 106 to the known location of the STB which re-broadcast the signal.
Additional mechanisms for determining a device location may be utilized consistent with the present disclosure, such as those described in co-owned U.S. patent application Ser. No. 13/600,064 filed on Aug. 30, 2012, entitled “APPARATUS AND METHODS FOR ENABLING LOCATION-BASED SERVICES WITHIN A PREMISES”, and issued as U.S. Pat. No. 8,862,155 on Oct. 14, 2014, which is incorporated herein by reference in its entirety.
The location query may comprise for instance a data push or pull mechanism, and may be performed periodically as determined by the network or user. In another embodiment, triggering events (such as a change in location) may be utilized to stimulate location data generation and delivery.
The latitude/longitude/elevation information is provided to the presence database 202 for evaluation at step 306. The evaluation step 306 may include determining a profile and/or household to which the collected data is associated based on a unique device identifier within the data or metadata.
The collected data is further evaluated to determine a location associated to the device 106 at the time it was collected. For each location, the latitude/longitude/elevation are cross-referenced to publically available data to determine the specific place of business, residence, etc. visited. In a further embodiment, the latitude/longitude data is adjusted to include a radius of predetermined amount for determining location specifics. In this embodiment, when a user patronizes but does not enter a store, such as occurs at drive-thru or convenience stores, the data will reflect the visit. Elevation data is further used to identify within a multi-level premises (such as a shopping mall, or apartment complex) a particular location.
In another variant, the user of the device 106 may be provided with an identified location as derived from the raw latitude/longitude/elevation data (such as via a user interface). The user may be given an opportunity to affirm a correctly identified location and/or manually select a correct location from a list of nearby possibilities (e.g., other locations within a given radius of the provided latitude/longitude/elevation data) in the instance the identified location is incorrect. Additionally, the system may be configured to “learn” locations. In one implementation, at the time a user manually enters a location, or a location is otherwise determined, the presence database 202 and/or evaluation entity 204 may be configured to use the previously received information to automatically identify the location in future instances when the device 106 is at or near that same location. In other words, they system may omit the evaluation step (step 306) in the event the device 106 is at a location (as determined by the latitude/longitude/elevation data) which the device 106 has previously been located.
The foregoing concept can be extended to enable the application to speculate on the user's next location as well. For example, one variant of the application includes a moving “learning mode”, wherein the gateway 109, presence database 202, and/or evaluation entity 204 takes frequent location measurements while the user moves from one location to the next over time (such as through the course of a typical weekday for example), and saves these data as “maps” indicating the user's path of traversal. By knowing the user's typical route, the system can then speculate that where the user is going to be at a given time on a given day.
The evaluation step (step 306) may further include utilizing a timestamp associated to each data record to determine how long a user is present at a given location. Such information is useful in determining whether a particular location is “important” to the subscriber. In one exemplary embodiment, the length of contiguous time spent at a specific location (or within a given radius of the specific location) is determined. Importance of a location may be based on the amount of time. Alternatively, patterns may be identified within the data so as to determine whether a time spent at the location coincides with an amount of time that a typical user would spend at that location. For example, if a device 106 is noted to be at a gym or library for less than an hour, it is not likely that the user participated in the activities associated with these locations, as they typically take an hour or more. A frequency of visits may also be used to identify an importance of a location.
In addition, the latitude/longitude/elevation data may be evaluated to determine whether the user has simply passed through a location or is browsing (e.g., a smooth curve versus a closed loop within the allotted radius).
For each location that is determined to be important (e.g., based on number, duration and frequency of visits), the type of location is determined. For example, if it is a quick service facility, what kind or type; if it is a restaurant, what type; if it is a park, which one; if it is a gym, which one or type, etc. This is determined by reviewing the latitude/longitude/elevation information against known physical addresses/locations as discussed above.
The locations which are deemed to be important may be mined over time to identify trends with meaningful audience sizes (as determined by a secondary content source operator or network operator). For example, it may be determined how many subscribers within a certain ZIP code (as determined from billing information) visit mid-tier restaurants one or more times within a week, or how many go to a gym and whether what percentage of those same subscribers also visit particular grocery stores in the same area, etc.
In another variant, patterns are identified among users extending beyond a particular household to include an entire city, a specific sub-portion of a city (e.g., ZIP code), or any other sub-set of all subscribers to a managed network 101, and additional valuable information may be derived. For example, a presence profile of “health enthusiast” may be applied to users who visit gyms 3 or more times a week and other health related stores at least twice a month; a presence profile of “runner” to users who begin at their homes or at a park and travel between 5-7 miles per hour for a half-hour or more and in a closed loop. Other profiles may be determined based on location, patterns, time of day, day of the week, duration of visit, types of locations frequented, etc.
Furthermore, for each presence profile, the evaluation entity 204 or other headend entity may identify the types of networks utilized by the users in that profile (e.g., broadcast over QAM, IPTV, QAM VOD, etc.) and build an advertising campaign or story around those audiences. Moreover, individual advertising spots may be purchased by advertisers who aim to reach people within the identified presence profile.
In another embodiment, the presence profiles are assigned a score and used to identify presence cohorts for e.g., power demand slide platform (DSP) purchases of the audience, power content engines to deliver more relevant content to the end user, predict viewing patterns, provide social network and/or mobile network presence, and/or enrich subscriber data. In one variant, the subscriber data comprises so-called “Subscriber Information Application” data or any other implementation of Society of Cable Television Engineers (SCTE) 130-6 Subscriber Information Services data.
Finally, at step 308, the data is stored. The stored data may be held at the premises or at a network entity in communication therewith. In the instance the data is stored at a location outside the premises, the aforementioned anonymization techniques may be utilized to protect the subscriber identity.
In another embodiment, the forgoing may be accomplished via a registration process. In one variant, the registration process comprises, when a household is assigned to a presence database 202, associating the household to a unique identifier that is also associated to a particular subscriber account. For example, during the installation process, a registration page may be presented in which the subscriber enters an account number and other authenticating information by which the device is added to the household, and a unique identifier is assigned. Newly discovered devices in the household are also added. For example, an active search for devices in the household's Wi-Fi network may be conducted (e.g., refrigerator, lighting control, HVAC control, security control, etc.). Alternatively, the devices may be registered manually to the presence database 202. Once the devices are discovered or manually entered, they are associated to the appropriate subscriber account at the presence database 202.
Based on the type of device, it may be placed within the “mobile device” pool or the “static device” pool. Additionally, the software resident on the device will be indicative of whether the device is to be classified as a “video consumption device”. Moreover, when new software is installed or software is deleted from each device, the system is configured to reclassify the device. For example, if the WatchTV application is newly installed and configured on a particular device, that device is reclassified as a “video consumption device”. Additionally, devices may be classified as “web browsing devices” based on the capabilities thereof.
When a device is classified as a “mobile device”, a randomly selected individual identifier is attached to the device. The individual identifier may be associated with members of the household manually (via an interface or GUI), or may be assigned automatically based on an association of the device to other mobile devices (having pre-assigned individual identifiers), which are geographically proximate (i.e., assign a probability that these devices are actually the same user). In one specific example, two identified devices may be within 10 feet of each other at all times when the devices are outside of the home; accordingly, it is likely they are operated by the same individual and are given the same individual identifier. When the probability reaches a certain threshold, a new “super individual identifier” may be created to accommodate more than one device in one variant. Additional devices may be added to the super individual identifier in the manner described above as necessary.
When a device is classified as static, the device is assigned a known descriptor (e.g., settop box, HVAC, lighting, security, window shades, etc.). Additionally, for each static device a sub-device type, manufacturer, API, etc. are used to determine the parameters which can be monitored and/or controlled programmatically. For example, for a certain manufacturer of HVAC systems, it may be possible to monitor the current temperature setting, along with the actual temperature reading, it may also be able to monitor whether the fan is set to “ON” or to “AUTO”, it may be possible to monitor whether the heating system or AC system is set to “ON”. However, it may only be possible to programmatically set the temperature setting. When a device is classified as a mobile device, a manufacturer, API, etc. are used to determine the parameters which can be monitored and/or controlled programmatically. For example, for a certain manufacturer, mobile device software version, etc. it may be possible to locate the device (lat/Ion/elevation). Such discovery of the capabilities of the mobile and/or static devices may be accomplished through either lookup based on manufacturer/software/etc. against reference data, or through direct interrogation of the device (e.g. attempt to execute interfaces defined in specific APIs, etc.)
Next, for each super individual identifier, the location of that identifier is tracked over time. Additionally, the time, location and consumption pattern is tracked over time. The tracked time and location are used to predict when the super individual identifier will be at particular locations (such as “home”) as discussed elsewhere herein, and further predict how many super individual identifiers will be at home at a given time as also discussed elsewhere.
With respect to the device parameters that can be controlled programmatically, the value of the controllable parameters is tracked over time and over all available monitored parameters across all devices. Over the time available, the correlation amongst each of the monitored parameters across all devices are examined and those values that have a low correlation are selected. A statistical model may then be built from amongst the parameters to predict the value of the controlled parameter. Additionally, based on a predicted time of the super individual identity at home at a given time, certain ones of the controllable parameters are adjusted automatically (light level, HVAC level, favorite channels, etc.).
Moreover, each super individual identifier is anonymized (as discussed elsewhere herein). Time location and consumption pattern records are collected and sent to a network entity. For each location, a type thereof is identified based on geographic data (e.g. school, office, grocery store, etc.). Based on time, inferred type of location, travel patterns, and consumption patterns, super individual identifiers are broadly characterized, e.g., as Male Adult, Female Adult, Male High Schooler, Female High Schooler, Male Middle Schooler, Female Middle Schooler, Male Elementary Schooler, Female Elementary Schooler, etc. Depending on quality of clustering, other demographic traits may be included in the grouping (inferred age, household income, etc.). Finally, the counts of clusters (as appropriate depending on age, etc.) may be published to an addressable advertising system, along with estimated available impressions across advertising types (display, video) based on consumption patterns and type of location.
According to this embodiment, the devices are first configured at step 402. Configuration of the devices may include e.g., associating a plurality of client devices 102 to a premises and/or to a particular user sub-profile within the premises (as discussed above).
In addition, with respect to other premises devices, such as e.g., HVAC, smart televisions, home audio equipment, automated lighting devices, home security devices, and other smart home equipment, the user may enter an identity of the device and/or an identity thereof may be derived and in one embodiment confirmed by the user. For example, the devices may be assigned qualifiers such as “air conditioner”, “kitchen lights”, “family room television”, “front porch lights”, “master bedroom television”, etc.
The device configurations are then stored at a storage entity in communication with the presence database 202 and/or evaluation entity 204.
Next, per step 404 it is determined whether at least one client device 106 is within the premises. It is noted that the premises may include, e.g., a home, apartment building, office suite, etc. The presence of the client devices 106 within the premises 206 may be determined, as noted above, based on latitude/longitude/elevation information obtained therefrom and/or beamforming or other such techniques, such as to determine a specific location of a device 106 within a premises (such as which room of a house the device 106 is in). In an alternative embodiment, data may be obtained regarding when the client device 106 joins the premises Wi-Fi network and used to determine the presence of the device 106 within the premises 206.
When at least one device is present within the premises, the system queries the current settings of the fixed premises devices, such as the HVAC, smart televisions, home security, automated devices, etc. (step 406), and evaluates the data received in response (step 408).
The queries (step 406) may occur on a regular basis (periodically) so that a profile may be built which associates particular devices 106 being present in the premises to particular settings of the fixed devices. In other words, the data may be evaluated at step 408 to identify the particular settings of the fixed devices when a particular user or group of users is in the premises. For example, when the device 106 associated to Dad is the only device in the premises, the HVAC devices report cooler temperatures than when devices 106 associate to both Mom and Dad are in the premises. Moreover, the televisions in the children's bedrooms may be on when only the children's devices 106 are in the premises, however televisions in a family room may be turned on instead when all family members are home. Parental controls and viewing patterns may also be evaluated based on the devices 106 within the home as well. The foregoing evaluations may further take into account time of day, day of week, season of the year, etc.
The evaluated data is stored at step 410. The stored presence data may be used as discussed elsewhere herein.
When it is determined that no devices are within a premises, the evaluation entity 204 may implement one or more energy saving mechanisms. For example, the system may query the current settings of the fixed devices and if any are determined to be on (such as lights, televisions, etc.) or operating outside of a predetermined range (such as air conditioners), they may be instructed to cease operations or adjust to a more energy efficient range.
Additionally, when it is determined that no devices are within a premises, the presence database 202, evaluation entity 204 and/or gateway 109 or other device may determine a location of one or more of the devices 106 (step 412) such as via the method described above with respect to
Per step 414 it is determined whether any of the devices 106 is en route to the premises. If not, the location of the devices 106 continues to be monitored. In the event that one or more devices 106 are on a trajectory leading to the premises or have an established pattern of returning to the premises at the given date/time, an arrival time is estimated (step 416). The arrival time may be estimated using e.g., known patterns used to arrive at home (i.e., which freeways and streets the user generally takes) and real-time traffic information, as well as other known patterns of behavior (such as that the user generally doesn't leave work until 5 pm, the user generally stops to pick up children at school, etc.
Based on the estimated arrival time, arrival settings are implemented (step 418). That is, when it is known that Dad is on his way home, the appropriate air conditioning, lighting, and television settings are implemented in time for his arrival. If, for example, it will take Dad 20 minutes to arrive at home, and it is known that at least 10 minutes are needed to cool the house to Dad's preferred temperature, the system may cause the air conditioning unit to turn on and set to the appropriate temperature at least 10 minutes before his estimated arrival. Similar logic may be applied to instantiating the user or group of user's preferred lighting, television, etc. settings; including, in one embodiment causing preferred channels or programs to be automatically turned on when the user's device enters the premises. It is further appreciated that in one embedment, the user may manually set one or more preferences to be instantiated prior to his/her arrival.
In this manner, a person may enter a premises with a powered device 106 which connects to the premises network 206 and causes utility and entertainment platforms to automatically customize to the user's preferences. For example, television program “favorites” may be shown on the preferred television display; content recommended and/or predicted for viewing by the particular user may be displayed on the preferred television display; lighting may be customized to preferred or prior settings; cross platform web favorites may be set for the particular user (such as to transition from mobile browsing to PC, smart television or other device, laptop, or tablet browsing; and temperature may be adjusted to preferred or past settings.
When it is known which particular users are within the premises, advertising solutions may advantageously be further customized. For example, cross platform advertising may be displayed and optimized on a preferred television display such that a user who was recently browsing a BMW® website may, upon entering the premises, see a BMW® or other luxury automaker advertisement on their living room television. Moreover, presence profiles may be created for individual and/or shared presence in the home. For example, when it is determined that only the sole adult male is in the premises, the television favorites may be set to Speed, Military and ESPN®, and the lights and air conditioning or heat powered in e.g., the “man cave”. When it is determined that a child is also en route or present, certain televisions may be switched to adjusted favorites (e.g., PG13) and additional rooms or floors may be lit, heated or cooled as necessary. In addition, when it is known which devices are present within a premises, the advertisements provided thereto may be tailored to that particular demographic.
Similar mechanisms may be utilized when the premises 206 comprises a workplace or office. Specifically, when a worker enters the office building or premises (as evidenced by the determined location of the device 106 and/or by the device 106 accessing the premises network 206), information collected from the various so-called “smart” devices in the premises is used to set the custom settings thereof for the worker. The smart devices may comprise utility and entertainment platforms as well as in office computers, etc. For example, when the user enters the office, the presence database 202 and/or evaluation entity 204 may use the worker's presence to ensure that network bandwidth is optimized for the number of users currently in the office. Lighting and temperature settings may also be adjusted to that user's preferences.
Exemplary Use-Based Services Methods—
As illustrated, per step 502, one or more websites are registered to the managed network 101. This is accomplished, in one variant, via registration by a content owner of his or her website with the MSO as part of a business arrangement.
Optionally, for each website which is registered or represented, a “special” device is designated with a specific device identifier. The MSO network 101 or entity at the registered third party (content owner) runs the special device to generate training data (step 504; optional). A user of the designated special device executes every click possible on the represented website, and an application (such as one running at the evaluation entity 204) “sees” the entry associated with that activity in the storage and presents the transaction in the application, along with a recommended “action”, allowing the user to either “confirm” the recommended action associated with the mouse click or to enter a more appropriate action. In this manner, the system becomes aware of every possible action which may be taken when traversing the website and can use this as reference data when a device 106 interacts therewith and data is collected about the device 106 activity.
Next, per step 506, data is collected regarding a user's actual interaction with the website. In one exemplary embodiment, instrument websites pass device identifier information for each device 106 which is interacting therewith to a central server for each mouse click in the context of the website, along with metadata about the activity of the user. For each mouse click, the web page, the unique device identifier, and the context of the click (metadata relevant to the specific web-site), based on content, type of information entered around the click, inferred action (e.g. begin purchase process, filter through purchase process, exit purchase process, complete purchase process, click on ad, click on detail about specific content) is stored.
The collected data is associated to a particular user in the content based network (step 508). In one embodiment, this is manually accomplished by the user of the client device. Alternatively, the aforementioned patterns are used to establish an identity of the device and the identity is later used during the association step (step 508).
Per step 510, the stored data is provided for use in one or more applications by the content owner or a network entity. In one variant, the data is provided to content owner via a portal that delivers detailed accounts of user experience on websites, allowing owners to examine general demographic traits of the users (taken from the Presence Database, associated with the device identifier), as discussed elsewhere herein.
Referring now to
Per step 602, while browsing the web, a user visits a site via a user device 106. Per step 604, it is determined whether the visited site comprises an enhanced (e.g., represented or MSO registered site).
When the visited site does not comprise an enhanced site, generalized information may be collected (step 610). For example, the network 101 may keep track of the number of visits to the non-registered site and other relevant information (such as demographics, etc.) and use this information to advertise the herein described services to the content owner.
In the instance the visited site comprises an enhanced or registered site, per step 606, data is collected regarding each mouse click performed by the user with respect to the site. As noted above with respect to
Per step 608, the data is evaluated for example, to link the data to specific profiles (such as using the herein described presence database 202 and/or evaluation entity 204). In one embodiment, a double blind match is executed and customized elements are displayed. Additionally, the data collection step further improves the audience profile generation discussed elsewhere herein. One or more patterns are also identified within the data at this step and/or at subsequent steps relating to the content owner or network operator performed evaluation, as discussed elsewhere herein. In one variant, the foregoing evaluations occur via a “cookieless” mechanism; that is, the appropriate profile is identified based on an identifier of the device (transmitted in a data record) and/or other network-powered methods. In another example, the system may comprise managed sites and/or may provide tracking pixels.
The data is then provided to both the content owner and the network operator at steps 616 and 612.
The network operator, upon receiving the collected data (step 612), performs one or more evaluations of the data. Specifically, as outlined in
Content predictions or recommendations are enabled by using data collected from the user's interaction with a website to further enhance that user's profile. As the profile is updated, it may be used e.g., to compare against metadata relating to primary content. The proximity of a match between a demographic of content and the user's profile is then used to identify certain content as being likely to be of interest to the user. The identified content may then be provided to the user. In another embodiment, the methods and apparatus of co-owned U.S. patent application Ser. No. 12/414,576, filed on Mar. 30, 2009, entitled “RECOMMENDATION ENGINE APPARATUS AND METHODS”, and issued as U.S. Pat. No. 9,215,423 on Dec. 15, 2015, which is incorporated herein by reference in its entirety may be utilized. Methods and apparatus for the identification and recommendation of content targeted to a particular user (or group of users) within a content-based network are disclosed therein. As discussed, a mechanism for particularly selecting content to align with a user's preferences (the latter which the viewer need not enter manually) is provided. Additionally, a mechanism is provided to learn (and unlearn) the user's preferences and which content they are likely to enjoy based on actions taken with regard to the content. The recommended content may be displayed in one embodiment as a list or table of titles (and related information of interest), or alternatively fed to the user as a continuous content stream on a virtual channel. In another embodiment, the compiled content is presented to the user in conjunction with an electronic program guide (EPG) which may be personalized to that user if desired. In a further aspect, client applications are utilized to compile the playlist based on user-imputed as well as pre-programmed user profiles. Various feedback mechanisms are utilized to enable the client application to “learn” from the user's activities in order to update the user profile, and generate more finely tuned recommendations over time. The herein described recommendation engine may be provided within the functionality of the presence database 202 and/or evaluation entity 204 located either at the managed network 101 or premises 206.
Targeted primary and/or secondary content may also be provided using the updated profile in a manner similar to that described above with respect to the foregoing recommendation concepts. One method for the delivery of secondary content which is contextually-related to particular primary content selected by the user and/or by the recommendation engine or evaluation entity 204 (discussed above) is described in co-owned U.S. patent application Ser. No. 11/198,620, filed Aug. 4, 2005, entitled “METHOD AND APPARATUS FOR CONTEXT-SPECIFIC CONTENT DELIVERY”, and issued as U.S. Pat. No. 9,286,388 on Mar. 15, 2016, which is incorporated herein by reference in its entirety. Specifically, secondary content comprising advertising is selected at least in part based on metadata associated with the primary content. The metadata is provided by, e.g., the content originator or network operator, and is sent to a third party network entity (e.g., advertising server) which returns contextually specific advertising matching the search terms. In one variant, the search term is simply one or more keywords drawn from the metadata and used as an input to a search engine (such as the aforementioned recommendation engine or evaluation entity 204). In another variant, more sophisticated analysis of the metadata is performed so as to ostensibly reduce the number of irrelevant or marginally relevant “hits” returned by the search engine/advertising server.
Another method of enhanced secondary content selection useful with various aspects of the present disclosure is described in co-owned U.S. patent application Ser. No. 12/070,559, filed Feb. 19, 2008, entitled “METHOD AND APPARATUS FOR ENHANCED ADVERTISING AND PROMOTIONAL DELIVERY IN A NETWORK”, and issued as U.S. Pat. No. 9,503,961 on Nov. 22, 2016, which is incorporated herein by reference in its entirety. Specifically, the application discusses a substantially user-friendly mechanism for viewing content and advertisements which both eliminates the guess-work and imprecision associated with skipping commercials via manual fast-forwarding through recorded content, and presents a viewer with options regarding the type and content of advertisements to view. Advertisers and network operators are also provided with more avenues for reaching subscribers with advertising or promotional content.
In another exemplary embodiment, the methods and apparatus of co-owned, co-pending U.S. patent Ser. No. 14/462,300, filed Aug. 18, 2014 and entitled “METHODS AND APPARATUS FOR TARGETED SECONDARY CONTENT INSERTION” which is incorporated herein by reference in its entirety may be utilized. As discussed therein, content is identified for insertion by analyzing audience or viewer qualities (i.e., psychographic, geographic, or demographic, characteristic or classifications) at a particular insertion opportunity using an advertisement management system (and associated advertisement decision maker process) which may be run at e.g., the presence database 202 and/or evaluation entity 204. The audience information can in one embodiment be gathered in real-time directly from users' CPE (i.e. set top boxes, cable modems, PC, etc.), thereby allowing information to be gathered which is specific to actual content viewers. Historical or other information relating to particular subscribers (or subscribers in general, or even the broader general population) may also be utilized in characterizing an audience.
The advertisement management system then, in one embodiment, uses the gathered audience information to correlate particular advertisements or other content thereto. In one variant, an algorithm is used to analyze audience qualifiers (i.e., attributes of an audience or its behavior), and determine the “proximity” of a given audience (e.g., that currently viewing a program where an impending placement opportunity will occur) to a set of audience qualifiers of a target audience of an advertisement. The placement opportunity can then be optimized for one or more variables (e.g., proximity, revenue, impressions, etc.) by selecting the best fitting advertisement for that opportunity.
The aforementioned methods and apparatus can advantageously provide content across multiple delivery platforms utilizing substantially extant network infrastructure and components compatible with a number of different client device and delivery systems including both wired and wireless technologies.
Subscriber privacy and anonymity is also optionally maintained via e.g., hashing or encrypting data relating to the CPE and/or subscriber, thus ensuring that stored data is not traceable to a specific user account. In alternative embodiments, only information designated by a consumer is eligible for content collection and/or analysis. In this manner, subscriber privacy is effectively safeguarded, and user control of their private information (including for example preferences or user profile) is protected as well.
In addition, the user may also advantageously be given control over the “fine tuning” of the secondary content evaluation and recommendation algorithms. For instance, co-owned U.S. patent application Ser. No. 12/284,757 entitled “METHODS AND APPARATUS FOR USER-BASED TARGETED CONTENT DELIVERY” filed Sep. 24, 2008, and issued as U.S. Pat. No. 9,071,859 on Jun. 30, 2015, incorporated herein by reference in its entirety, describes inter alia methods and apparatus for intra-content context-specific advertising placement useful with the present disclosure. Using this approach, targeted secondary content can be placed within particular portions of the primary content so as to most closely temporally align the contextually-related aspects of the advertisement and the primary content.
In this manner, advertisements delivered in online I/C and or Publisher Direct can employ viewability metrics as part of enabled campaign and stored as data fields in an audience profile (e.g. be able to determine whether users that visit soccer sites, visit sites with less viewable display and/or video).
In one specific example, when a page load occurs, and there is an advertisement opportunity, the device 106 identifier is determined and demographics and/or identity (such as e.g., Dad, Mom, Teen Daughter, etc.) are obtained from the presence database 202. Advertisement insertion decisions are made based on outstanding campaigns and possible return on investment or other cost/revenue based analysis. For example, the following rules may be implemented:
Next, the following are implemented:
Fraud can be detected by the evaluation entity 204 or other network apparatus using normative filtering based on, e.g., volume of traffic (e.g. to determine wither the volume is relatively normal for an individual) to “authenticate” or validate number of concurrent keystrokes, requests, inputs, etc. For example, when any single device generates 3 times the standard deviation above the mean in “clicks” for a specific webpage, that device is marked as “fraudulent” and is removed from targeting. Additionally, the content owner, household, subscriber, and/or device 106 owner may be notified of the fraudulent device such as by email or other alert.
In addition, the foregoing collection and evaluation stages (steps 606 and 608) may be performed even when the site is determined not to be enhanced at step 604. In this instance, rather than providing the data to the content owner, the data may only be provided to the network operator. Once again, the network operator may utilize this data as discussed above (step 614).
The content owner, upon receiving the collected data (step 616) proceeds to evaluate the data. In one embodiment, the content owner is provided with an API or other interface for allowing dynamic loading of content based on the identifier device 106 being used to browse the site and a demonstrated level of interest in that type of content.
Hence, at step 618, the content owner determines an interest level estimate and/or refines an existing interest level estimate. In one embodiment, this is accomplished via a classification of a context of an advertisement. Based on length of time that content with specific classification is loaded and actively manipulated (if such interaction is possible given the device and context), the interest for this content for the specific device 106 is determined.
Over time, the amount of data collected for a particular device increases, accordingly, at step 618, the content owner may further refine interest inference by taking average time spent/click throughs on all content versus that for this content, etc.
Next, at step 620, the demographics of people viewing this content may be determined. A model can then be built which predicts an affinity for this content type in the future.
Once the interest level estimate and the demographics are determined, at step 622, this information may be used to predict content of interest to a user and/or provide targeted content to a user. In one example, when a user loads a webpage enabled with dynamic content on a known device, based on that particular device's history, content may be loaded which is most likely to be of interest to the user. When a user load a webpage enabled with dynamic content on an unknown device (but one for which the presence database 202 has an entry or profile for), based on the demographic associated with the device, content may be loaded which is most likely to be of interest to the user. Additionally, when a totally unknown device loads a webpage enabled with dynamic content, based on the predominant demographics of people on that device type (if known) at that time of day in that geography (if known), content which is most likely to be of interest to the user may be loaded.
Exemplary Premises Database—
In the illustrated embodiment, the processor 704 is configured to run at least a profile generation and identification application 706 and a location correlation application 708 thereon, although other software/logic architectures may readily be substituted.
The profile generation and identification application 706 is a computer application configured to generate individual device profiles. As discussed above, the profiles may be generated automatically using information inferred from patterns of behavior, and/or supplemented with user inputted information. The application 706 is advantageously utilized to, when data is received relating to subsequent locations and/or activities of a particular device, use a unique device identifier attached to the data to correlate the data to one of the device profiles. As discussed previously, the individual device profiles comprise a plurality of data relating to a location of the device (within and outside of a premises) and browsing data.
The location correlation application 708 is in one embodiment configured to associate a qualifier (e.g., name) to the locations which the devices 106 are determined to be located. As indicated above, the locations are identified by GPS or other data indicating a latitude/longitude/elevation. The location correlation application 708 associates the raw latitude/longitude/elevation data received to a particular location based on an information look-up and/or manual confirmation by a user. One or more profiles are therefore associated, via the location correlation application 708, to a specific location. For example, the locations may be assigned qualifiers such as “kitchen”, “family room”, “dining room”, “bedroom”, “Dad's work”, “Teen Daughter's School”, etc. In addition, the location assignment may cover a range of data coordinates extracted from multiple profiles which were used to determine an overall space that is to be considered associated to a particular location and/or based on an acceptable radius for that type of location.
One or more additional applications or modules may be provided to, inter alia, enable a user to manually correct an incorrectly identified device location, and subsequently store an updated device profile and location assignment. Additionally, applications or modules may be provided to enable the presence database 202 to “learn” locations as entered by a user as discussed above.
A network interface 702 and backend interfaces 714 are further illustrated. The network interface 702 is in the exemplary embodiment configured to provide content and data delivery to and from the MSO network 101 and/or from an unmanaged network 111. The backend interfaces 714 provide communication between the presence database 202 and various devices within a premises 206 and/or at the headend, such as e.g., client mobile devices 106, fixed or smart devices, the evaluation entity 204, and/or other headend entities. Communication between the client devices 106 and interfaces 714 may occur via a wired or wireless communication therewith, such as via e.g., IEEE-1394 (so called “FireWire”), USB, LAN/WAN, Wireless, HDTV, NTSC, etc. communications.
Exemplary Evaluation Entity—
The network interface 802 enables communication of the evaluation entity 204 to the managed network 101. The backend interfaces 814 provide, inter alia, communication between the evaluation entity 204 and various devices within a premises, such as e.g., client mobile devices 106, fixed or “smart” home devices, the premises database 202, etc.
In the illustrated embodiment, the processor 804 is configured to run at least a pattern identification application 806, a preferred settings application 808, a prediction and targeting application 810, and a fraud detection application 812 thereon.
The pattern identification application 806 comprises software which enables data collected regarding a particular user or group of users to be compiled and examined to determine one or more patterns therein. In the examples listed above for providing location and/or use-based services (discussed above with respect to
In yet another embodiment, the pattern identification application 806 is configured to analyze location and/or use information from the device 106 over time in order to generate one or more rules. One rule, for example may indicate which locations within a premises are near one another and then utilize that rule to estimate or predict movement between locations within the premises. Similar logic may be applied to e.g., large commercial buildings with multiple stores, etc. Additionally, the derived rules may identify e.g., a pattern of never viewing video clips during certain hours of the day (such as during work hours), and therefore provide only non-video content for insertion during this time. Other patterns of behaviors based on location and/or use may also be derived.
The preferred settings application 808 comprises software which enables a particular user or group of users' preferred settings to be implemented when the user or group of users is at or near a premises (such as work or home). In the examples listed above for providing location and/or use-based services (discussed above with respect to
The prediction and targeting application 810 comprises software which enables the evaluation entity 204 to predict content of interest to a user and/or provide targeted content thereto. In the examples listed above for providing location and/or use-based services (discussed above with respect to
The fraud detection application 812 comprises software which enables the evaluation entity 204 to determine whether use activity occurring via a particular user device 106 is fraudulent. In the examples listed above for providing location and/or use-based services (discussed above with respect to
Exemplary Applications and Implementations—
The herein described apparatus and methods may advantageously be used to provide location and/or use-based services in any number of different use cases or scenarios.
In one such case, the location-based services include services which enable particular applications and/or content to be automatically loaded or provided when the user enters a particular location (e.g., a particular room in their house, a particular store, etc.) or a context (e.g., business versus personal).
In another variant, an application is run on a client mobile device 106 which is configured to, when it is informed by the presence database 202 of the location of the device 106, load particular applications or content. For example, when the device 106 receives information from the premises database 202 that the device is in the user's kitchen, a grocery shopping list and/or recipe or cooking application are loaded on the device. The device 106 may additionally load recommended content such as most recent content from a cooking-related site, programming content (such as from the Internet and/or an MSO network 101), etc. In addition, when the device location is determined to be at the grocery store, the device 106 may automatically load the list for that particular store (such as via information obtained from the premises database 202 and/or evaluation entity 204).
Moreover, the present methods and apparatus may be configured to based on the content with which the user is interacting, obtain information entered around each mouse click to infer action (e.g. begin purchase process, filter through purchase process, exit purchase process, complete purchase process, click on ad, click on detail about specific content). The inferred action is then used to provide further profile updates and/or targeting.
It will be recognized that while certain aspects of the disclosure are described in terms of a specific sequence of steps of a method, these descriptions are only illustrative of the broader methods of the disclosure, and may be modified as required by the particular application. Certain steps may be rendered unnecessary or optional under certain circumstances. Additionally, certain steps or functionality may be added to the disclosed embodiments, or the order of performance of two or more steps permuted. All such variations are considered to be encompassed within the disclosure disclosed and claimed herein.
While the above detailed description has shown, described, and pointed out novel features of the disclosure as applied to various embodiments, it will be understood that various omissions, substitutions, and changes in the form and details of the device or process illustrated may be made by those skilled in the art without departing from the disclosure. The foregoing description is of the best mode presently contemplated of carrying out the disclosure. This description is in no way meant to be limiting, but rather should be taken as illustrative of the general principles of the disclosure. The scope of the disclosure should be determined with reference to the claims.
It will be appreciated that while certain steps and aspects of the various methods and apparatus described herein may be performed by a human being, the disclosed aspects and individual methods and apparatus are generally computerized/computer-implemented. Computerized apparatus and methods are necessary to fully implement these aspects for any number of reasons including, without limitation, commercial viability, practicality, and even feasibility (i.e., certain steps/processes simply cannot be performed by a human being in any viable fashion).
Number | Name | Date | Kind |
---|---|---|---|
4521881 | Stapleford et al. | Jun 1985 | A |
4546382 | McKenna et al. | Oct 1985 | A |
4602279 | Freeman | Jul 1986 | A |
4905080 | Watanabe et al. | Feb 1990 | A |
4930120 | Baxter et al. | May 1990 | A |
5155591 | Wachob | Oct 1992 | A |
5313454 | Bustini et al. | May 1994 | A |
5373315 | Dufresne et al. | Dec 1994 | A |
5481294 | Thomas et al. | Jan 1996 | A |
5497185 | Dufresne et al. | Mar 1996 | A |
5600364 | Hendricks et al. | Feb 1997 | A |
5675647 | Garneau et al. | Oct 1997 | A |
5758257 | Herz et al. | May 1998 | A |
5774170 | Hite et al. | Jun 1998 | A |
5793409 | Tetsumura | Aug 1998 | A |
5812642 | Leroy | Sep 1998 | A |
5862312 | Mann et al. | Jan 1999 | A |
5878324 | Borth et al. | Mar 1999 | A |
5914945 | Abu-Amara et al. | Jun 1999 | A |
5926205 | Krause et al. | Jul 1999 | A |
5929849 | Kikinis | Jul 1999 | A |
5935206 | Dixon et al. | Aug 1999 | A |
5956037 | Osawa et al. | Sep 1999 | A |
5963844 | Dail | Oct 1999 | A |
5974299 | Massetti | Oct 1999 | A |
6002393 | Hite et al. | Dec 1999 | A |
6029045 | Picco et al. | Feb 2000 | A |
6047327 | Tso et al. | Apr 2000 | A |
6081830 | Schindler | Jun 2000 | A |
6088722 | Herz et al. | Jul 2000 | A |
6092178 | Jindal et al. | Jul 2000 | A |
6124878 | Adams et al. | Sep 2000 | A |
6128316 | Takeda et al. | Oct 2000 | A |
6134532 | Lazarus et al. | Oct 2000 | A |
6161142 | Wolfe et al. | Dec 2000 | A |
6169728 | Perreault et al. | Jan 2001 | B1 |
6177931 | Alexander et al. | Jan 2001 | B1 |
6182050 | Ballard | Jan 2001 | B1 |
6202210 | Ludtke | Mar 2001 | B1 |
6211901 | Imajima et al. | Apr 2001 | B1 |
6216129 | Eldering | Apr 2001 | B1 |
6219840 | Corrigan et al. | Apr 2001 | B1 |
6240553 | Son et al. | May 2001 | B1 |
6249680 | Wax et al. | Jun 2001 | B1 |
6272176 | Srinivasan | Aug 2001 | B1 |
6282713 | Kitsukawa et al. | Aug 2001 | B1 |
6330609 | Garofalakis et al. | Dec 2001 | B1 |
6353626 | Sunay et al. | Mar 2002 | B1 |
6378130 | Adams | Apr 2002 | B1 |
6389538 | Gruse et al. | May 2002 | B1 |
6396055 | Biedendorf | May 2002 | B1 |
6434141 | Oz et al. | Aug 2002 | B1 |
6446261 | Rosser | Sep 2002 | B1 |
6463585 | Hendricks et al. | Oct 2002 | B1 |
6467089 | Aust et al. | Oct 2002 | B1 |
6498783 | Lin | Dec 2002 | B1 |
6502076 | Smith | Dec 2002 | B1 |
6549718 | Grooters et al. | Apr 2003 | B1 |
6560578 | Eldering | May 2003 | B2 |
6590865 | Ibaraki et al. | Jul 2003 | B1 |
6601237 | Ten et al. | Jul 2003 | B1 |
6604138 | Virine et al. | Aug 2003 | B1 |
6615039 | Eldering | Sep 2003 | B1 |
6615251 | Klug et al. | Sep 2003 | B1 |
6647548 | Lu et al. | Nov 2003 | B1 |
6671736 | Virine et al. | Dec 2003 | B2 |
6681393 | Bauminger et al. | Jan 2004 | B1 |
6687735 | Logston et al. | Feb 2004 | B1 |
6700624 | Yun | Mar 2004 | B2 |
6704930 | Eldering et al. | Mar 2004 | B1 |
6711148 | Hills | Mar 2004 | B1 |
6718551 | Swix et al. | Apr 2004 | B1 |
6725461 | Dougherty et al. | Apr 2004 | B1 |
6738978 | Hendricks et al. | May 2004 | B1 |
6742187 | Vogel | May 2004 | B1 |
6763391 | Ludtke | Jul 2004 | B1 |
6771290 | Hoyle | Aug 2004 | B1 |
6775843 | McDermott | Aug 2004 | B1 |
6813776 | Chernock et al. | Nov 2004 | B2 |
6842783 | Boivie et al. | Jan 2005 | B1 |
6859845 | Mate | Feb 2005 | B2 |
6891841 | Leatherbury et al. | May 2005 | B2 |
6898762 | Ellis et al. | May 2005 | B2 |
6901606 | Wright et al. | May 2005 | B2 |
6909837 | Unger | Jun 2005 | B1 |
6915528 | McKenna, Jr. | Jul 2005 | B1 |
6986156 | Rodriguez et al. | Jan 2006 | B1 |
6990680 | Wugofski | Jan 2006 | B1 |
7017179 | Asamoto et al. | Mar 2006 | B1 |
7024676 | Klopfenstein | Apr 2006 | B1 |
7039928 | Kamada et al. | May 2006 | B2 |
7069573 | Brooks et al. | Jun 2006 | B1 |
7075945 | Arsenault et al. | Jul 2006 | B2 |
7086077 | Giammaressi | Aug 2006 | B2 |
7100183 | Kunkel et al. | Aug 2006 | B2 |
7109848 | Schybergson | Sep 2006 | B2 |
7143431 | Eager et al. | Nov 2006 | B1 |
7146627 | Ismail et al. | Dec 2006 | B1 |
7152237 | Flickinger et al. | Dec 2006 | B2 |
7155508 | Sankuratripati et al. | Dec 2006 | B2 |
7174126 | McElhatten et al. | Feb 2007 | B2 |
7191461 | Arsenault et al. | Mar 2007 | B1 |
7197472 | Conkwright et al. | Mar 2007 | B2 |
7213036 | Apparao et al. | May 2007 | B2 |
7222078 | Abelow | May 2007 | B2 |
7228555 | Schlack | Jun 2007 | B2 |
7237250 | Kanojia et al. | Jun 2007 | B2 |
7242988 | Hoffberg et al. | Jul 2007 | B1 |
7246150 | Donoho et al. | Jul 2007 | B1 |
7246172 | Yoshiba et al. | Jul 2007 | B2 |
7266836 | Anttila et al. | Sep 2007 | B2 |
7280737 | Smith | Oct 2007 | B2 |
7281261 | Jaff et al. | Oct 2007 | B2 |
7308415 | Kimbrel et al. | Dec 2007 | B2 |
7317728 | Acharya et al. | Jan 2008 | B2 |
7327692 | Ain et al. | Feb 2008 | B2 |
7334044 | Allen | Feb 2008 | B1 |
7340759 | Rodriguez | Mar 2008 | B1 |
7346688 | Allen et al. | Mar 2008 | B2 |
7352775 | Powell | Apr 2008 | B2 |
7355980 | Bauer et al. | Apr 2008 | B2 |
7356751 | Levitan | Apr 2008 | B1 |
7357775 | Koh | Apr 2008 | B1 |
7363371 | Kirby et al. | Apr 2008 | B2 |
7363643 | Drake et al. | Apr 2008 | B2 |
7367043 | Dudkiewicz et al. | Apr 2008 | B2 |
7369750 | Cheng et al. | May 2008 | B2 |
7379494 | Raleigh et al. | May 2008 | B2 |
7444655 | Sardera | Oct 2008 | B2 |
7457520 | Rosetti et al. | Nov 2008 | B2 |
7464179 | Hodges et al. | Dec 2008 | B2 |
7567565 | La Joie | Jul 2009 | B2 |
7567983 | Pickelsimer et al. | Jul 2009 | B2 |
7577118 | Haumonte et al. | Aug 2009 | B2 |
7602820 | Helms et al. | Oct 2009 | B2 |
7603529 | MacHardy et al. | Oct 2009 | B1 |
7650319 | Hoffberg et al. | Jan 2010 | B2 |
7712125 | Herigstad et al. | May 2010 | B2 |
7720432 | Colby et al. | May 2010 | B1 |
7729940 | Harvey et al. | Jun 2010 | B2 |
7730509 | Boulet et al. | Jun 2010 | B2 |
7783316 | Mitchell | Aug 2010 | B1 |
7801803 | Forlai | Sep 2010 | B2 |
7900052 | Jonas et al. | Mar 2011 | B2 |
7900229 | Dureau | Mar 2011 | B2 |
7930715 | Hendricks et al. | Apr 2011 | B2 |
7954131 | Cholas et al. | May 2011 | B2 |
8028322 | Riedl et al. | Sep 2011 | B2 |
8041785 | Mazur et al. | Oct 2011 | B2 |
8042131 | Flickinger | Oct 2011 | B2 |
8065703 | Wilson et al. | Nov 2011 | B2 |
8084792 | Lehmann et al. | Dec 2011 | B2 |
8099757 | Riedl et al. | Jan 2012 | B2 |
8205226 | Ko et al. | Jun 2012 | B2 |
8214256 | Riedl et al. | Jul 2012 | B2 |
8296185 | Isaac | Oct 2012 | B2 |
8306634 | Nguyen et al. | Nov 2012 | B2 |
8341242 | Dillon et al. | Dec 2012 | B2 |
8347341 | Markley et al. | Jan 2013 | B2 |
8365213 | Orlowski | Jan 2013 | B1 |
8396055 | Patel et al. | Mar 2013 | B2 |
8396056 | Dalton, Jr. et al. | Mar 2013 | B2 |
8442265 | Bosworth | May 2013 | B1 |
8484511 | Engel et al. | Jul 2013 | B2 |
8516529 | Lajoie et al. | Aug 2013 | B2 |
8561113 | Cansler, Jr. et al. | Oct 2013 | B2 |
8571931 | Riedl et al. | Oct 2013 | B2 |
8583484 | Chalawsky | Nov 2013 | B1 |
8621501 | Matheny et al. | Dec 2013 | B2 |
8713623 | Brooks | Apr 2014 | B2 |
8769559 | Moon et al. | Jul 2014 | B2 |
8862155 | Stern et al. | Oct 2014 | B2 |
8866911 | Sivertsen | Oct 2014 | B1 |
8898270 | Stack | Nov 2014 | B1 |
8997136 | Brooks et al. | Mar 2015 | B2 |
9003436 | Tidwell et al. | Apr 2015 | B2 |
9027062 | Patel et al. | May 2015 | B2 |
9071859 | Lajoie | Jun 2015 | B2 |
9215423 | Kimble et al. | Dec 2015 | B2 |
20010001160 | Shoff et al. | May 2001 | A1 |
20010013123 | Freeman et al. | Aug 2001 | A1 |
20010030785 | Pangrac et al. | Oct 2001 | A1 |
20020026496 | Boyer et al. | Feb 2002 | A1 |
20020032754 | Logston et al. | Mar 2002 | A1 |
20020049902 | Rhodes | Apr 2002 | A1 |
20020054589 | Ethridge et al. | May 2002 | A1 |
20020059577 | Lu et al. | May 2002 | A1 |
20020059619 | Lebar | May 2002 | A1 |
20020063621 | Tseng et al. | May 2002 | A1 |
20020069404 | Copeman et al. | Jun 2002 | A1 |
20020073419 | Yen et al. | Jun 2002 | A1 |
20020078441 | Drake et al. | Jun 2002 | A1 |
20020078444 | Krewin et al. | Jun 2002 | A1 |
20020087975 | Schlack | Jul 2002 | A1 |
20020087976 | Kaplan et al. | Jul 2002 | A1 |
20020095684 | St. John et al. | Jul 2002 | A1 |
20020100063 | Herigstad et al. | Jul 2002 | A1 |
20020104083 | Hendricks et al. | Aug 2002 | A1 |
20020112240 | Bacso et al. | Aug 2002 | A1 |
20020120498 | Gordon et al. | Aug 2002 | A1 |
20020123928 | Eldering et al. | Sep 2002 | A1 |
20020124182 | Bacso et al. | Sep 2002 | A1 |
20020129378 | Cloonan et al. | Sep 2002 | A1 |
20020144263 | Eldering et al. | Oct 2002 | A1 |
20020147984 | Tomsen et al. | Oct 2002 | A1 |
20020154655 | Gummalla et al. | Oct 2002 | A1 |
20020163928 | Rudnick et al. | Nov 2002 | A1 |
20020166119 | Cristofalo | Nov 2002 | A1 |
20020174430 | Ellis et al. | Nov 2002 | A1 |
20020178445 | Eldering et al. | Nov 2002 | A1 |
20020178447 | Plotnick et al. | Nov 2002 | A1 |
20020184629 | Sie et al. | Dec 2002 | A1 |
20020184634 | Cooper | Dec 2002 | A1 |
20020184635 | Istvan | Dec 2002 | A1 |
20030002862 | Rodriguez et al. | Jan 2003 | A1 |
20030004810 | Eldering | Jan 2003 | A1 |
20030005446 | Jaff et al. | Jan 2003 | A1 |
20030005453 | Rodriguez et al. | Jan 2003 | A1 |
20030007516 | Abramov et al. | Jan 2003 | A1 |
20030018977 | McKenna | Jan 2003 | A1 |
20030020744 | Ellis et al. | Jan 2003 | A1 |
20030030751 | Lupulescu et al. | Feb 2003 | A1 |
20030033199 | Coleman | Feb 2003 | A1 |
20030046704 | Laksono et al. | Mar 2003 | A1 |
20030056217 | Brooks | Mar 2003 | A1 |
20030061619 | Giammaressi | Mar 2003 | A1 |
20030071117 | Meade, II | Apr 2003 | A1 |
20030077067 | Wu et al. | Apr 2003 | A1 |
20030093311 | Knowlson | May 2003 | A1 |
20030093784 | Dimitrova et al. | May 2003 | A1 |
20030093790 | Logan et al. | May 2003 | A1 |
20030093792 | Labeeb et al. | May 2003 | A1 |
20030101449 | Bentolila et al. | May 2003 | A1 |
20030101451 | Bentolila et al. | May 2003 | A1 |
20030101454 | Ozer et al. | May 2003 | A1 |
20030110499 | Knudson et al. | Jun 2003 | A1 |
20030110503 | Perkes | Jun 2003 | A1 |
20030114162 | Chheda et al. | Jun 2003 | A1 |
20030115601 | Palazzo et al. | Jun 2003 | A1 |
20030115612 | Mao et al. | Jun 2003 | A1 |
20030135513 | Quinn et al. | Jul 2003 | A1 |
20030139980 | Hamilton | Jul 2003 | A1 |
20030140351 | Hoarty et al. | Jul 2003 | A1 |
20030145323 | Hendricks et al. | Jul 2003 | A1 |
20030149975 | Eldering et al. | Aug 2003 | A1 |
20030149990 | Anttila et al. | Aug 2003 | A1 |
20030149993 | Son et al. | Aug 2003 | A1 |
20030172376 | Coffin | Sep 2003 | A1 |
20030179773 | Mocek et al. | Sep 2003 | A1 |
20030217365 | Caputo | Nov 2003 | A1 |
20030220100 | McElhatten et al. | Nov 2003 | A1 |
20030229681 | Levitan | Dec 2003 | A1 |
20030237090 | Boston et al. | Dec 2003 | A1 |
20040019691 | Daymond | Jan 2004 | A1 |
20040034873 | Zenoni | Feb 2004 | A1 |
20040047599 | Grzeczkowski | Mar 2004 | A1 |
20040060076 | Song | Mar 2004 | A1 |
20040073915 | Dureau | Apr 2004 | A1 |
20040078809 | Drazin | Apr 2004 | A1 |
20040109672 | Kim et al. | Jun 2004 | A1 |
20040117817 | Kwon et al. | Jun 2004 | A1 |
20040133467 | Siler | Jul 2004 | A1 |
20040133907 | Rodriguez et al. | Jul 2004 | A1 |
20040138909 | Mayer | Jul 2004 | A1 |
20040146006 | Jackson | Jul 2004 | A1 |
20040148625 | Eldering et al. | Jul 2004 | A1 |
20040163109 | Kang et al. | Aug 2004 | A1 |
20040163111 | Palazzo et al. | Aug 2004 | A1 |
20040177383 | Martinolich et al. | Sep 2004 | A1 |
20040181811 | Rakib | Sep 2004 | A1 |
20040186774 | Lee | Sep 2004 | A1 |
20040187159 | Gaydos et al. | Sep 2004 | A1 |
20040194134 | Gunatilake et al. | Sep 2004 | A1 |
20040199789 | Shaw et al. | Oct 2004 | A1 |
20040230994 | Urdang et al. | Nov 2004 | A1 |
20050007278 | Anson et al. | Jan 2005 | A1 |
20050022237 | Nomura | Jan 2005 | A1 |
20050027696 | Swaminathan et al. | Feb 2005 | A1 |
20050028208 | Ellis et al. | Feb 2005 | A1 |
20050034171 | Benya | Feb 2005 | A1 |
20050034173 | Hatanaka | Feb 2005 | A1 |
20050039205 | Riedl | Feb 2005 | A1 |
20050047596 | Suzuki | Mar 2005 | A1 |
20050055685 | Maynard et al. | Mar 2005 | A1 |
20050060742 | Riedl et al. | Mar 2005 | A1 |
20050060745 | Riedl et al. | Mar 2005 | A1 |
20050086334 | Aaltonen et al. | Apr 2005 | A1 |
20050086691 | Dudkiewicz et al. | Apr 2005 | A1 |
20050105396 | Schybergson | May 2005 | A1 |
20050111844 | Compton et al. | May 2005 | A1 |
20050114141 | Grody | May 2005 | A1 |
20050114900 | Ladd et al. | May 2005 | A1 |
20050123001 | Craven et al. | Jun 2005 | A1 |
20050125832 | Jost et al. | Jun 2005 | A1 |
20050144635 | Boortz et al. | Jun 2005 | A1 |
20050168323 | Lenoir et al. | Aug 2005 | A1 |
20050176444 | Tanaka | Aug 2005 | A1 |
20050198686 | Krause et al. | Sep 2005 | A1 |
20050210502 | Flickinger et al. | Sep 2005 | A1 |
20050223409 | Rautila et al. | Oct 2005 | A1 |
20050229209 | Hildebolt et al. | Oct 2005 | A1 |
20050234998 | Lesandrini et al. | Oct 2005 | A1 |
20050235318 | Grauch et al. | Oct 2005 | A1 |
20050262542 | Deweese et al. | Nov 2005 | A1 |
20050273819 | Knudson et al. | Dec 2005 | A1 |
20050276284 | Krause et al. | Dec 2005 | A1 |
20050289588 | Kinnear | Dec 2005 | A1 |
20050289618 | Hardin | Dec 2005 | A1 |
20050289619 | Melby | Dec 2005 | A1 |
20060019702 | Anttila et al. | Jan 2006 | A1 |
20060031883 | Ellis et al. | Feb 2006 | A1 |
20060036750 | Ladd et al. | Feb 2006 | A1 |
20060037060 | Simms et al. | Feb 2006 | A1 |
20060080408 | Istvan et al. | Apr 2006 | A1 |
20060117341 | Park | Jun 2006 | A1 |
20060130107 | Gonder et al. | Jun 2006 | A1 |
20060130113 | Carlucci et al. | Jun 2006 | A1 |
20060154674 | Landschaft et al. | Jul 2006 | A1 |
20060165197 | Morita et al. | Jul 2006 | A1 |
20060171390 | La Joie | Aug 2006 | A1 |
20060171423 | Helms et al. | Aug 2006 | A1 |
20060190336 | Pisaris-Henderson et al. | Aug 2006 | A1 |
20060197828 | Zeng et al. | Sep 2006 | A1 |
20060218604 | Riedl et al. | Sep 2006 | A1 |
20060218632 | Corley et al. | Sep 2006 | A1 |
20060248555 | Eldering | Nov 2006 | A1 |
20060253328 | Kohli et al. | Nov 2006 | A1 |
20060253584 | Dixon et al. | Nov 2006 | A1 |
20060253864 | Easty | Nov 2006 | A1 |
20060259924 | Boortz et al. | Nov 2006 | A1 |
20060277569 | Smith | Dec 2006 | A1 |
20060288374 | Ferris et al. | Dec 2006 | A1 |
20060294259 | Matefi et al. | Dec 2006 | A1 |
20070022459 | Gaebel et al. | Jan 2007 | A1 |
20070029379 | Peyer | Feb 2007 | A1 |
20070033531 | Marsh | Feb 2007 | A1 |
20070061023 | Hoffberg et al. | Mar 2007 | A1 |
20070074258 | Wood et al. | Mar 2007 | A1 |
20070076728 | Rieger et al. | Apr 2007 | A1 |
20070089127 | Flickinger et al. | Apr 2007 | A1 |
20070094691 | Gazdzinski | Apr 2007 | A1 |
20070101370 | Calderwood | May 2007 | A1 |
20070113243 | Brey | May 2007 | A1 |
20070115389 | McCarthy et al. | May 2007 | A1 |
20070118852 | Calderwood | May 2007 | A1 |
20070150919 | Morishita | Jun 2007 | A1 |
20070157242 | Cordray et al. | Jul 2007 | A1 |
20070157262 | Ramaswamy et al. | Jul 2007 | A1 |
20070180230 | Cortez | Aug 2007 | A1 |
20070204310 | Hua et al. | Aug 2007 | A1 |
20070217436 | Markley et al. | Sep 2007 | A1 |
20070233857 | Cheng et al. | Oct 2007 | A1 |
20070244760 | Bodnar et al. | Oct 2007 | A1 |
20070266395 | Lee | Nov 2007 | A1 |
20070276926 | Lajoie et al. | Nov 2007 | A1 |
20070280298 | Hearn et al. | Dec 2007 | A1 |
20080016526 | Asmussen | Jan 2008 | A1 |
20080052157 | Kadambi et al. | Feb 2008 | A1 |
20080092181 | Britt | Apr 2008 | A1 |
20080101460 | Rodriguez | May 2008 | A1 |
20080104634 | Gajdos et al. | May 2008 | A1 |
20080109307 | Ullah | May 2008 | A1 |
20080115169 | Ellis et al. | May 2008 | A1 |
20080124056 | Concotelli | May 2008 | A1 |
20080134274 | Derrenberger | Jun 2008 | A1 |
20080141317 | Radloff et al. | Jun 2008 | A1 |
20080147497 | Tischer | Jun 2008 | A1 |
20080155588 | Roberts et al. | Jun 2008 | A1 |
20080155614 | Cooper | Jun 2008 | A1 |
20080163305 | Johnson et al. | Jul 2008 | A1 |
20080170551 | Zaks | Jul 2008 | A1 |
20080182591 | Krikorian | Jul 2008 | A1 |
20080183705 | Shivaji-Rao | Jul 2008 | A1 |
20080192820 | Brooks et al. | Aug 2008 | A1 |
20080229354 | Morris et al. | Sep 2008 | A1 |
20080244667 | Osborne | Oct 2008 | A1 |
20080263578 | Bayer et al. | Oct 2008 | A1 |
20080271068 | Ou et al. | Oct 2008 | A1 |
20080273591 | Brooks et al. | Nov 2008 | A1 |
20080306903 | Larson et al. | Dec 2008 | A1 |
20080313671 | Batrouny et al. | Dec 2008 | A1 |
20080313691 | Cholas et al. | Dec 2008 | A1 |
20090025027 | Craner | Jan 2009 | A1 |
20090030802 | Plotnick et al. | Jan 2009 | A1 |
20090064251 | Savoor | Mar 2009 | A1 |
20090086643 | Kotrla et al. | Apr 2009 | A1 |
20090132346 | Duggal et al. | May 2009 | A1 |
20090133048 | Gibbs et al. | May 2009 | A1 |
20090150917 | Huffman et al. | Jun 2009 | A1 |
20090170479 | Jarenskog | Jul 2009 | A1 |
20090187939 | Lajoie | Jul 2009 | A1 |
20090210899 | Lawrence-Apfelbaum et al. | Aug 2009 | A1 |
20090244290 | McKelvey | Oct 2009 | A1 |
20090319379 | Joao | Dec 2009 | A1 |
20090320059 | Bolyukh | Dec 2009 | A1 |
20100005527 | Jeon | Jan 2010 | A1 |
20100014496 | Kalika et al. | Jan 2010 | A1 |
20100027560 | Yang et al. | Feb 2010 | A1 |
20100070867 | Lemmers | Mar 2010 | A1 |
20100081416 | Cohen | Apr 2010 | A1 |
20100115091 | Park et al. | May 2010 | A1 |
20100122276 | Chen | May 2010 | A1 |
20100122288 | Minter | May 2010 | A1 |
20100125658 | Strasters | May 2010 | A1 |
20100150027 | Atwal et al. | Jun 2010 | A1 |
20100151816 | Besehanic et al. | Jun 2010 | A1 |
20100159951 | Shkedi | Jun 2010 | A1 |
20100161492 | Harvey et al. | Jun 2010 | A1 |
20100175084 | Ellis et al. | Jul 2010 | A1 |
20100175584 | Kusaka et al. | Jul 2010 | A1 |
20100218231 | Frink et al. | Aug 2010 | A1 |
20100251304 | Donoghue et al. | Sep 2010 | A1 |
20100251305 | Kimble et al. | Sep 2010 | A1 |
20100262488 | Harrison et al. | Oct 2010 | A1 |
20100269131 | Newberry et al. | Oct 2010 | A1 |
20100280641 | Harkness et al. | Nov 2010 | A1 |
20100293165 | Eldering | Nov 2010 | A1 |
20100309051 | Moshfeghi | Dec 2010 | A1 |
20100313225 | Cholas et al. | Dec 2010 | A1 |
20110015989 | Tidwell | Jan 2011 | A1 |
20110016479 | Tidwell et al. | Jan 2011 | A1 |
20110016482 | Tidwell et al. | Jan 2011 | A1 |
20110090898 | Patel et al. | Apr 2011 | A1 |
20110093900 | Patel et al. | Apr 2011 | A1 |
20110099017 | Ure | Apr 2011 | A1 |
20110103374 | Lajoie et al. | May 2011 | A1 |
20110107364 | Lajoie et al. | May 2011 | A1 |
20110107379 | Lajoie et al. | May 2011 | A1 |
20110107389 | Chakarapani | May 2011 | A1 |
20110110515 | Tidwell et al. | May 2011 | A1 |
20110112717 | Resner | May 2011 | A1 |
20110138064 | Rieger et al. | Jun 2011 | A1 |
20110163888 | Goedde | Jul 2011 | A1 |
20110167440 | Greenfield | Jul 2011 | A1 |
20110178880 | Karaoguz et al. | Jul 2011 | A1 |
20110178943 | Motahari et al. | Jul 2011 | A1 |
20110206136 | Bekedam | Aug 2011 | A1 |
20110225619 | Kesireddy | Sep 2011 | A1 |
20110231265 | Brown et al. | Sep 2011 | A1 |
20110235577 | Hintermeister | Sep 2011 | A1 |
20110247029 | Yarvis | Oct 2011 | A1 |
20110264530 | Santangelo et al. | Oct 2011 | A1 |
20110265116 | Stern et al. | Oct 2011 | A1 |
20110286437 | Austin et al. | Nov 2011 | A1 |
20110307339 | Russell et al. | Dec 2011 | A1 |
20110317977 | Harris | Dec 2011 | A1 |
20120011269 | Krikorian et al. | Jan 2012 | A1 |
20120023535 | Brooks et al. | Jan 2012 | A1 |
20120030363 | Conrad | Feb 2012 | A1 |
20120030716 | Zhang | Feb 2012 | A1 |
20120046049 | Curtis et al. | Feb 2012 | A1 |
20120054785 | Yang | Mar 2012 | A1 |
20120079546 | Kalidindi | Mar 2012 | A1 |
20120084813 | Dmitriev et al. | Apr 2012 | A1 |
20120110620 | Kilar et al. | May 2012 | A1 |
20120115501 | Zheng | May 2012 | A1 |
20120124606 | Tidwell et al. | May 2012 | A1 |
20120151549 | Kumar | Jun 2012 | A1 |
20120202447 | Edge et al. | Aug 2012 | A1 |
20120222081 | Schaefer | Aug 2012 | A1 |
20120302259 | Busch | Nov 2012 | A1 |
20120330759 | Aggarwal et al. | Dec 2012 | A1 |
20130045681 | Dua | Feb 2013 | A1 |
20130046623 | Moritz et al. | Feb 2013 | A1 |
20130081097 | Park | Mar 2013 | A1 |
20130095848 | Gold et al. | Apr 2013 | A1 |
20130100818 | Qiu et al. | Apr 2013 | A1 |
20130227283 | Williamson et al. | Aug 2013 | A1 |
20130227608 | Evans et al. | Aug 2013 | A1 |
20130254787 | Cox | Sep 2013 | A1 |
20140020017 | Stern et al. | Jan 2014 | A1 |
20140046624 | Miettinen | Feb 2014 | A1 |
20140066098 | Stern et al. | Mar 2014 | A1 |
20140215506 | Kalmes | Jul 2014 | A1 |
20140282721 | Kuncl | Sep 2014 | A1 |
20140309868 | Ricci | Oct 2014 | A1 |
20140359649 | Cronk et al. | Dec 2014 | A1 |
20150058883 | Tidwell et al. | Feb 2015 | A1 |
20150058909 | Miller | Feb 2015 | A1 |
20150103685 | Butchko et al. | Apr 2015 | A1 |
20150106846 | Chen | Apr 2015 | A1 |
20150189377 | Wheatley | Jul 2015 | A1 |
20150365833 | Stafford et al. | Dec 2015 | A1 |
20160019103 | Basra | Jan 2016 | A1 |
20160127185 | McAllister | May 2016 | A1 |
20170164378 | Gunasekara | Jun 2017 | A1 |
20170164416 | Yeddala et al. | Jun 2017 | A1 |
Number | Date | Country |
---|---|---|
WO-0191474 | Nov 2001 | WO |
Entry |
---|
Deering et al., Internet Protocol, Version 6 (Ipv6) Specification, IETF RFC 2460 (Dec. 1998). |
Internet Protocol DARPA Internet Program Protocol Specification, IETF RFC 791 (Sep. 1981). |
Cisco Intelligent Network Architecture for Digital Video—SCTE Cable-Tec Expo 2004 information page, Orange County Convention Center, Jun. 2004, 24 pages. |
Griffith, et al.,Resource Planning and Bandwidth Allocation in Hybrid Fiber-Coax Residential Networks, National Institute of Standards and Technology (NIST), 10 pages, no date. |
Iab—“Digital Video In-Stream Ad Format Guidelines,” 23 pages, released Jan. 8, 2016. |
Iab—RTB Project—“Open RTB API Specification Version 2.4” (Final Draft) dated Mar. 2016, 75 pages. |
Iab—RTB Project—“Open RTB Dynamic Native Ads API Specification Version 1”, 35 pages, dated Feb. 2015. |
Iab—RTB Project—“Open RTB Dynamic Native Ads API Specification Version 1.1” dated Mar. 2016, 36 pages. |
Iab—“Traffic Fraud: Best Practices for Reducing Risk to Exposure”, 12 pages, dated Jan. 30, 2014. |
Iab “Open Direct API Specification Version 1.0”, 95 pages, finalized Jan. 2015. |
Informal Standard, Document: id3v2.3, by: M. Nilsson, dated Feb. 3, 1999, 39 pages, http://id3.org/id3v2.3.0. |
Jicwebs “Traffic Fraud: Best Practices for Reducing Risk to Exposure”, 14 pages, Version 1, Issued Jun. 2015. |
Kanouff, Communications Technology: Next-Generation Bandwidth Management—The Evolution of the Anything-to-Anywhere Network, 8 pages, Apr. 1, 2004. |
Motorola DOCSIS Cable Module DCM 2000 specifications, 4 pages, no date. |
Open Cable Specification entitled “Enhanced TV Binary Interchange Format 1 0” OC-SP-ETV-131F1.0-106-110128 dated Jan. 28, 2011, 408 pages. |
OpenVision Session Resource Manager—Open Standards-Based Solution Optimizes Network Resources by Dynamically Assigning Bandwidth in the Delivery of Digital Services article, 2 pages, (copyright 2006), (http://www.imake.com/hopenvision). |
OpenVision Session Resource Manager features and information, 2 pages, no date, (http://www.imake.com/hopenvision). |
SCTE Standards Document ANSI/SCTE 118-2 2007 entitled “Program-Specific Ad Insertion—Content Provider to Traffic Communication Applications Data Model,” 20 pages. |
SCTE Standards Document ANSI/SCTE 130-1 2013 entitled “Digital Program Insertion—Advertising Systems Interfaces, Part 1—Advertising Systems Overview,” 20 pages. |
SCTE Standards Document ANSI/SCTE 130-2 2014 entitled “Digital Program Insertion—Advertising Systems Interfaces, Part 2—Core Data Elements,” 78 pages. |
Tandberg Television specification entitled “AdPoint.RTM. Advanced Advertising Platform” dated Mar. 2008, 2 pages. |
UTF-32, IBM, retrieved from http://publib.boulder.ibm.com/infocenter/iseries/v5r3/index.jsp?topic=%2Fnls%2Frbagsutf32.htm on Aug. 28, 2013. |
Number | Date | Country | |
---|---|---|---|
20160094883 A1 | Mar 2016 | US |